Comparison of cryptographic hash functions
The following tables compare general and technical information for a number of cryptographic hash functions. See the individual functions' articles for further information. This article is not all-inclusive or necessarily up-to-date. An overview of hash function security/cryptanalysis can be found at hash function security summary.
General information
Basic general information about the cryptographic hash functions: year, designer, references, etc.Function | Year | Designer | Derived from | Reference |
BLAKE | 2008 | Jean-Philippe Aumasson Luca Henzen Willi Meier Raphael C.-W. Phan | ChaCha20 | |
BLAKE2 | 2012 | Jean-Philippe Aumasson Samuel Neves Zooko Wilcox-O'Hearn Christian Winnerlein | BLAKE | |
BLAKE3 | 2020 | Jack O'Connor Jean-Philippe Aumasson Samuel Neves Zooko Wilcox-O'Hearn | BLAKE2 | |
GOST R 34.11-94 | 1994 | FAPSI and VNIIstandart | GOST 28147-89 | |
HAVAL | 1992 | Yuliang Zheng Josef Pieprzyk Jennifer Seberry | ||
KangarooTwelve | 2016 | Guido Bertoni Joan Daemen Michaël Peeters Gilles Van Assche | Keccak | |
MD2 | 1989 | Ronald Rivest | ||
MD4 | 1990 | Ronald Rivest | ||
MD5 | 1992 | Ronald Rivest | MD4 | |
MD6 | 2008 | Ronald Rivest | ||
RIPEMD | 1992 | The RIPE Consortium | MD4 | |
RIPEMD-128 RIPEMD-256 RIPEMD-160 RIPEMD-320 | 1996 | Hans Dobbertin Antoon Bosselaers Bart Preneel | RIPEMD | |
SHA-0 | 1993 | NSA | ||
SHA-1 | 1995 | NSA | SHA-0 | |
SHA-256 SHA-384 SHA-512 | 2002 | NSA | ||
SHA-224 | 2004 | NSA | ||
SHA-3 | 2008 | Guido Bertoni Joan Daemen Michaël Peeters Gilles Van Assche | RadioGatún | |
Streebog | 2012 | FSB, InfoTeCS JSC | ||
Tiger | 1995 | Ross Anderson Eli Biham | ||
Whirlpool | 2004 | Vincent Rijmen Paulo Barreto |
Parameters
Algorithm | Output size | Internal state size | Block size | Length size | Word size | Rounds |
BLAKE2b | 512 | 512 | 1024 | 128 | 64 | 12 |
BLAKE2s | 256 | 256 | 512 | 64 | 32 | 10 |
BLAKE3 | Unlimited | 256 | 512 | 64 | 32 | 7 |
GOST | 256 | 256 | 256 | 256 | 32 | 32 |
HAVAL | 256/224/192/160/128 | 256 | 1024 | 64 | 32 | 3/4/5 |
MD2 | 128 | 384 | 128 | – | 32 | 18 |
MD4 | 128 | 128 | 512 | 64 | 32 | 3 |
MD5 | 128 | 128 | 512 | 64 | 32 | 64 |
PANAMA | 256 | 8736 | 256 | – | 32 | – |
RadioGatún | Unlimited | 58 words | 19 words | – | 1–64 | 18 |
RIPEMD | 128 | 128 | 512 | 64 | 32 | 48 |
RIPEMD-128, -256 | 128/256 | 128/256 | 512 | 64 | 32 | 64 |
RIPEMD-160 | 160 | 160 | 512 | 64 | 32 | 80 |
RIPEMD-320 | 320 | 320 | 512 | 64 | 32 | 80 |
SHA-0 | 160 | 160 | 512 | 64 | 32 | 80 |
SHA-1 | 160 | 160 | 512 | 64 | 32 | 80 |
SHA-224, -256 | 224/256 | 256 | 512 | 64 | 32 | 64 |
SHA-384, -512, -512/224, -512/256 | 384/512/224/256 | 512 | 1024 | 128 | 64 | 80 |
SHA-3 | 224/256/384/512 | 1600 | 1600 - 2*bits | – | 64 | 24 |
SHA3-224 | 224 | 1600 | 1152 | – | 64 | 24 |
SHA3-256 | 256 | 1600 | 1088 | – | 64 | 24 |
SHA3-384 | 384 | 1600 | 832 | – | 64 | 24 |
SHA3-512 | 512 | 1600 | 576 | – | 64 | 24 |
Tiger-192/160/128 | 192/160/128 | 192 | 512 | 64 | 64 | 24 |
Whirlpool | 512 | 512 | 512 | 256 | 8 | 10 |