Comparison of cryptographic hash functions


The following tables compare general and technical information for a number of cryptographic hash functions. See the individual functions' articles for further information. This article is not all-inclusive or necessarily up-to-date. An overview of hash function security/cryptanalysis can be found at hash function security summary.

General information

Basic general information about the cryptographic hash functions: year, designer, references, etc.
FunctionYearDesignerDerived fromReference
BLAKE2008Jean-Philippe Aumasson
Luca Henzen
Willi Meier
Raphael C.-W. Phan
ChaCha20
BLAKE22012Jean-Philippe Aumasson
Samuel Neves
Zooko Wilcox-O'Hearn
Christian Winnerlein
BLAKE
BLAKE32020Jack O'Connor
Jean-Philippe Aumasson
Samuel Neves
Zooko Wilcox-O'Hearn
BLAKE2
GOST R 34.11-941994FAPSI and VNIIstandartGOST 28147-89
HAVAL1992Yuliang Zheng
Josef Pieprzyk
Jennifer Seberry

KangarooTwelve2016Guido Bertoni
Joan Daemen
Michaël Peeters
Gilles Van Assche
Keccak
MD21989Ronald Rivest
MD41990Ronald Rivest
MD51992Ronald RivestMD4
MD62008Ronald Rivest
RIPEMD1992The RIPE ConsortiumMD4
RIPEMD-128
RIPEMD-256
RIPEMD-160
RIPEMD-320
1996Hans Dobbertin
Antoon Bosselaers
Bart Preneel
RIPEMD
SHA-01993NSA
SHA-11995NSASHA-0
SHA-256
SHA-384
SHA-512
2002NSA
SHA-2242004NSA
SHA-3 2008Guido Bertoni
Joan Daemen
Michaël Peeters
Gilles Van Assche
RadioGatún
Streebog2012FSB, InfoTeCS JSC
Tiger1995Ross Anderson
Eli Biham

Whirlpool2004Vincent Rijmen
Paulo Barreto

Parameters

AlgorithmOutput size Internal state sizeBlock sizeLength sizeWord sizeRounds
BLAKE2b51251210241286412
BLAKE2s256256512643210
BLAKE3Unlimited25651264327
GOST2562562562563232
HAVAL256/224/192/160/128256102464323/4/5
MD21283841283218
MD412812851264323
MD5128128512643264
PANAMA256873625632
RadioGatúnUnlimited58 words19 words1–6418
RIPEMD128128512643248
RIPEMD-128, -256128/256128/256512643264
RIPEMD-160160160512643280
RIPEMD-320320320512643280
SHA-0160160512643280
SHA-1160160512643280
SHA-224, -256224/256256512643264
SHA-384, -512, -512/224, -512/256384/512/224/25651210241286480
SHA-3224/256/384/51216001600 - 2*bits6424
SHA3-224224160011526424
SHA3-256256160010886424
SHA3-38438416008326424
SHA3-51251216005766424
Tiger-192/160/128192/160/128192512646424
Whirlpool512512512256810

Compression function

The following tables compare technical information for compression functions of cryptographic hash functions. The information comes from the specifications, please refer to them for more details.