• In cryptography, cryptographic hash functions can be divided into two main categories. In the first category are those functions whose designs are based...
    13 KB (1,811 words) - 20:15, 26 August 2024
  • Thumbnail for Cryptographic hash function
    A cryptographic hash function (CHF) is a hash algorithm (a map of an arbitrary binary string to a binary string with a fixed size of n {\displaystyle n}...
    48 KB (6,237 words) - 06:56, 21 October 2024
  • general and technical information for a number of cryptographic hash functions. See the individual functions' articles for further information. This article...
    16 KB (806 words) - 20:08, 6 August 2024
  • The Secure Hash Algorithms are a family of cryptographic hash functions published by the National Institute of Standards and Technology (NIST) as a U...
    3 KB (464 words) - 07:05, 4 October 2024
  • This is a list of hash functions, including cyclic redundancy checks, checksum functions, and cryptographic hash functions. Adler-32 is often mistaken...
    10 KB (280 words) - 12:41, 17 October 2024
  • The non-cryptographic hash functions (NCHFs) are hash functions intended for applications that do not need the rigorous security requirements of the cryptographic...
    7 KB (796 words) - 04:17, 23 August 2024
  • Thumbnail for Hash collision
    security (in particular, cryptographic hash functions), collision avoidance has become an important topic in computer security. Hash collisions can be unavoidable...
    9 KB (1,130 words) - 16:51, 9 August 2024
  • science and cryptography, Whirlpool (sometimes styled WHIRLPOOL) is a cryptographic hash function. It was designed by Vincent Rijmen (co-creator of the Advanced...
    11 KB (1,054 words) - 03:57, 19 March 2024
  • Comparison of cryptographic hash functions Cryptographic hash function Collision attack Preimage attack Length extension attack Cipher security summary Tao...
    17 KB (1,055 words) - 12:18, 2 March 2023
  • computer security systems. These routines include, but are not limited to, one-way hash functions and encryption functions. When creating cryptographic systems...
    6 KB (814 words) - 02:12, 9 May 2024
  • Hash-based cryptography is the generic term for constructions of cryptographic primitives based on the security of hash functions. It is of interest as...
    20 KB (2,329 words) - 09:31, 3 September 2024
  • Although it can be used to ensure security, SipHash is fundamentally different from cryptographic hash functions like Secure Hash Algorithms (SHA) in that it...
    14 KB (1,342 words) - 05:08, 21 August 2024
  • In cryptography, security level is a measure of the strength that a cryptographic primitive — such as a cipher or hash function — achieves. Security level...
    13 KB (1,360 words) - 04:38, 10 May 2024
  • ShangMi 3 (SM3) is a cryptographic hash function used in the Chinese National Standard. It was published by the National Cryptography Administration (Chinese:...
    3 KB (287 words) - 17:06, 16 November 2023
  • BLAKE is a cryptographic hash function based on Daniel J. Bernstein's ChaCha stream cipher, but a permuted copy of the input block, XORed with round constants...
    30 KB (2,848 words) - 05:59, 18 August 2024
  • Thumbnail for HMAC
    code) is a specific type of message authentication code (MAC) involving a cryptographic hash function and a secret cryptographic key. As with any MAC, it...
    18 KB (2,335 words) - 04:57, 18 October 2024
  • credentials to Internet security. Salts are related to cryptographic nonces. Without a salt, identical passwords will map to identical hash values, which could...
    13 KB (1,533 words) - 23:19, 23 October 2024
  • cryptography, Tiger is a cryptographic hash function designed by Ross Anderson and Eli Biham in 1995 for efficiency on 64-bit platforms. The size of a...
    9 KB (910 words) - 14:47, 30 September 2023
  • Thumbnail for Key derivation function
    function (which typically uses a cryptographic hash function or block cipher). KDFs can be used to stretch keys into longer keys or to obtain keys of...
    13 KB (1,641 words) - 06:40, 27 October 2024
  • Thumbnail for One-way compression function
    compression functions are for instance used in the Merkle–Damgård construction inside cryptographic hash functions. One-way compression functions are often...
    24 KB (3,977 words) - 03:22, 7 June 2024
  • Thumbnail for Avalanche effect
    In cryptography, the avalanche effect is the desirable property of cryptographic algorithms, typically block ciphers and cryptographic hash functions, wherein...
    5 KB (568 words) - 17:23, 14 December 2023
  • The MD2 Message-Digest Algorithm is a cryptographic hash function developed by Ronald Rivest in 1989. The algorithm is optimized for 8-bit computers....
    9 KB (1,053 words) - 18:49, 15 September 2024
  • Thumbnail for Sponge function
    cryptographic primitives, including cryptographic hashes, message authentication codes, mask generation functions, stream ciphers, pseudo-random number...
    7 KB (811 words) - 14:51, 1 November 2024
  • Cryptographic Information SecurityHash Function. The equivalent standard used by other member-states of the CIS is GOST 34.311-95. This function must...
    16 KB (2,206 words) - 02:44, 11 July 2024
  • cryptography, a preimage attack on cryptographic hash functions tries to find a message that has a specific hash value. A cryptographic hash function...
    7 KB (895 words) - 15:44, 13 April 2024
  • Thumbnail for Merkle tree
    Merkle tree (redirect from Tiger-Tree Hash)
    In cryptography and computer science, a hash tree or Merkle tree is a tree in which every "leaf" node is labelled with the cryptographic hash of a data...
    15 KB (1,788 words) - 20:42, 10 September 2024
  • Thumbnail for Cryptographic nonce
    vectors and in cryptographic hash functions. A nonce is an arbitrary number used only once in a cryptographic communication, in the spirit of a nonce word...
    7 KB (906 words) - 17:31, 29 July 2024
  • In cryptography, N-hash is a cryptographic hash function based on the FEAL round function, and is now considered insecure. It was proposed in 1990 in an...
    2 KB (213 words) - 21:43, 31 December 2023
  • Thumbnail for Hash function
    A hash function is any function that can be used to map data of arbitrary size to fixed-size values, though there are some hash functions that support...
    50 KB (7,445 words) - 00:27, 29 October 2024
  • SHA-1 (redirect from SHA-1 hash)
    In cryptography, SHA-1 (Secure Hash Algorithm 1) is a hash function which takes an input and produces a 160-bit (20-byte) hash value known as a message...
    50 KB (5,744 words) - 19:28, 20 October 2024