Comparison of Hash Methods
Comparison of Hash Methods
A cryptographic hash function is a hash function that takes an arbitrary block of data and returns a fixed-size bit string, the cryptographic hash value, such that any (accidental or intentional) change to the data will (with very high probability) change the hash value. The data to be encoded are often called the message, and the hash value is sometimes called the message digest or simply digest.
Hash Algorithm
|
Output Size (bits) |
Internal State (bits) |
Block Size (bits) |
Rounds |
Security |
SHA1 |
128
|
128 |
512 |
80 |
|
SHA256
|
256 |
256 |
512 |
64 |
|
SHA384
|
384 |
512 |
1024 |
64 |
|
SHA512
|
512 |
512 |
1024 |
64 |
|
SHA224
|
224 |
256 |
512 |
64 |
|
MD5
|
128 |
128 |
512 |
64 |
|
MD2
|
128 |
- |
128 |
18 |
|
RIPEMD160
|
160 |
|
|
|
|
NOTE: SHA (Secure Hash Algorithm) variations listed above were designed by the NSA.