src: images.slideplayer.com
This article summarizes publicly known attacks against cryptographic hash functions. Note that not all entries may be up to date. For a summary of other hash function parameters, see comparison of cryptographic hash functions.
Video Hash function security summary
Table color key
Maps Hash function security summary
Common hash functions
Collision resistance
Chosen prefix collision attack
Preimage resistance
src: images.slideplayer.com
Less common hash functions
Collision resistance
Preimage resistance
src: slideplayer.com
See also
- Comparison of cryptographic hash functions
- Cryptographic hash function
- Collision attack
- Preimage attack
- Cipher security summary
src: images.slideplayer.com
References
src: images.slideplayer.com
External links
- 2010 summary of attacks against Tiger, MD4 and SHA-2: Jian Guo; San Ling; Christian Rechberger; Huaxiong Wang (2010-12-06). Advanced Meet-in-the-Middle Preimage Attacks: First Results on Full Tiger, and Improved Results on MD4 and SHA-2. Asiacrypt 2010. p. 3.
Source of the article : Wikipedia