Template:Comparison of SHA functions

From Infogalactic: the planetary knowledge core
Jump to: navigation, search
Comparison of SHA functions
Algorithm and variant Output size
(bits)
Internal state size
(bits)
Block size
(bits)
Max message size
(bits)
Rounds Operations Security
(bits)
Example performance[2]
(MiB/s)
MD5 (as reference) 128 128
(4 × 32)
512 Unlimited[3] 64 And, Xor, Rot, Add (mod 232), Or <64
(collisions found)
335
SHA-0 160 160
(5 × 32)
512 264 − 1 80 And, Xor, Rot, Add (mod 232), Or <80
(collisions found)
-
SHA-1 160 160
(5 × 32)
512 264 − 1 80 <80
(theoretical attack[4])
192
SHA-2 SHA-224
SHA-256
224
256
256
(8 × 32)
512 264 − 1 64 And, Xor, Rot, Add (mod 232), Or, Shr 112
128
139
SHA-384
SHA-512
SHA-512/224
SHA-512/256
384
512
224
256
512
(8 × 64)
1024 2128 − 1 80 And, Xor, Rot, Add (mod 264), Or, Shr 192
256
112
128
154
SHA-3 SHA3-224
SHA3-256
SHA3-384
SHA3-512
224
256
384
512
1600
(5 × 5 × 64)
1152
1088
832
576
Unlimited[5] 24[6] And, Xor, Rot, Not 112
128
192
256
-
SHAKE128
SHAKE256
d (arbitrary)
d (arbitrary)
1344
1088
min(d/2, 128)
min(d/2, 256)
-

References

These references will appear in the article, but this list appears only on this page.
  1. "Crypto++ 5.6.0 Benchmarks". Retrieved 2013-06-13. 
  2. Found on an AMD Opteron 8354 2.2 GHz processor running 64-bit Linux[1]
  3. "The MD5 Message-Digest Algorithm". Retrieved 2016-04-18. 
  4. "The SHAppening: freestart collisions for SHA-1". Retrieved 2015-11-05. 
  5. "The Sponge Functions Corner". Retrieved 2016-01-27. 
  6. "The Keccak sponge function family". Retrieved 2016-01-27.