Differences between version 10 and predecessor to the previous major change of CryptographicHash.
Other diffs: Previous Revision, Previous Author, or view the Annotated Edit History
Newer page: | version 10 | Last edited on Saturday, February 28, 2009 4:52:55 pm | by LawrenceDoliveiro | Revert |
Older page: | version 9 | Last edited on Sunday, July 25, 2004 4:07:51 am | by AristotlePagaltzis | Revert |
@@ -1,10 +1,12 @@
A CryptographicHash is a [Hash] for which is it is practically impossible to construct a document that results in a hash value known beforehand. This makes such hash functions useful for signing documents to assure their integrity. Several well known and understood algorithms fall in this category:
-* [
MD2]
as per
RFC:1319, a good but slow hashing algorithm
-* [
MD4]
as per RFC:1320
-* [MD5] as per RFC:1321, based on [
MD2]
but faster
-* [SHA1] is newer and has fewer theoretical attack vectors than [
MD5]
+* MD2 as per RFC:1319, a good (still?)
but slow hashing algorithm
+* MD4 as per RFC:1320
+* [MD5] as per RFC:1321, based on MD2 but faster. People should be phasing out their use of this by now.
+* [SHA1] is newer and has fewer theoretical attack vectors than MD5, but is also [showing signs of weakness|http://www.schneier.com/blog/archives/2005/02/sha1_broken.html
].
+
+A [competition is currently in progress|http://www.schneier.com/blog/archives/2007/02/a_new_secure_ha.html] to come up with a new, stronger hash function to replace the above.
See also: [CRC]
----
CategoryCryptography