Comparison of cryptographic hash functions
The following tables compare general and technical information for a number of cryptographic hash functions. See the individual functions' articles for further information. This article is not all-inclusive or necessarily up-to-date. An overview of hash function security/cryptanalysis can be found at hash [function security summary].
General information
Basic general information about the cryptographic hash functions: year, designer, references, etc.| Function | Year | Designer | Derived from | Reference |
| BLAKE | 2008 | Jean-Philippe Aumasson Luca Henzen Willi Meier Raphael C.-W. Phan | ChaCha20 | |
| BLAKE2 | 2012 | Jean-Philippe Aumasson Samuel Neves Zooko Wilcox-O'Hearn Christian Winnerlein | BLAKE | |
| BLAKE3 | 2020 | Jack O'Connor Jean-Philippe Aumasson Samuel Neves Zooko Wilcox-O'Hearn | BLAKE2 | |
| GOST R 34.11-94 | 1994 | FAPSI and VNIIstandart | GOST 28147-89 | |
| HAVAL | 1992 | Yuliang Zheng Josef Pieprzyk Jennifer Seberry | ||
| KangarooTwelve | 2016 | Guido Bertoni Joan Daemen Michaël Peeters Gilles Van Assche | Keccak | |
| MD2 | 1989 | Ronald Rivest | ||
| MD4 | 1990 | Ronald Rivest | ||
| MD5 | 1992 | Ronald Rivest | MD4 | |
| MD6 | 2008 | Ronald Rivest | ||
| RIPEMD | 1992 | The RIPE Consortium | MD4 | |
| RIPEMD-128 RIPEMD-256 RIPEMD-160 RIPEMD-320 | 1996 | Hans Dobbertin Antoon Bosselaers Bart Preneel | RIPEMD | |
| SHA-0 | 1993 | NSA | ||
| SHA-1 | 1995 | NSA | SHA-0 | |
| SHA-256 SHA-384 SHA-512 | 2002 | NSA | ||
| SHA-224 | 2004 | NSA | ||
| SHA-3 | 2008 | Guido Bertoni Joan Daemen Michaël Peeters Gilles Van Assche | RadioGatún | |
| Streebog | 2012 | FSB, InfoTeCS JSC | ||
| Tiger | 1995 | Ross Anderson Eli Biham | ||
| Whirlpool | 2004 | Vincent Rijmen Paulo Barreto |
Parameters
| Algorithm | Output size | Internal state size | Block size | Length size | Word size | Rounds |
| BLAKE2b | 512 | 512 | 1024 | 128 | 64 | 12 |
| BLAKE2s | 256 | 256 | 512 | 64 | 32 | 10 |
| BLAKE3 | Unlimited | 256 | 512 | 64 | 32 | 7 |
| GOST | 256 | 256 | 256 | 256 | 32 | 32 |
| HAVAL | 256/224/192/160/128 | 256 | 1024 | 64 | 32 | 3/4/5 |
| MD2 | 128 | 384 | 128 | – | 32 | 18 |
| MD4 | 128 | 128 | 512 | 64 | 32 | 3 |
| MD5 | 128 | 128 | 512 | 64 | 32 | 64 |
| PANAMA | 256 | 8736 | 256 | – | 32 | – |
| RadioGatún | Unlimited | 58 words | 19 words | – | 1–64 | 18 |
| RIPEMD | 128 | 128 | 512 | 64 | 32 | 48 |
| RIPEMD-128, -256 | 128/256 | 128/256 | 512 | 64 | 32 | 64 |
| RIPEMD-160 | 160 | 160 | 512 | 64 | 32 | 80 |
| RIPEMD-320 | 320 | 320 | 512 | 64 | 32 | 80 |
| SHA-0 | 160 | 160 | 512 | 64 | 32 | 80 |
| SHA-1 | 160 | 160 | 512 | 64 | 32 | 80 |
| SHA-224, -256 | 224/256 | 256 | 512 | 64 | 32 | 64 |
| SHA-384, -512, -512/224, -512/256 | 384/512/224/256 | 512 | 1024 | 128 | 64 | 80 |
| SHA-3 | 224/256/384/512 | 1600 | 1600 - 2*bits | – | 64 | 24 |
| SHA3-224 | 224 | 1600 | 1152 | – | 64 | 24 |
| SHA3-256 | 256 | 1600 | 1088 | – | 64 | 24 |
| SHA3-384 | 384 | 1600 | 832 | – | 64 | 24 |
| SHA3-512 | 512 | 1600 | 576 | – | 64 | 24 |
| Tiger(2)-192/160/128 | 192/160/128 | 192 | 512 | 64 | 64 | 24 |
| Whirlpool | 512 | 512 | 512 | 256 | 8 | 10 |