Difference between revisions of "Template:Cryptography hash"

From blackwiki
Jump to navigation Jump to search
imported>Sneftel
(distinguish template from the broader category of hash functions)
imported>Evgeny Kapun
(Various changes and fixes)
Line 3: Line 3:
 
| border    = {{{border|{{{1|}}}}}}
 
| border    = {{{border|{{{1|}}}}}}
 
| state    = {{{state|}}}
 
| state    = {{{state|}}}
| listclass = hlist
+
| bodyclass = hlist
  
 
| title = [[Cryptographic hash function]]s & [[message authentication code]]s
 
| title = [[Cryptographic hash function]]s & [[message authentication code]]s
  
| above = [[Hash function security summary|Security summary]]
+
| above =
 +
* [[List of hash functions|List]]
 +
* [[Comparison of cryptographic hash functions|Comparison]]
 +
* [[Hash function security summary|Known attacks]]
  
 
| group1 = Common functions
 
| group1 = Common functions
 
| list1  =  
 
| list1  =  
*[[MD5]]
+
* [[MD5]]
*[[SHA-1]]
+
* [[SHA-1]]
*[[SHA-2]]
+
* [[SHA-2]]
*[[SHA-3|SHA-3/Keccak]]
+
* [[SHA-3|SHA-3]]
*[[BLAKE (hash function)#BLAKE2|BLAKE2]]
+
* [[BLAKE (hash function)#BLAKE2|BLAKE2]]
  
 
| group2 = [[NIST hash function competition|SHA-3 finalists]]
 
| group2 = [[NIST hash function competition|SHA-3 finalists]]
 
| list2  =  
 
| list2  =  
*[[BLAKE (hash function)|BLAKE]]
+
* [[BLAKE (hash function)|BLAKE]]
*[[Grøstl]]
+
* [[Grøstl]]
*[[JH (hash function)|JH]]
+
* [[JH (hash function)|JH]]
*[[Skein (hash function)|Skein]]
+
* [[Skein (hash function)|Skein]]
*[[SHA-3|Keccak (winner)]]
+
* [[SHA-3|Keccak (winner)]]
  
 
| group3 = Other functions
 
| group3 = Other functions
 
| list3  =  
 
| list3  =  
*[[Elliptic curve only hash|ECOH]]
+
* [[Elliptic curve only hash|ECOH]]
*[[Fast Syndrome Based Hash|FSB]]
+
* [[Fast Syndrome Based Hash|FSB]]
*[[GOST (hash function)|GOST]]
+
* [[GOST (hash function)|GOST]]
*[[HAS-160]]
+
* [[HAS-160]]
*[[HAVAL]]
+
* [[HAVAL]]
*[[Kupyna]]
+
* [[Kupyna]]
*[[LM hash]]
+
* [[LM hash]]
*[[MD2 (cryptography)|MD2]]
+
* [[MD2 (cryptography)|MD2]]
*[[MD4]]
+
* [[MD4]]
*[[MD5]]
+
* [[MD5]]
*[[MD6]]
+
* [[MD6]]
*[[MDC-2]]
+
* [[MDC-2]]
*[[N-Hash]]
+
* [[N-Hash]]
*[[RIPEMD]]
+
* [[RIPEMD]]
*[[RadioGatún]]
+
* [[RadioGatún]]
*[[SWIFFT]]
+
* [[SWIFFT]]
*[[SipHash]]
+
* [[SipHash]]
*[[Snefru]]
+
* [[Snefru]]
*[[Streebog]]
+
* [[Streebog]]
*[[Tiger (cryptography)|Tiger]]
+
* [[Tiger (cryptography)|Tiger]]
*[[Very smooth hash|VSH]]
+
* [[Very smooth hash|VSH]]
*[[Whirlpool (cryptography)|WHIRLPOOL]]
+
* [[Whirlpool (cryptography)|WHIRLPOOL]]
  
 +
| group4 = [[Key derivation function]]s
 +
| list4 =
 +
* [[bcrypt]]
 +
* [[Crypt (C)|crypt]]
 +
* [[PBKDF2]]
 +
* [[scrypt]]
 +
* [[Argon2]]
 +
<!--
 +
* [[Catena]]
 +
* [[Lyra2]]
 +
* [[Makwa]]
 +
* [[yescrypt]]
 +
-->
  
| group4 = MAC algorithms
+
| group5 = [[Message authentication code|MAC functions]]
| list4  =  
 
*[[Data Authentication Algorithm|DAA]]
 
*[[CBC-MAC]]
 
*[[HMAC]]
 
*[[One-key MAC|OMAC]]/[[CMAC]]
 
*[[PMAC (cryptography)|PMAC]]
 
*[[VMAC]]
 
*[[UMAC]]
 
*[[Poly1305]]
 
 
 
| group5 = [[Authenticated encryption|Authenticated<br/>encryption]] modes
 
 
| list5  =  
 
| list5  =  
*[[CCM mode|CCM]]
+
* [[Data Authentication Algorithm|DAA]]
*[[CWC mode|CWC]]
+
* [[CBC-MAC]]
*[[EAX mode|EAX]]
+
* [[HMAC]]
*[[Galois/Counter Mode|GCM]]
+
* [[One-key MAC|OMAC]]/[[CMAC]]
*[[IAPM (mode)|IAPM]]
+
* [[PMAC (cryptography)|PMAC]]
*[[OCB mode|OCB]]
+
* [[VMAC]]
 +
* [[UMAC]]
 +
* [[Poly1305]]
  
| group6 = Attacks
+
| group6 = [[Authenticated encryption|Authenticated<br/>encryption]] modes
 
| list6  =  
 
| list6  =  
*[[Collision attack]]
+
* [[CCM mode|CCM]]
*[[Preimage attack]]
+
* [[CWC mode|CWC]]
*[[Birthday attack]]
+
* [[EAX mode|EAX]]
*[[Brute force attack]]
+
* [[Galois/Counter Mode|GCM]]
*[[Rainbow table]]
+
* [[IAPM (mode)|IAPM]]
*[[Side-channel attack]]
+
* [[OCB mode|OCB]]
*[[Length extension attack]]
 
  
| group7 = Design
+
| group7 = Attacks
 
| list7  =  
 
| list7  =  
*[[Avalanche effect]]
+
* [[Collision attack]]
*[[Collision (computer science)|Hash collision]]
+
* [[Preimage attack]]
*[[Merkle–Damgård construction]]
+
* [[Birthday attack]]
 +
* [[Brute force attack]]
 +
* [[Rainbow table]]
 +
* [[Side-channel attack]]
 +
* [[Length extension attack]]
  
| group8 = Standardization
+
| group8 = Design
 
| list8  =  
 
| list8  =  
*[[CRYPTREC]]
+
* [[Avalanche effect]]
*[[NESSIE]]
+
* [[Collision (computer science)|Hash collision]]
*[[NIST hash function competition]]
+
* [[Merkle–Damgård construction]]
  
| group9 = Utilization
+
| group9 = Standardization
| list9 =
+
| list9 =  
*[[Salt (cryptography)|Salt]]
+
* [[CRYPTREC]]
*[[Key stretching]]
+
* [[NESSIE]]
*[[Message authentication]]
+
* [[NIST hash function competition]]
  
| group10 = [[Key derivation function]]s
+
| group10 = Utilization
 
| list10 =
 
| list10 =
*[[bcrypt]]
+
* [[Post-quantum cryptography#Hash-based cryptography|Hash-based cryptography]]
*[[Crypt (C)|crypt(3)]] (DES)
+
* [[Key stretching]]
*[[PBKDF2]]
+
* [[Merkle tree]]
*[[scrypt]]
+
* [[Message authentication]]
*[[Argon2]]
+
* [[Proof-of-work system|Proof of work]]
<!--
+
* [[Salt (cryptography)|Salt]]
*[[Catena]]
 
*[[Lyra2]]
 
*[[Makwa]]
 
*[[yescrypt]]
 
-->
 
  
 
}}<noinclude>{{Documentation|content=
 
}}<noinclude>{{Documentation|content=

Revision as of 02:29, 27 November 2016

Template documentation

The hashes, MACs and authenticated encryption navigation box

This template is a "specialised cryptography navigation box". It should not be added directly to an article. Instead it should be used within the main cryptography navigation box.

To use this template together with the main cryptography navigation box add this code to the bottom of an article:

{{cryptography navbox|hash}}

For more details about these navigation boxes please see the instructions at the main cryptography navigation box and at the WikiProject Cryptography.