Difference between revisions of "Template:Cryptography hash"
Jump to navigation
Jump to search
Template documentation
imported>Sneftel (distinguish template from the broader category of hash functions) |
imported>Evgeny Kapun (Various changes and fixes) |
||
Line 3: | Line 3: | ||
| border = {{{border|{{{1|}}}}}} | | border = {{{border|{{{1|}}}}}} | ||
| state = {{{state|}}} | | state = {{{state|}}} | ||
− | | | + | | bodyclass = hlist |
| title = [[Cryptographic hash function]]s & [[message authentication code]]s | | title = [[Cryptographic hash function]]s & [[message authentication code]]s | ||
− | | above = [[Hash function security summary| | + | | above = |
+ | * [[List of hash functions|List]] | ||
+ | * [[Comparison of cryptographic hash functions|Comparison]] | ||
+ | * [[Hash function security summary|Known attacks]] | ||
| group1 = Common functions | | group1 = Common functions | ||
| list1 = | | list1 = | ||
− | *[[MD5]] | + | * [[MD5]] |
− | *[[SHA-1]] | + | * [[SHA-1]] |
− | *[[SHA-2]] | + | * [[SHA-2]] |
− | *[[SHA-3|SHA-3 | + | * [[SHA-3|SHA-3]] |
− | *[[BLAKE (hash function)#BLAKE2|BLAKE2]] | + | * [[BLAKE (hash function)#BLAKE2|BLAKE2]] |
| group2 = [[NIST hash function competition|SHA-3 finalists]] | | group2 = [[NIST hash function competition|SHA-3 finalists]] | ||
| list2 = | | list2 = | ||
− | *[[BLAKE (hash function)|BLAKE]] | + | * [[BLAKE (hash function)|BLAKE]] |
− | *[[Grøstl]] | + | * [[Grøstl]] |
− | *[[JH (hash function)|JH]] | + | * [[JH (hash function)|JH]] |
− | *[[Skein (hash function)|Skein]] | + | * [[Skein (hash function)|Skein]] |
− | *[[SHA-3|Keccak (winner)]] | + | * [[SHA-3|Keccak (winner)]] |
| group3 = Other functions | | group3 = Other functions | ||
| list3 = | | list3 = | ||
− | *[[Elliptic curve only hash|ECOH]] | + | * [[Elliptic curve only hash|ECOH]] |
− | *[[Fast Syndrome Based Hash|FSB]] | + | * [[Fast Syndrome Based Hash|FSB]] |
− | *[[GOST (hash function)|GOST]] | + | * [[GOST (hash function)|GOST]] |
− | *[[HAS-160]] | + | * [[HAS-160]] |
− | *[[HAVAL]] | + | * [[HAVAL]] |
− | *[[Kupyna]] | + | * [[Kupyna]] |
− | *[[LM hash]] | + | * [[LM hash]] |
− | *[[MD2 (cryptography)|MD2]] | + | * [[MD2 (cryptography)|MD2]] |
− | *[[MD4]] | + | * [[MD4]] |
− | *[[MD5]] | + | * [[MD5]] |
− | *[[MD6]] | + | * [[MD6]] |
− | *[[MDC-2]] | + | * [[MDC-2]] |
− | *[[N-Hash]] | + | * [[N-Hash]] |
− | *[[RIPEMD]] | + | * [[RIPEMD]] |
− | *[[RadioGatún]] | + | * [[RadioGatún]] |
− | *[[SWIFFT]] | + | * [[SWIFFT]] |
− | *[[SipHash]] | + | * [[SipHash]] |
− | *[[Snefru]] | + | * [[Snefru]] |
− | *[[Streebog]] | + | * [[Streebog]] |
− | *[[Tiger (cryptography)|Tiger]] | + | * [[Tiger (cryptography)|Tiger]] |
− | *[[Very smooth hash|VSH]] | + | * [[Very smooth hash|VSH]] |
− | *[[Whirlpool (cryptography)|WHIRLPOOL]] | + | * [[Whirlpool (cryptography)|WHIRLPOOL]] |
+ | | group4 = [[Key derivation function]]s | ||
+ | | list4 = | ||
+ | * [[bcrypt]] | ||
+ | * [[Crypt (C)|crypt]] | ||
+ | * [[PBKDF2]] | ||
+ | * [[scrypt]] | ||
+ | * [[Argon2]] | ||
+ | <!-- | ||
+ | * [[Catena]] | ||
+ | * [[Lyra2]] | ||
+ | * [[Makwa]] | ||
+ | * [[yescrypt]] | ||
+ | --> | ||
− | | | + | | group5 = [[Message authentication code|MAC functions]] |
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
| list5 = | | list5 = | ||
− | *[[ | + | * [[Data Authentication Algorithm|DAA]] |
− | *[[ | + | * [[CBC-MAC]] |
− | *[[ | + | * [[HMAC]] |
− | *[[ | + | * [[One-key MAC|OMAC]]/[[CMAC]] |
− | *[[ | + | * [[PMAC (cryptography)|PMAC]] |
− | *[[ | + | * [[VMAC]] |
+ | * [[UMAC]] | ||
+ | * [[Poly1305]] | ||
− | | group6 = | + | | group6 = [[Authenticated encryption|Authenticated<br/>encryption]] modes |
| list6 = | | list6 = | ||
− | *[[ | + | * [[CCM mode|CCM]] |
− | *[[ | + | * [[CWC mode|CWC]] |
− | *[[ | + | * [[EAX mode|EAX]] |
− | *[[ | + | * [[Galois/Counter Mode|GCM]] |
− | *[[ | + | * [[IAPM (mode)|IAPM]] |
− | *[[ | + | * [[OCB mode|OCB]] |
− | |||
− | | group7 = | + | | group7 = Attacks |
| list7 = | | list7 = | ||
− | *[[ | + | * [[Collision attack]] |
− | *[[ | + | * [[Preimage attack]] |
− | *[[ | + | * [[Birthday attack]] |
+ | * [[Brute force attack]] | ||
+ | * [[Rainbow table]] | ||
+ | * [[Side-channel attack]] | ||
+ | * [[Length extension attack]] | ||
− | | group8 = | + | | group8 = Design |
| list8 = | | list8 = | ||
− | *[[ | + | * [[Avalanche effect]] |
− | *[[ | + | * [[Collision (computer science)|Hash collision]] |
− | *[[ | + | * [[Merkle–Damgård construction]] |
− | | group9 = | + | | group9 = Standardization |
− | | list9 = | + | | list9 = |
− | *[[ | + | * [[CRYPTREC]] |
− | *[[ | + | * [[NESSIE]] |
− | *[[ | + | * [[NIST hash function competition]] |
− | | group10 = | + | | group10 = Utilization |
| list10 = | | list10 = | ||
− | *[[ | + | * [[Post-quantum cryptography#Hash-based cryptography|Hash-based cryptography]] |
− | *[[ | + | * [[Key stretching]] |
− | *[[ | + | * [[Merkle tree]] |
− | *[[ | + | * [[Message authentication]] |
− | *[[ | + | * [[Proof-of-work system|Proof of work]] |
− | + | * [[Salt (cryptography)|Salt]] | |
− | |||
− | *[[ | ||
− | |||
− | |||
− | |||
}}<noinclude>{{Documentation|content= | }}<noinclude>{{Documentation|content= |
Revision as of 02:29, 27 November 2016

This template is a "specialised cryptography navigation box". It should not be added directly to an article. Instead it should be used within the main cryptography navigation box.
To use this template together with the main cryptography navigation box add this code to the bottom of an article:
{{cryptography navbox|hash}}
For more details about these navigation boxes please see the instructions at the main cryptography navigation box and at the WikiProject Cryptography.
Editors can experiment in this template's sandbox (create | mirror) and testcases (create) pages. Subpages of this template. |