Search results
Results From The WOW.Com Content Network
SipHash computes a 64-bit message authentication code from a variable-length message and 128-bit secret key. It was designed to be efficient even for short inputs, with performance comparable to non-cryptographic hash functions, such as CityHash; [4]: 496 [2] this can be used to prevent denial-of-service attacks against hash tables ("hash flooding"), [5] or to authenticate network packets.
SipHash: 32, 64 or 128 bits non-collision-resistant PRF: HighwayHash [16] 64, 128 or 256 bits non-collision-resistant PRF: UMAC: VMAC: Unkeyed cryptographic hash ...
Non-cryptographic hash functions optimized for software frequently involve the multiplication operation. Since in-hardware multiplication is resource-intensive and frequency-limiting, ASIC-friendlier designs had been proposed, including SipHash (which has an additional benefit of being able to use a secret key for message authentication), NSGAhash, and XORhash.
Intrinsically keyed hash algorithms such as SipHash are also by definition MACs; they can be even faster than universal-hashing based MACs. [9] Additionally, the MAC algorithm can deliberately combine two or more cryptographic primitives, so as to maintain protection even if one of them is later found to be vulnerable.
Fowler–Noll–Vo (or FNV) is a non-cryptographic hash function created by Glenn Fowler, Landon Curt Noll, and Kiem-Phong Vo.. The basis of the FNV hash algorithm was taken from an idea sent as reviewer comments to the IEEE POSIX P1003.2 committee by Glenn Fowler and Phong Vo in 1991.
MurmurHash is a non-cryptographic hash function suitable for general hash-based lookup. [1] [2] [3] It was created by Austin Appleby in 2008 [4] and, as of 8 January 2016, [5] is hosted on GitHub along with its test suite named SMHasher.
The following tables compare general and technical information for a number of cryptographic hash functions. See the individual functions' articles for further information.
BLAKE was submitted to the NIST hash function competition by Jean-Philippe Aumasson, Luca Henzen, Willi Meier, and Raphael C.-W. Phan. In 2008, there were 51 entries. BLAKE made it to the final round consisting of five candidates but lost to Keccak in 2012, which was selected for the SHA-3 algorithm.