Template talk:Cryptography hash

From Wikipedia, the free encyclopedia
Jump to navigation Jump to search

Separate line[edit]

Seems like notable SHA-3 candidates should be on a separate line from non-SHA-3 hashes. They're notable for different reasons from the old hash functions, and they're currently new and unanalyzed.

  • Existing hash functions: MD2/4/5, SHA-0/1/2, RIPEMD, LM hash, etc.
  • Notable SHA-3 candidates: Skein, MD6, CubeHash, etc. (Not every SHA-3 candidate is notable -- some have already been broken, for instance.)

For what it's worth. (Unsigned by IP on 2 December 2008)


Where would SipHash fit in this table? I would say under MAC functions, but I am not an expert on the subject. --Yxejamir (talk) 13:58, 19 January 2017 (UTC)

Do we have a reliable source claiming that BLAKE2 is a “common” hash function[edit]

For a while now, BLAKE2 has been listed as a “common” hash function. Do we have a reliable source which supports the assertion that Blake2 is, indeed, a commonly used hash?

The sense I get is that the most commonly used hash these days is SHA256 (SHA-2-256, if you will), since SHA-1 and MD5 (the previously two commonly used hashes) were broken. Samboy (talk) 10:24, 1 October 2018 (UTC)

Poking around, BLAKE2 (as b2sum) is one of the hashes included with the GNU Core Utilities (While SHA-3, as I type this, isn’t; the list is currently wc, sum, cksum, MD5, SHA1, SHA-2, and BLAKE2). Considering how little coverage cryptographic hashes get in the mainstream press, this counts for something. Samboy (talk) 02:49, 2 October 2018 (UTC)

What NMAC here? Make a page for it first[edit]

If we’re going to have NMAC on this list, I would like to see a Wikipedia article about NMAC (or even just a section in HMAC describing what an NMAC is) written first. Samboy (talk) 15:21, 6 October 2018 (UTC)