The document compares different hashing algorithms including MD-5, SHA-0, SHA-1, SHA-2 and SHA-3. It provides information on output size, internal state size, block size, number of rounds, and estimated security level in bits for each algorithm.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0 ratings0% found this document useful (0 votes)
18 views1 page
Algorithm and Variants
The document compares different hashing algorithms including MD-5, SHA-0, SHA-1, SHA-2 and SHA-3. It provides information on output size, internal state size, block size, number of rounds, and estimated security level in bits for each algorithm.