Research the different hash algorithms (Message Digest, Secure Hash Algorithm, Whirlpool, and RIPEMD) and then create a table that compares them. Include the size of the hash, the number of rounds needed to create the hash, block size, who created it, from which previous hash it was derived, its strengths, and its weaknesses.
Hash algorithms or hash functions is a mathemtical function that converts one value (numeric) into another compressed value. The different types of cryptographics hash algorithms - Message Digest, Secure Hash Algorithm, Whirlpool, and RIPEMD are some of the more commonly used ones.
Function | Output size(Length of the output value in bytes) | Number of Rounds required | Block Size | Created By | |
Message Digest (MD5) | 128 | 64 | 256 | Ronald Rivest | |
Secure Hash (SHA) | 512 | 24 | 576 | National Security Agency( NSA) | |
RIPEMD | 320 | 80 | 512 | Hans Dobbertin Antoon Bosselaers |
|
Whirlpool | 512 | 10 | 512 | Vincent Rijmen Paulo Barreto |
|
Get Answers For Free
Most questions answered within 1 hours.