Movatterモバイル変換


[0]ホーム

URL:


Jump to content
WikipediaThe Free Encyclopedia
Search

HAVAL

From Wikipedia, the free encyclopedia
Cryptographic hash function

HAVAL is acryptographic hash function. UnlikeMD5, but like most modern cryptographic hash functions, HAVAL can produce hashes of different lengths – 128 bits, 160 bits, 192 bits, 224 bits, and 256 bits. HAVAL also allows users to specify the number of rounds (3, 4, or 5) to be used to generate the hash. HAVAL was broken in 2004.[1]

HAVAL was invented byYuliang Zheng,Josef Pieprzyk, andJennifer Seberry in 1992.

HAVAL hashes

[edit]

The HAVAL hashes (also termedfingerprints) are typically represented as 32-, 40-, 48-, 56- or 64-digithexadecimal numbers. The following demonstrates a 43-byteASCII input and the corresponding HAVAL hash (256 bits, 5 passes):

HAVAL("The quick brown fox jumps over the lazydog", 256, 5) =b89c551cdfe2e06dbd4cea2be1bc7d557416c58ebb4d07cbc94e49f710c55be4

Even a small change in the message will (with overwhelming probability) result in a completely different hash, e.g. changing the letterd to ac produces the following hash value:

HAVAL("The quick brown fox jumps over the lazycog", 256, 5) =60983bb8c8f49ad3bea29899b78cd741f4c96e911bbc272e5550a4f195a4077e

The hash of a zero-length string is:

HAVAL("", 256, 5) =be417bb4dd5cfb76c7126f4f8eeb1553a449039307b1a3cd451dbfdc0fbbe330

Security

[edit]

Research has uncovered weaknesses which make further use of HAVAL (at least the variant with 128 bits and 3 passes with 26 operations) questionable. On 17 August 2004,collisions for HAVAL (128 bits, 3 passes) were announced byXiaoyun Wang, Dengguo Feng,Xuejia Lai, and Hongbo Yu.[2]

See also

[edit]

References

[edit]
  1. ^"Lifetimes of cryptographic hash functions".
  2. ^Collisions for Hash Functions MD4, MD5, HAVAL-128 and RIPEMD

External links

[edit]
  • HAVAL (the official HAVAL page with the research paper on HAVAL, the latest C source code and HAVAL OIDs)
Common functions
SHA-3 finalists
Other functions
Password hashing/
key stretching functions
General purpose
key derivation functions
MAC functions
Authenticated
encryption
modes
Attacks
Design
Standardization
Utilization
General
Mathematics
Stub icon

This cryptography-related article is astub. You can help Wikipedia byadding missing information.

Retrieved from "https://en.wikipedia.org/w/index.php?title=HAVAL&oldid=1084905839"
Categories:
Hidden categories:

[8]ページ先頭

©2009-2026 Movatter.jp