Template talk:Cryptography hash

Latest comment: 4 years ago by NotSc00bz in topic Key derivation functions

Separate line edit

Seems like notable SHA-3 candidates should be on a separate line from non-SHA-3 hashes. They're notable for different reasons from the old hash functions, and they're currently new and unanalyzed.

  • Existing hash functions: MD2/4/5, SHA-0/1/2, RIPEMD, LM hash, etc.
  • Notable SHA-3 candidates: Skein, MD6, CubeHash, etc. (Not every SHA-3 candidate is notable -- some have already been broken, for instance.)

For what it's worth. (Unsigned by IP 75.24.109.96 on 2 December 2008)

SipHash edit

Where would SipHash fit in this table? I would say under MAC functions, but I am not an expert on the subject. --Yxejamir (talk) 13:58, 19 January 2017 (UTC)Reply

Do we have a reliable source claiming that BLAKE2 is a “common” hash function edit

For a while now, BLAKE2 has been listed as a “common” hash function. Do we have a reliable source which supports the assertion that Blake2 is, indeed, a commonly used hash?

The sense I get is that the most commonly used hash these days is SHA256 (SHA-2-256, if you will), since SHA-1 and MD5 (the previously two commonly used hashes) were broken. Samboy (talk) 10:24, 1 October 2018 (UTC)Reply

Poking around, BLAKE2 (as b2sum) is one of the hashes included with the GNU Core Utilities (While SHA-3, as I type this, isn’t; the list is currently wc, sum, cksum, MD5, SHA1, SHA-2, and BLAKE2). Considering how little coverage cryptographic hashes get in the mainstream press, this counts for something. Samboy (talk) 02:49, 2 October 2018 (UTC)Reply

What NMAC here? Make a page for it first edit

If we’re going to have NMAC on this list, I would like to see a Wikipedia article about NMAC (or even just a section in HMAC describing what an NMAC is) written first. Samboy (talk) 15:21, 6 October 2018 (UTC)Reply

Key derivation functions edit

This section only talks about password KDFs and password hashing functions (bcrypt and crypt). These should all be moved to a new section called "Key stretching functions" and HKDF should be added to "Key derivation functions". Catena, Makwa, and yescrypt are just redirects to Password Hashing Competition and should be removed from the template. Lyra2 is a low quality page and should probably be removed from the template. NotSc00bz (talk) 23:52, 2 January 2020 (UTC)Reply

The KDF section should be named:
"Password hashing/
key stretching functions", move LM hash into it, and remove key stretching from utilization section since it has its own section now. Then add a new KDF section with just HKDF. I'll make this changes in a week if no one disagrees. We should still think about removing Catena, Makwa, yescrypt, and Lyra2 for being just redirects to Password Hashing Competition or having a low quality page. NotSc00bz (talk) 04:19, 4 January 2020 (UTC)Reply