answersLogoWhite

0

Which common hash algorithm is a 160 bit hash value?

Updated: 8/18/2019
User Avatar

Wiki User

12y ago

Best Answer

Both SHA-1 and SHA-0 use a 160-bit hash value. Note that "SHA-0" is a retronym for the original SHA hash algorithm. SHA-1 corrected some significant flaws in the original algorithm that yielded some serious security weakness.

The TIGER hash algorithm is designed to use a 192-bit hash, but also has the capability to use 160-bit and 128-bit hash values.

The HAVAL algorithm can produce hashes in lengths of 128 bits, 160 bits, 192 bits, 224 bits, and 256 bits.

One version of the RIPEMD algorithm, RIPEMD-160, has a 160-bit hash. Other versions of RIPEMD, RIPEMD-128, RIPEMD-256, and RIPEMD-320, use 128, 256, and 320-bit hashes respectively.

Of these, the most common is probably SHA-1, which is available on most Windows based machines.

User Avatar

Wiki User

12y ago
This answer is:
User Avatar
More answers
User Avatar

Wiki User

12y ago

Some well-known hash algorithms with a 160-bit output:

  • RIPEMMD-160
  • SHA-0/SHA-1
  • Tiger-160
Of these, SHA is probably the one the most people are familar with.
This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: Which common hash algorithm is a 160 bit hash value?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Related questions

Which hash algorithm is a 160 bit hash value?

Some well-known hash algorithms with a 160-bit output:RIPEMMD-160SHA-0/SHA-1Tiger-160


What hash algorithm uses 160 bits?

SHA-0A retronym applied to the original version of the 160-bit hash function published in 1993 under the name "SHA". It was withdrawn shortly after publication due to an undisclosed "significant flaw" and replaced by the slightly revised version SHA-1.SHA-1 A 160-bit hash function which resembles the earlier MD5 algorithm. This was designed by the National Security Agency (NSA) to be part of the Digital Signature Algorithm.RIPEMMD-160Race Integrity Primitives Evaluation Message Digest is a 160-bit message digest hash algorithm developed in Belgium by Dobbertin, Bosselaers, and Preneel at the COSIC research group at the Katholieke Univeriteit Leuven, and first published in 1996. It is an improved version of RIPEMD, which in turn was based upon the design principles used in MD4, and is similar in performance to the more popular SHA-1.Tiger-160Tiger is a hash function designed by Anderson and Biham in 1995 for efficiency on 64-bit platforms. The size of a Tiger hash value is 192 bits. Truncated versions (known as Tiger/128 and Tiger/160) can be used for compatibility with protocols assuming a particular hash size.


What is md5 protocol?

MD5 (like SHA-1 or CRC32) is a common message-digest algorithm for data integrity. MD5 is widely used as a cryptographic hash function producing a 128-bit (16-byte) hash value or checksum, typically expressed in text format as a 32 digit hexadecimal number (e.g. 90506d869e65e896d5a8474b00097610). This essentially is a way to digitally sign a block of text or media to prevent tampering or modification. A receiver can calculate the md5 hash value independently to verify the contents match the expected hash value. If a different hash value is computed then the content has been changed from the original. The newer SHA-1, SHA-256, and SHA-512 algorithms respectively generate a 160-bit, 256-bit, and 512-bit hash value for greater security.


What data type is suitable for password field?

We never store passwords in a password field. If we did that, anyone with access to the database would have access to all the passwords. Instead, we store the output from a one-way cryptographic hashing function. That is, when a user creates a password, we store the hash value generated from that password via the hashing function. When the user subsequently enters their password in order to log on, the hash value generated by the entered password is compared with the stored hash value. If the two hash values match exactly then the correct password was entered. Being one-way, it is not possible to determine the password from the hash value, even if we know the precise implementation details of the hash function employed to create the hash value. This is the safest way to store passwords; we simply need to ensure that the same hash function that was used to generate the hash is also used to validate the user's password at logon. Cryptographic hashes can vary in length depending on which function was used to generate the hash value. Typical values are 128-bit, 160-bit, 256-bit and 512-bit, thus a fixed-length binary field of the required length would be suitable for storing the hash values.


What is the GCF of 160 and 105?

Using Euclid's algorithm, it's the same as the gcf of 105 and 55 (where 55 is the remainder of the division of 160 by 105).


What is the least common multiple of 160 and 80?

Least Common Multiple (LCM) for 160 80 is 160


What is the least common multiple of 160 and 32?

The LCM of 32 and 160 is 160. Since 32 is a factor of 160, the LCM of 32 and 160 is automatically 160.


What are the common factors of 160 and 365?

The common factors of 160 and 365 are: 1 and 5


What is the greatest common factor of 22 and 160?

The greatest common factor of 22 and 160 is 2.


What is the lowest common multiple of 112 and 160?

The lowest common multiple of 112 and 160 is 1120.


What is the greatest common factor of 160 240?

The greatest common factor of 160 and 240 is 80.


What is the greatest common factor of 160 and 216?

The Greatest Common Factor of 160 and 216 is 8.