248

S. Das et al.

Table 1 Comparison study of various hash functions

Algorithm

Type of attacks

Complexity

Block size

Word size

Output size

Blake2b [33]

Prefix collision

2256

1024

64

512

Blake2s [33]

Prefix collision

2128

512

32

256

MD2 [34]

Preimage

2128

128

32

128

MD4 [35]

Preimage

2128

512

32

128

MD5 [36]

Preimage

2128

512

32

128

Panama [37]

Collision

2128

256

32

256

U-Quark [38]

Preimage

2128

8

128

D-Quark [38]

Preimage

2160

16

160

T-Quark [38]

Preimage

2224

32

224

RIPEMD-128 [39]

Collision

264

512

32

128

RIPEMD-160 [40]

Collision

280

512

32

160

RIPEMD-256 [40]

Collision

264

512

32

256

SHA-0 [41]

Collision

280

512

32

160

SHA-1 [42]

Preimage

2160

512

32

160

SHA-3 (Keccak) [43]

Preimage

2512

1600–2 * bits

64

Arbitrary hash length

SHA256 [44]

Preimage

2256

1088

64

256

SHA512 [44]

Preimage

2512

576

512

Spongent-88 [45]

Preimage

280

88

Spongent-128 [45]

Preimage

2120

128

Spongent-160 [45]

Preimage

2208

160