248
S. Das et al.
Table 1 Comparison study of various hash functions
Algorithm
Type of attacks
Complexity
Block size
Word size
Output size
Blake2b [33]
Prefix collision
2256
1024
64
512
Blake2s [33]
Prefix collision
2128
512
32
256
MD2 [34]
Preimage
2128
128
32
128
MD4 [35]
Preimage
2128
512
32
128
MD5 [36]
Preimage
2128
512
32
128
Panama [37]
Collision
2128
256
32
256
U-Quark [38]
Preimage
2128
8
–
128
D-Quark [38]
Preimage
2160
16
–
160
T-Quark [38]
Preimage
2224
32
–
224
RIPEMD-128 [39]
Collision
264
512
32
128
RIPEMD-160 [40]
Collision
280
512
32
160
RIPEMD-256 [40]
Collision
264
512
32
256
SHA-0 [41]
Collision
280
512
32
160
SHA-1 [42]
Preimage
2160
512
32
160
SHA-3 (Keccak) [43]
Preimage
2512
1600–2 * bits
64
Arbitrary hash length
SHA256 [44]
Preimage
2256
1088
64
256
SHA512 [44]
Preimage
2512
576
–
512
Spongent-88 [45]
Preimage
280
–
–
88
Spongent-128 [45]
Preimage
2120
–
–
128
Spongent-160 [45]
Preimage
2208
–
–
160