| Computer Security lecture notes | Copyright © 2004 Mark Dermot Ryan The University of Birmingham Permission is granted to copy, distribute and/or modify this document (except where stated) under the terms of the GNU Free Documentation License, |
| (N-1)/N * (N-2)/N * . . . *
(N-n+1)/N |
= |
(1-(1/N)) * (1-(2/N)) * . . . *
(1-((n-1)/N) |
| < |
e-1/N * e-2/N
* . . . * e-(n-1)/N |
|
| = |
e-n(n-1)/2N |
| SHA-1 |
SHA-256 |
SHA-384 |
SHA-512 |
|
| Message digest size |
160 |
256 |
384 |
512 |
| Message size |
<2^64 |
<2^64 |
<2^128 |
<2^128 |
| Block size |
512 |
512 |
1024 |
1024 |
| Word size |
32 |
32 |
64 |
64 |
| Number of steps |
80 |
80 |
80 |
80 |