SipHash24
E845070
SipHash24 is a fast, cryptographically secure keyed hash function designed to protect hash tables from collision attacks while remaining efficient for short inputs.
Observed surface forms (1)
| Surface form | Occurrences |
|---|---|
| SipHash-2-4 | 0 |
Statements (44)
| Predicate | Object |
|---|---|
| instanceOf |
keyed hash function
ⓘ
message authentication code ⓘ |
| alsoKnownAs | SipHash24 NERFINISHED ⓘ |
| basedOn | 64-bit ARX mixing function ⓘ |
| blockStructure | 64-bit word-based ARX construction ⓘ |
| category | ARX cipher-based hash ⓘ |
| collisionResistance | intended to be strong for adversaries without the key ⓘ |
| designedBy |
Daniel J. Bernstein
NERFINISHED
ⓘ
Jean-Philippe Aumasson NERFINISHED ⓘ |
| designedToBe |
fast on 64-bit CPUs
ⓘ
resistant to hash-flooding attacks ⓘ |
| designProperty |
constant-time with respect to key and message contents
ⓘ
simple and compact reference implementation ⓘ |
| domain |
computer security
ⓘ
cryptography ⓘ |
| hasVariant |
SipHash-1-3
NERFINISHED
ⓘ
SipHash-4-8 NERFINISHED ⓘ |
| inputType | arbitrary-length byte strings ⓘ |
| introducedIn | 2012 ⓘ |
| keySize | 128 bits ⓘ |
| languageBindings |
C implementations
ⓘ
implementations in multiple programming languages ⓘ |
| notDesignedFor |
general-purpose unkeyed hashing
ⓘ
long-message high-throughput MAC compared to specialized MACs ⓘ |
| optimizedFor |
hash table key hashing
ⓘ
short messages ⓘ |
| outputSize | 64 bits ⓘ |
| paddingMethod | length-encoding and final block padding ⓘ |
| partOfFamily | SipHash NERFINISHED ⓘ |
| prfProperty | designed to behave like a pseudorandom function ⓘ |
| referenceImplementationLanguage | C NERFINISHED ⓘ |
| requires | secret key shared between parties ⓘ |
| resists | hash collision denial-of-service attacks ⓘ |
| roundStructure | 2 compression rounds and 4 finalization rounds ⓘ |
| securityGoal |
PRF security with a secret key
ⓘ
protection of hash tables against collision attacks ⓘ |
| specifiedIn | SipHash: a fast short-input PRF paper NERFINISHED ⓘ |
| status | widely deployed in software hash tables ⓘ |
| typicalUseCase | hashing small keys such as strings or integers ⓘ |
| usedFor | hashing dictionary keys ⓘ |
| usedIn | hash table implementations ⓘ |
| usesOperation |
addition modulo 2^64
ⓘ
bit rotation ⓘ bitwise XOR ⓘ |
Referenced by (1)
Full triples — surface form annotated when it differs from this entity's canonical label.
subject surface form:
WireGuard