TIGER192,3 Hash Tool
Other Hash Generator
MD2 MD4 MD5 SHA1 SHA224 SHA256 SHA384 SHA512/224 SHA512/256 SHA512 SHA3-224 SHA3-256 SHA3-384 SHA3-512 RIPEMD128 RIPEMD160 RIPEMD256 RIPEMD320 WHIRLPOOL TIGER128,3 TIGER160,3 TIGER192,3 TIGER128,4 TIGER160,4 TIGER192,4 SNEFRU SNEFRU256 GOST GOST-CRYPTO ADLER32 CRC32 CRC32B CRC32C FNV132 FNV1A32 FNV164 FNV1A64 JOAAT MURMUR3A MURMUR3C MURMUR3F XXH32 XXH64 XXH3 XXH128 HAVAL128,3 HAVAL160,3 HAVAL192,3 HAVAL224,3 HAVAL256,3 HAVAL128,4 HAVAL160,4 HAVAL192,4 HAVAL224,4 HAVAL256,4 HAVAL128,5 HAVAL160,5 HAVAL192,5 HAVAL224,5 HAVAL256,5Input Processing
The input data is first divided into blocks of 512 bits. If the input length is not a multiple of 512 bits, padding is applied using a standardized scheme that appends a single '1' bit, followed by enough '0' bits, and finally a 64-bit representation of the original input length. This ensures that the last block is always complete and suitable for processing.
Internal Structure
The core of tiger192,3 is a compression function that operates on three 64-bit state variables, denoted as a, b, and c. Each block of input data is processed through a series of rounds, which consist of substitution, modular addition, and bitwise operations. Precomputed S-boxes are used for substitution steps, providing nonlinearity and diffusion across the state variables. Each pass over the data applies a distinct sequence of operations to increase the resistance against differential and linear cryptanalysis.
Round Functions
Within each pass, 8 rounds are executed per 64-bit word of the block. Each round performs a combination of XOR, AND, OR, and addition operations on the state variables, incorporating the corresponding S-box outputs. After completing the rounds for a block, the intermediate state is mixed with the original state using modular addition, producing a new state that is carried forward to the next block. The three-pass structure ensures that each bit of the output is influenced by all bits of the input.
Output Generation
After processing all input blocks, the final state variables a, b, and c are concatenated to form the 192-bit digest. This digest serves as the cryptographic hash of the input, offering strong collision resistance and preimage resistance. The algorithm’s design emphasizes efficiency on 64-bit architectures, making it suitable for digital signatures, checksums, and cryptographic applications where speed and security are both required.
Security Characteristics
tiger192,3 provides a high level of security due to its three-pass structure and complex mixing functions. The use of large S-boxes ensures nonlinearity, while the multiple passes increase diffusion, minimizing the likelihood of collisions. Its 192-bit output size offers a wide security margin against brute-force attacks, and the algorithm is resilient against standard cryptanalysis methods, including birthday attacks and differential attacks. Performance evaluations demonstrate that tiger192,3 achieves rapid hashing speeds without compromising security on modern processors.