RIPEMD

Cryptographic hash function


title: "RIPEMD" type: doc version: 1 created: 2026-02-28 author: "Wikipedia contributors" status: active scope: public tags: ["cryptographic-hash-functions"] description: "Cryptographic hash function" topic_path: "technology/cryptography" source: "https://en.wikipedia.org/wiki/RIPEMD" license: "CC BY-SA 4.0" wikipedia_page_id: 0 wikipedia_revision_id: 0

::summary Cryptographic hash function ::

::data[format=table title="Infobox cryptographic hash function"]

FieldValue
nameRIPEMD
designersHans Dobbertin, Antoon Bosselaers and Bart Preneel
publish date1992
certificationRIPEMD-160: CRYPTREC (Monitored)
digest size128, 160, 256, 320 bits
::

| name = RIPEMD | image = | caption = | designers = Hans Dobbertin, Antoon Bosselaers and Bart Preneel | publish date = 1992 | series = | derived from = | derived to = | related to = | certification = RIPEMD-160: CRYPTREC (Monitored) | digest size = 128, 160, 256, 320 bits | structure = | rounds = | cryptanalysis =

::figure[src="https://upload.wikimedia.org/wikipedia/commons/7/77/RIPEMD_160_2.png" caption="A sub-block from the compression function of the RIPEMD-160 hash algorithm"] ::

RIPEMD (RIPE Message Digest) is a family of cryptographic hash functions developed in 1992 (the original RIPEMD) and 1996 (other variants). There are five functions in the family: RIPEMD, RIPEMD-128, RIPEMD-160, RIPEMD-256, and RIPEMD-320, of which RIPEMD-160 is the most common.

The original RIPEMD, as well as RIPEMD-128, is not considered secure because 128-bit result is too small and also (for the original RIPEMD) because of design weaknesses. The 256- and 320-bit versions of RIPEMD provide the same level of security as RIPEMD-128 and RIPEMD-160, respectively; they are designed for applications where the security level is sufficient, but a longer hash result is necessary.

While RIPEMD functions are less popular than SHA-1 and SHA-2, they are used, among others, in Bitcoin and other cryptocurrencies based on Bitcoin.

History

The original RIPEMD function was designed in the framework of the EU project RIPE (RACE Integrity Primitives Evaluation) in 1992. Its design was based on the MD4 hash function. In 1996, in response to security weaknesses found in the original RIPEMD, Hans Dobbertin, Antoon Bosselaers and Bart Preneel at the COSIC research group at the Katholieke Universiteit Leuven in Leuven, Belgium published four strengthened variants: RIPEMD-128, RIPEMD-160, RIPEMD-256, and RIPEMD-320.

In August 2004, a collision was reported for the original RIPEMD. This does not apply to RIPEMD-160.

In 2019, the best collision attack for RIPEMD-160 could reach 34 rounds out of 80 rounds, which was published at CRYPTO 2019.

In February 2023, a collision attack for RIPEMD-160 was published at EUROCRYPT 2023, which could reach 36 rounds out of 80 rounds with time complexity of 264.5.

In December 2023, an improved collision attack was found based on the technique from the previous best collision attack, this improved collision attack could reach 40 rounds out of 80 round with a theoretical time complexity of 249.9.

RIPEMD-160 hashes

The 160-bit RIPEMD-160 hashes (also termed RIPE message digests) are typically represented as 40-digit hexadecimal numbers. The following demonstrates a 43-byte ASCII input and the corresponding RIPEMD-160 hash:

RIPEMD-160("The quick brown fox jumps over the lazy og") = 37f332f68db77bd9d7edd4969571ad671cf9dd3b

RIPEMD-160 behaves with the desired avalanche effect of cryptographic hash functions (small changes, e.g. changing to , result in a completely different hash):

RIPEMD-160("The quick brown fox jumps over the lazy og") = 132072df690933835eb8b6ad0b77e7b6f14acad7

The hash of a zero-length string is:

RIPEMD-160("") = 9c1185a5c5e9fc54612808977ee8f548b2258d31

Implementations

Below is a list of cryptography libraries that support RIPEMD (specifically RIPEMD-160):

References

References

  1. (1996). "Handbook of Applied Cryptography". CRC Press.
  2. "Transactions — Bitcoin".
  3. (21–23 February 1996). "RIPEMD-160: A strengthened version of RIPEMD".
  4. (1995). "Integrity Primitives for Secure Information Systems. Final Report of RACE Integrity Primitives Evaluation (RIPE-RACE 1040)".
  5. Dobbertin, Hans. (December 1997). "RIPEMD with two-round compress function is not collision-free". [[Journal of Cryptology]].
  6. Bosselaers, Antoon. "The hash function RIPEMD-160".
  7. (2004-08-17). "Collisions for Hash Functions MD4, MD5, HAVAL-128 and RIPEMD". [[Cryptology ePrint Archive]].
  8. (2006). "Information Security".
  9. (2019). "Advances in Cryptology – CRYPTO 2019, Proceesings vol 2".
  10. (February 2023). "Advances in Cryptology – EUROCRYPT 2023, Proceedings vol. 4".
  11. Li, Yingxin. (2023-12-08). "Automating Collision Attacks on RIPEMD-160". IACR Transactions on Symmetric Cryptology.

::callout[type=info title="Wikipedia Source"] This article was imported from Wikipedia and is available under the Creative Commons Attribution-ShareAlike 4.0 License. Content has been adapted to SurfDoc format. Original contributors can be found on the article history page. ::

cryptographic-hash-functions