Cryptography/Tiger

From Wikibooks, open books for an open world
Jump to navigation Jump to search

Tiger hash[edit | edit source]

The Tiger hash processes data in 512-bit blocks and produces a 192-bit message digest. This hash was designed by Ross Anderson and Eli Biham (see http://www.cs.technion.ac.il/~biham/Reports/Tiger/), with the goal of producing a secure, fast hash function that performs especially well on next-generation 64-bit architectures, being still efficient on 32 and 16-bit architectures.

Tiger tree hash[edit | edit source]

Tiger Tree cryptographic hash is calculated by applying the Tiger hash to 1024-byte blocks of a stream, then combining the interim values through a binary hash tree.

This implementation method is specially useful as a secure way to validate transfers, especially blocks of a file and prevent corruption in distributed systems.