( ) 17 2 18 2 2005 2 18 : , Abstract: This document reports the state of hash functions and their secu- rity. For each of the widely-used hash functions, we show technical characteristics, standardization status, known results of security analysis and software performance. 3 1 5 2 7 2.1 . . . . . . . . . . . . . . . . . . . . . . . . . . . 7 2.2 . . . . . . . . . . . . . . . . . . . . . 7 2.3 . .