<s>
HAVAL	B-Algorithm
is	O
a	O
cryptographic	B-Algorithm
hash	I-Algorithm
function	I-Algorithm
.	O
</s>
<s>
Unlike	O
MD5	B-Algorithm
,	O
but	O
like	O
most	O
modern	O
cryptographic	B-Algorithm
hash	I-Algorithm
functions	I-Algorithm
,	O
HAVAL	B-Algorithm
can	O
produce	O
hashes	B-Algorithm
of	O
different	O
lengths	O
–	O
128	O
bits	O
,	O
160	O
bits	O
,	O
192	O
bits	O
,	O
224	O
bits	O
,	O
and	O
256	O
bits	O
.	O
</s>
<s>
HAVAL	B-Algorithm
also	O
allows	O
users	O
to	O
specify	O
the	O
number	O
of	O
rounds	O
(	O
3	O
,	O
4	O
,	O
or	O
5	O
)	O
to	O
be	O
used	O
to	O
generate	O
the	O
hash	B-Algorithm
.	O
</s>
<s>
HAVAL	B-Algorithm
was	O
broken	O
in	O
2004	O
.	O
</s>
<s>
HAVAL	B-Algorithm
was	O
invented	O
by	O
Yuliang	O
Zheng	O
,	O
Josef	O
Pieprzyk	O
,	O
and	O
Jennifer	O
Seberry	O
in	O
1992	O
.	O
</s>
<s>
The	O
HAVAL	B-Algorithm
hashes	B-Algorithm
(	O
also	O
termed	O
fingerprints	O
)	O
are	O
typically	O
represented	O
as	O
32-	O
,	O
40-	O
,	O
48-	O
,	O
56	O
-	O
or	O
64-digit	O
hexadecimal	O
numbers	O
.	O
</s>
<s>
The	O
following	O
demonstrates	O
a	O
43-byte	O
ASCII	B-Protocol
input	O
and	O
the	O
corresponding	O
HAVAL	B-Algorithm
hash	B-Algorithm
(	O
256	O
bits	O
,	O
5	O
passes	O
)	O
:	O
</s>
<s>
Even	O
a	O
small	O
change	O
in	O
the	O
message	O
will	O
(	O
with	O
overwhelming	O
probability	O
)	O
result	O
in	O
a	O
completely	O
different	O
hash	B-Algorithm
,	O
e.g.	O
</s>
<s>
changing	O
the	O
letter	O
to	O
a	O
produces	O
the	O
following	O
hash	B-Algorithm
value	O
:	O
</s>
<s>
The	O
hash	B-Algorithm
of	O
a	O
zero-length	O
string	O
is	O
:	O
</s>
<s>
Research	O
has	O
uncovered	O
weaknesses	O
which	O
make	O
further	O
use	O
of	O
HAVAL	B-Algorithm
(	O
at	O
least	O
the	O
variant	O
with	O
128	O
bits	O
and	O
3	O
passes	O
with	O
26	O
operations	O
)	O
questionable	O
.	O
</s>
<s>
On	O
17	O
August	O
2004	O
,	O
collisions	O
for	O
HAVAL	B-Algorithm
(	O
128	O
bits	O
,	O
3	O
passes	O
)	O
were	O
announced	O
by	O
Xiaoyun	O
Wang	O
,	O
Dengguo	O
Feng	O
,	O
Xuejia	O
Lai	O
,	O
and	O
Hongbo	O
Yu	O
.	O
</s>
