Skip to content

Secure Hash Algorithm 3 (SHA-3)#

The Secure Hash Algorithm 3 (SHA-3) is a set of 6 cryptographic hash functions as a subset of the Keccak algorithm.

Used operations: And, Xor, Rot, Not.

Variant Block State Rounds Output
SHA3-224 1152 b 1600 b 24 224 b
SHA3-256 1088 b 1600 b 24 256 b
SHA3-384 832 b 1600 b 24 384 b
SHA3-512 576 b 1600 b 24 512 b

SHA3-256 (\" \") =

a7ffc6f8bf1ed76651c14756a061d662f580ff4de43b49fa82d80a4b80f8434a

Working Principle#

In contrast to SHA-2, SHA-3 is based on sponge construction in which data is "absorbed" into the sponge, then the result is "squeezed" out. In the absorbing phase, message blocks are XORed into a subset of the state, which is then transformed as a whole using a permutation function \(f\).

References#