U.S. flag   An unofficial archive of your favorite United States government website
Dot gov

Official websites do not use .rip
We are an unofficial archive, replace .rip by .gov in the URL to access the official website. Access our document index here.

Https

We are building a provable archive!
A lock (Dot gov) or https:// don't prove our archive is authentic, only that you securely accessed it. Note that we are working to fix that :)

FIPS 202

SHA-3 Standard: Permutation-Based Hash and Extendable-Output Functions

Date Published: August 2015

Planning Note (11/03/2020):

A typographical error has been identified in (non-normative) Appendix B, on page 26. In the description of Algorithm 10, step 1 begins:

1. For each integer \(i\) such that \(0 \leq i < 2m-1 , \dots\)

but instead the correct notation should be:

1. For each integer \(i\) such that \(0 \leq i < 2m, \dots\)

This correction will be incorporated in any future revision of this standard.


Author(s)

National Institute of Standards and Technology

Abstract

Keywords

hash function; information security; message digest; permutation; SHA-3; sponge construction; sponge function; cryptography; extendable-output function; Federal Information Processing Standard; KECCAK; XOF; hash algorithm; computer security
Control Families

None selected