Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Additional Secure Hash Algorithm Standards Offer New Opportunities for Data Protection

Published

Author(s)

Morris J. Dworkin, Larry Feldman, Gregory A. Witte

Abstract

This bulletin summarizes the information presented in FIPS 202. The publication specifies the Secure Hash Algorithm-3 (SHA-3) family of functions on binary data. Each of the SHA-3 functions is based on an instance of the KECCAK algorithm that NIST selected as the winner of the SHA-3 Cryptographic Hash Algorithm Competition.
Citation
ITL Bulletin -

Keywords

computer security, cryptography, extendable-output function, Federal Information Processing Standard. hash algorithm, hash function, information security, KECCAK, message digest, permutation, SHA-3, sponge construction, sponge function, XOF

Citation

Dworkin, M. , Feldman, L. and Witte, G. (2015), Additional Secure Hash Algorithm Standards Offer New Opportunities for Data Protection, ITL Bulletin, National Institute of Standards and Technology, Gaithersburg, MD, [online], https://tsapps.nist.gov/publication/get_pdf.cfm?pub_id=919417 (Accessed October 5, 2024)

Issues

If you have any questions about this publication or are having problems accessing it, please contact reflib@nist.gov.

Created September 24, 2015, Updated February 19, 2017