A cryptographic hash algorithm (alternatively, hash "function") is designed to provide a random mapping from a string of binary data to a fixed-size “message digest” and achieve certain security properties. Hash algorithms can be used for digital signatures, message authentication codes, key derivation functions, pseudo random functions, and many other security applications. The Federal Information Processing Standard (FIPS 180-4), Secure Hash Standard, specifies seven cryptographic hash algorithms for Federal use, and is widely adopted by the information technology industry as well.
In 2004-2005, several cryptographic hash algorithms were successfully attacked, and serious attacks were published against the NIST-approved SHA-1. In response, NIST held two public workshops to assess the status of its approved hash algorithms, and to solicit public input on its cryptographic hash algorithm policy and standard. As a result of these workshops, NIST decided to develop a new cryptographic hash algorithm for standardization through a public competition. The new hash algorithm would be referred to as SHA-3.
NIST announced the SHA-3 Cryptographic Hash Algorithm Competition on November 2, 2007, and ended the competition on October 2, 2012, when it announced KECCAK as the winning algorithm to be standardized as the new SHA-3.
SHA-3 Competition (11/2/2007 – 10/2/2012)
SHA-3 Standardization (FIPS 180-4 and FIPS 202)
SHA-3-Derived Functions (SP 800-185)
A email@example.com email list has been established for dialogue regarding NIST's Cryptographic Hash Workshops and Hash Algorithm Competition. It is an unmoderated email list; messages addressed to this list are immediately distributed to all the addresses on the list. Only members are allowed to post messages to the list; however, anyone who wishes to do so may add themselves to the list. The archives of this email list are no longer accessible externally.
To be added to the hash-forum email list
To unsubscribe from the email list
The Internet Archive has an archive copy of NIST's SHA-3 Development site (as of August 29, 2017), including the submission packages (with the specification and implementations) of all candidate algorithms, public comments received, conference materials, etc.