FIPS 202

SHA-3 Standard: Permutation-Based Hash and Extendable-Output Functions

Date Published: August 2015

Planning Note (11/3/2020):

A typographical error has been identified in (non-normative) Appendix B, on page 26. In the description of Algorithm 10, step 1 begins:

1. For each integer \(i\) such that \(0 \leq i < 2m-1 , \dots\)

but instead the correct notation should be:

1. For each integer \(i\) such that \(0 \leq i < 2m, \dots\)

This correction will be incorporated in any future revision of this standard.


Author(s)

National Institute of Standards and Technology

Abstract

Keywords

hash function; information security; message digest; permutation; SHA-3; sponge construction; sponge function; cryptography; extendable-output function; Federal Information Processing Standard; KECCAK; XOF; hash algorithm; computer security
Control Families

None selected