Secure Hash Algorithms (SHA-3) is the latest and most secure hash algorithm released by the National Institute of Standards and Technology (NIST). Implementing Sponge construction structure Keccak also known as SHA-3 provides a modern approach to applying cryptographic hash functions. This paper presents two critical elements of the SHA-3 standard, the desirable properties, and the current design principles.

Authors: Saeed Alteneiji, Yousuf AlSalami

Published in: International Conference for Internet Technology and Secured Transactions (ICITST-2022)

  • Date of Conference: 6-8 December 2022
  • DOI: 10.20533/ICITST.2022.0003
  • ISBN: 978-1-913572-55-6
  • Conference Location: Virtual (London, UK)