The Design Principles of Hash Functions and Their Desirable Properties SHA-3 (KECCAK)
Secure Hash Algorithms (SHA-3) is the latest and most secure hash algorithm released by the National Institute of Standards and Technology (NIST). Implementing Sponge construction structure Keccak also known as SHA-3 provides a modern approach to applying cryptographic hash functions. This paper presents two critical elements of the SHA-3 standard, the desirable properties, and the current design principles.
Authors: Saeed Alteneiji, Yousuf AlSalami
- Date of Conference: 6-8 December 2022
- DOI: 10.20533/ICITST.2022.0003
- ISBN: 978-1-913572-55-6
- Conference Location: Virtual (London, UK)