Tag: sha-3

SHA-3

Outline

SHA-3 was known as Keccak and is a hash function designed by Guido Bertoni, Joan Daemen, Michaël Peeters, and Gilles Van Assche. MD5 and SHA-0 have been shown to be susceptible to attacks, along with theoretical attacks on SHA-1. NIST thus defined there was a need for a new hashing method which did not use the existing methods for hashing, and setup a competition for competing algorithms. In October 2012, Keccak won the NIST hash function competition, and is proposed as the SHA-3 standard. It should be noted that it is not replacement SHA-2, which is currently a secure methods. Overall Keccak uses the sponge construction where the message blocks are XORed into the initial bits of the state, and then invertibly permuted.

I tried many libraries for this, but this is the only one which actually gives the right answer:

http://nuget.org/packages/SHA3/

Web page

One standard test is:

The quick brown fox jumps over the lazy dog

which should give:

310AEE6B30C47350576AC2873FA89FD190CDC488442F3EF654CF23FE

Here is an example:

The quick brown …

Presentation