News

SHA-3 follows SHA-2 and is the product of a competition launched by the NIST in 2007 with the aim of developing a new cryptographic hash algorithm.
NIST chose Keccak as the new SHA-3 hash algorithm but cryptographers say SHA-2 is still secure and it may be years before the new standard is implemented widely.
The National Institute of Standards and Technology (NIST) is conducting a competition to choose a new secure hashing algorithm, and the contest will end Friday, by which time the agency hopes to ...
Two new IP cores for secure hash algorithm 3 (SHA-3) standard feature more versatile algorithm support. That encompasses support for all four variants of SHA-3 hashing algorithms—224, 256, 384, and ...
For SHA-3 (Secure Hash Algorithm), NIST has selected Keccak (pronounced “catch-ack”), an algorithm authored by Guido Bertoni, Joan Daemen and Gilles Van Assche of STMicroelectronics, as well as ...
NIST recommended IT professionals replace Secure Hash Algorithm 1 (SHA-1) with more secure algorithms from the SHA-2 and SHA-3 groups to protect electronic information by Dec. 31, 2030.
SHA-3, which was recently approved but remains unimplemented, uses a new algorithm.
Perhaps most importantly, Keccak operates completely unlike the SHA-2 algorithms, meaning that any work that has been done to compromise SHA-2 would not apply to SHA-3, Polk said.