sha3 Algorithm

The purpose of SHA-3 is that it can be directly substituted for SHA-2 in current applications if necessary, and to significantly better the robustness of NIST's overall hash algorithm toolkit. SHA-3 is a subset of the wider cryptographic primitive family Keccak (), designed by Guido Bertoni, Joan Daemen, Michaël Peeters, and Gilles Van Assche, constructing upon RadioGatún. In 2006 NIST started to organize the NIST hash function contest to make a new hash standard, SHA-3.The Keccak algorithm is the work of Guido Bertoni, Joan Daemen (who also co-designed the Rijndael cipher with Vincent Rijmen), Michael Peeters, and Gilles Van Assche. Because of the successful attacks on MD5, SHA-0 and SHA-1, NIST perceived a need for an alternative, dissimilar cryptographic hash, which became SHA-3.

sha3 source code, pseudocode and analysis

COMING SOON!