FIPS 202

SHA-3 Standard: Permutation-Based Hash and Extendable-Output Functions

Date Published: August 2015

Planning Note (03/13/2025):

NIST has decided to update this publication. See this announcement for more details.


A typographical error has been identified in (non-normative) Appendix B, on page 26. In the description of Algorithm 10, step 1 begins:

1. For each integer ii such that 0i<2m1,0 \leq i < 2m-1 , \dots

but instead the correct notation should be:

1. For each integer ii such that 0i<2m,0 \leq i < 2m, \dots

This correction will be incorporated in any future revision of this standard.


Author(s)

National Institute of Standards and Technology

Abstract

Keywords

hash function; information security; message digest; permutation; SHA-3; sponge construction; sponge function; cryptography; extendable-output function; Federal Information Processing Standard; KECCAK; XOF; hash algorithm; computer security
Control Families

None selected