What is SHA3 ?
SHA-3 (Secure Hash Algorithm 3) is a family of cryptographic hash functions that are based on the Keccak algorithm, which was developed by Guido Bertoni, Joan Daemen, Michaƫl Peeters, and Gilles Van Assche. SHA-3 is the latest member of the Secure Hash Algorithm family, which also includes SHA-1 and SHA-2.
SHA-3 is designed to be a drop-in replacement for SHA-2, with the main difference being that it is not affected by the same types of attacks that have been discovered for SHA-2. It is also designed to be more secure against collision attacks, which are a type of attack that tries to find two input values that produce the same hash output.
SHA-3 is also designed to be more resistant to side-channel attacks, which are a type of attack that tries to extract information about the input or the internal state of the hash function by measuring things like power consumption or electromagnetic radiation.
SHA-3 is widely used in cryptographic operations such as digital signature, password hashing, and data integrity.
Keccak is the winner of the NIST hash function competition in 2012, and the standard was named SHA-3 in honor of the SHA (Secure Hash Algorithm) family to which it belongs.