What is SHA3 ?
SHA-3 (Secure Hash Algorithm 3) is a family of cryptographic hash functions that are based on the Keccak algorithm,
which was developed by Guido Bertoni, Joan Daemen, Michaƫl Peeters, and Gilles Van Assche. SHA-3 is the latest
member of the Secure Hash Algorithm family, which also includes SHA-1 and SHA-2.
SHA-3 is designed to be a drop-in replacement for SHA-2, with the main difference being that it is not affected by
the same types of attacks that have been discovered for SHA-2. It is also designed to be more secure against
collision attacks, which are a type of attack that tries to find two input values that produce the same hash output.
SHA-3 is also designed to be more resistant to side-channel attacks, which are a type of attack that tries to extract
information about the input or the internal state of the hash function by measuring things like power consumption or
electromagnetic radiation.
SHA-3 is widely used in cryptographic operations such as digital signature, password hashing, and data integrity.
Keccak is the winner of the NIST hash function competition in 2012, and the standard was named SHA-3 in honor of the
SHA (Secure Hash Algorithm) family to which it belongs.