Questions tagged [sha-3]

SHA-3 is a family of cryptographic hash functions, a successor to SHA-2.

SHA-3 is a family of cryptographic hash functions, intended to replace and .

SHA-3 was chosen by NIST in a competition started in November 2007. The winner was declared to be the Keccak family in October 2012. The other finalists in the competition were BLAKE, Grøstl, JH and Skein .

As of October 2012, SHA-3 has not yet been formally codified. It is intended that the next version of FIPS PUB 180 will specify Keccak functions with digest sizes 224, 256, 384, 512.

79 questions
2
votes
1 answer

How could I calculate the SHA-3-512 of a String in Android?

I need to send to a remote database the SHA-3-512 of a password from an Android application. How could I do that?
2
votes
2 answers

pysha3 not giving the right answer

With the following code, # $ pip install pysha3 import sys if sys.version_info < (3, 4): import sha3 import hashlib s = hashlib.new("sha3_512") s.update(b"") print(s.hexdigest()) I am getting…
Ursa Major
  • 851
  • 7
  • 25
  • 47
2
votes
2 answers

Using Skein for File integrity checking

I'd like to know that is it possible to use skein instead of MD5 or SHA1 for file integrity checking? Is that really better or faster than SHA1 and MD5? Update: Regarding your responses. Actually I'd like to use a faster algorithm for Host IDS like…
Steward
  • 21
  • 1
2
votes
1 answer

Is the C# encryption library hashlib correct in it's implementation

Hashlib team, I am not sure whether the SHA3 library (Keccak) returns correct encryption. I used the latest source code (changeset 78295) downloaded from codeplex but it does not match the vector and result provided in the Wikipedia (sha3 page)…
1
vote
1 answer

What is the hash method producing 128-bit output (32 hex chars) with lowest collision likelyhood?

I need to utilize the UUID datatype (128bit) for storing my hashes. The goal is to be able quickly calculate/identify different records by comparing it rather than millions of 1-10k char long strings. So the goal here is not the security (reverse…
msciwoj
  • 772
  • 7
  • 23
1
vote
2 answers

no new() in sha3::Keccak256 struct

I'm trying to get an ethereum public address from a hex private key. I wrote a rust script for that - extern crate hex; extern crate secp256k1; extern crate sha3; use secp256k1::{PublicKey, SecretKey}; use sha3::Keccak256; fn main() { let…
1
vote
0 answers

SHAKE256 inquiry

I am studying at night graduate school. While studying the cryptographic hash function, I found information that the speed of the SHA3 hash function is faster than the speed of the SHA2 hash function. So, using JMH benchmarking in actual JAVA, I…
Luffy Choi
  • 31
  • 2
1
vote
1 answer

SHA-3 variable length hash same as truncating normal hash in Java using BouncyCastle

I need to generate a fixed length hash of 30 characters based on some input data (like a customer email address) in Java. After some searching, I found out about SHA-3 sponge functions, where I can specify the required length. I implemented the…
Sebi
  • 8,323
  • 6
  • 48
  • 76
1
vote
1 answer

Crypto++ : Hash generation hangs on windows 10

I have the following simple program : #include #include "sha.h" #include #include #include #include using namespace CryptoPP; using namespace…
dlsa
  • 3,402
  • 2
  • 17
  • 17
1
vote
0 answers

Difference between js and dart to generate an address with a private key

I would like to write this function written in js to dart Function in js import {ec as EC} from 'elliptic' import secp256k1 from 'secp256k1' import sha3 from 'js-sha3' const ec = new EC('secp256k1') export function privateKeyToAddress(key) { …
redDwarf
  • 336
  • 1
  • 9
1
vote
1 answer

Round Constants in Keccak

Recently, just for the heck of it, I've been playing around with an attempt at implementing Keccak, the cryptographic primitive behind SHA-3. I've run into some issues however, specifically with calculating the round constants used in the "Iota"…
Jeffrey
  • 1,271
  • 2
  • 15
  • 31
1
vote
1 answer

Incorrect behaviour generating SHA3 hash with cryptopp

I'm seeing a very odd difference in behaviour in generating SHA3 hashes with cryptopp on RHEL7 vs Debian9. If I use a SHA1 or MD5 hash instead the output is identical on both platforms. I've reduced it down to the following minimal progrma: #include…
Bruce Adams
  • 4,953
  • 4
  • 48
  • 111
1
vote
2 answers

Why do BouncyCastle Keccak sha-384 and MessageDigest sha-384 have different output?

Simple example hashing an array of just one byte: import java.security.MessageDigest; import java.util.Arrays; import org.bouncycastle.jcajce.provider.digest.Keccak; public class Program { public static void main(String[ ] args) { //…
Roman Semko
  • 1,541
  • 5
  • 18
  • 27
1
vote
0 answers

What hashing algorithms can be used for Subresource-Integrity?

My question is related to the browser support when using hashing algorithms for subresource-integrity. Which hashing algorithms are expected to work as SRI hash in all browsers that support SRI? Or is there any browser compatibility chart…
Hamid Sarfraz
  • 1,089
  • 1
  • 14
  • 34
1
vote
1 answer

How can you create a SHA-3-256 Hash in Python on The Google App Engine?

Having a lot of problems getting an SHA-3 256 Hash working under Python in the Google App Engine. Speed isn't really the issue just something that is either written in Pure Python or use the third party libraries support by the Google App Engine.