Sha3d — An upgrade to Bitcoin`s Sha2(256)?
3 min readJan 4, 2024
Hello Citizents of Crypto Nation!
This article is a about the Sha-3 algo and its key points, read well, comment and lets delve into the ever evolving world of Blockchain deeper together!
SHA-3 (Secure Hash Algorithm 3) is a cryptographic hash function designed by Guido Bertoni, Joan Daemen, Michaël Peeters, and Gilles Van Assche. It was standardized by the National Institute of Standards and Technology (NIST) in August 2015 as FIPS PUB 202.
Key points about SHA-3 algorithm:
1.Design Philosophy:
- SHA-3 was designed as a part of the NIST’s Cryptographic Hash Algorithm Competition, which was initiated to develop a new hash function standard as an alternative to the existing SHA-2 family.
- The design philosophy of SHA-3 is based on the Keccak sponge construction, which differs from the Merkle-Damgård construction used in previous hash functions like SHA-1 and SHA-2.
2.Keccak Sponge Construction:
- Keccak is a family of sponge constructions, and SHA-3 uses the Keccak-f permutation as its core building block.
- The sponge construction involves absorbing input data, followed by a squeezing phase where the hash value is extracted. This construction allows for flexible and efficient…