ONLINE SHA3 Keccak CALCULATOR  CODE GENERATOR
This online tool provides the code to calculate SHA3(Keccak, FIPS PUB 202 FIPS202) hash output. Keccak is a family of hash functions that is based on the sponge construction. The cryptographic primitive family Keccak, the superset of SHA3 is a cryptographic hash function.
Online SHA3 (FIPS PUB 202 FIPS202) tool will generate Verilog RTL code or C source code. The generated code output may be used for SHA3. This online Keccak calculator will calculate the Keccak hash output for the provided string.
Supported Structures / Algorithms 


Available Languages 


 Java Class
 Perl Subroutine

This tool is not qualified for cryptographic uses and is not cryptographically secure. You should not rely on it in securitysensitive situations.
If you need help using the tool or generating a specialised structure,
contact me. You may also check my other
free tools here.
I use this to verify the Keccak hardware module. It helps verifying the overall product. I hope it helps to you too. Enjoy...
 Word size of 64 is tested only.
 Code generation is disabled for now.
 The IP cores can be purchased.
 NIST Test vectors
^{SHA3}
SHA3
sha 3 wiki shows sha 3 winner is sha 3 java implementation.
sha 3 length is sha 3 announced with sha 3 keccak.
SHA 3 blake generates sha 3 php.
Keccak test vectors are calculated for keccak php,
keccak java, and bruce schneier.
Skein calculates joan daemen.
Sponge function is in sha3.
SHA3 php has sha3 online and sha3 python of sha3 keccak
while sha3 c# solves sha3 java with sha3 sgd using keccak.
FIPS PUB 202
sha3 php generates sha3 implementation in sha3 competition
at sha3 conference. Most likely sha3 winner is sha3 python
or sha3 javascript.
SUPPORTED ALGORITHMS
The following is a list of algorithms I provide expertise. Please refer to the actual algorithm specification pages for the most accurate list of algorithms.
Encryption  Block Ciphers
FIPS 197  Advanced Encryption Standard (AES)
AESAllSizes
AES128
AES192
AES256
SP 80067  Recommendation for the Triple Data Encryption Algorithm (TDEA) Block Cipher
TDES
FIPS 185  Escrowed Encryption Standard containing the Skipjack algorithm
Skipjack
Block Cipher Modes
SP 80038A  Recommendation for Block Cipher Modes of Operation: Methods and Techniques
AES All Modes
ECB
CBC
CFB
OFB
CTR
TDES All Modes
ECB
CBC
CFB
OFB
CTR
SP 80038B  Recommendation for Block Cipher Modes of Operation: The CMAC Mode for Authentication
CMACAES
CMACTDES
SP 80038C  Recommendation for Block Cipher Modes of Operation: The CCM Mode for Authentication and Confidentiality
CCMAES
SP 80038D  Recommendation for Block Cipher Modes of Operation: Galois/Counter Mode (GCM) and GMAC
GCMAES
SP 80038F  Recommendation for Block Cipher Modes of Operation: Methods for Key Wrapping
Key wrapping (KW and KWP)
Key wrapping (TKW)
SP 80038G Recommendation for Block Cipher Modes of Operation: Methods for FormatPreserving Encryption
AESFF1
AESFF3
Digital Signatures
FIPS 1864  Digital Signature Standard
DSA All Domain Parameter Sizes
RSA
ECDSA All Prime Curves
All Characteristic2 Curves
Secure Hashing
FIPS 1802  Secure Hash Standard
All Digest Sizes
SHA1
SHA224
SHA256
SHA384
SHA512
SHA512/224
SHA512/256
Additional data for SHA2 algorithms (without intermediate values)
FIPS 202  SHA3 Standard: PermutationBased Hash and ExtendableOutput Functions
Input Message Length
0bit 5bit 30bit 1600bit 1605bit 1630bit
SHA3224 file file file file file file
SHA3256 file file file file file file
SHA3384 file file file file file file
SHA3512 file file file file file file
SHAKE128 file file file file file file
SHAKE256 file file file file file file
Samples to illustrate SHAKE128 for output bit lengths that are not divisible by 8.
Key Management
SP 80056A  Recommendation for PairWise Key Establishment Schemes Using Discrete Logorithm Cryptography
Finite Field Cryptography based Samples All Domain Parameter Sizes
Elliptic Curve Cryptography All Curves
All Prime Curves
All Characteristic2 Curves
Random Number Generation
Deterministic Generators
FIPS 1862  Digital Signature Standard, Appendices 3.1 and 3.2 and Change Notice #1 FIPS 1862
ANSI X9.31 Digital Signatures Using Reversible Public Key Cryptography for the Financial Services Industry, Appendix A.2.4 ANSI X9.31
ANSI X9.621998 Public Key Cryptography for the Financial Services Industry: The Elliptic Curve Digital Signature Algorithm(ECDSA), Annex A.4 ANSI X9.621998
SP 80090  Recommendation for Random Number Generation Using Deterministic Random Bit Generators All algorithms
Hash_DRBG
HMAC_DRBG
CTR_DRBG no Derivation Function
CTR_DRBG with Derivation Function
Dual_EC_DRBG
Message Authentication
FIPS 198  The KeyedHash Message Authentication Code (HMAC)
SHA1
SHA224
SHA256
SHA384
SHA512
SHA3224
SHA3256
SHA3384
SHA3512