Levent Ozturk


This online tool provides the code to calculate SHA-3(Keccak, FIPS PUB 202 FIPS202) hash output. Keccak is a family of hash functions that is based on the sponge construction. The cryptographic primitive family Keccak, the superset of SHA-3 is a cryptographic hash function.

Online SHA-3 (FIPS PUB 202 FIPS202) tool will generate Verilog RTL code or C source code. The generated code output may be used for SHA-3. This online Keccak calculator will calculate the Keccak hash output for the provided string.
Supported Structures / Algorithms
  • Keccak 224
  • Keccak 256
  • Keccak 384
  • Keccak 512
Supported Languages / Output Types
  • C Function
  • C++ Class
  • Java Class
  • Perl Subroutine

This tool is not qualified for cryptographic uses and is not cryptographically secure. You should not rely on it in security-sensitive situations.
If you need help using the tool or generating s specialised structure, contact me. You may also check my other free tools here. I use this to verify the Keccak hardware module. It helps verifying the overall product. I hope it helps to you too. Enjoy...
Hash Size
Hash Size
The SHA-3 output hash size in bits
Word Size
Word Size
The state is constructed as a 5×5×w array of bits.
This is defined for any power-of-two word size, w = 2ℓ bits.
The main SHA-3 submission uses 64-bit words, ℓ = 6.
Prints the sub stage values of the SHA-3 calculation.
Round vebose prints the result of each round.
Step verbose prints the result of each step within the rounds.
Rounds Steps
Due to heavy processing load on CPU and misuse by robots, you are required to identify yourself first.
facebook linkedin Google Plus facebook

Input Data
Input Data
The data that will be used to calculate the Keccak hash output.
Currently it is limited to 2048 bytes to prevent CPU overload.
If longer data needs to be processed, please contact me.
Data Length
Input data length in number of bits. This field is optional.
If left empty, tool will calculate the length based on the input data
Data Type
Input data can be entered as binary, hex or text strings.
MSB: Inverts bits in each input data byte within itself(bit 7 <-> bit 0).
This feature is not enabled.
SHA-3 Hash output:

Source Code
Verilog Module
VHDL Module
C++ Class
C Function
Java Class
Perl Subroutine

Word size of 64 is tested only. Code generation is disabled for now.The IP cores can be purchased.

sha 3 wiki shows sha 3 winner is sha 3 java implementation. sha 3 length is sha 3 announced with sha 3 keccak.
SHA 3 blake generates sha 3 php.
Keccak test vectors are calculated for keccak php,
keccak java, and bruce schneier.
Skein calculates joan daemen.
Sponge function is in sha-3.
SHA3 php has sha3 online and sha3 python of sha3 keccak while sha3 c# solves sha3 java with sha3 sgd using keccak.
sha-3 php generates sha-3 implementation in sha-3 competition at sha-3 conference. Most likely sha-3 winner is sha-3 python or sha-3 javascript.
All the material listed and linked at this World Wide Web domain are strictly private property and copyrighted. Copyright -∞-∞ Levent Ozturk. All rights reserved. Reproduction or use of any material, documents and related graphics and any other material from this World Wide Web server is strictly prohibited. Site Map