ONLINE SHA-3 Keccak CALCULATOR - CODE GENERATOR
This online tool provides the code to calculate SHA-3(Keccak, FIPS PUB 202 FIPS202) hash output. Keccak is a family of hash functions that is based on the sponge construction. The cryptographic primitive family Keccak, the superset of SHA-3 is a cryptographic hash function.
Online SHA-3 (FIPS PUB 202 FIPS202) tool will generate Verilog RTL code or C source code. The generated code output may be used for SHA-3. This online Keccak calculator will calculate the Keccak hash output for the provided string.
|Supported Structures / Algorithms
- Java Class
- Perl Subroutine
This tool is not qualified for cryptographic uses and is not cryptographically secure. You should not rely on it in security-sensitive situations.
If you need help using the tool or generating a specialised structure, contact me. You may also check my other free tools here.
I use this to verify the Keccak hardware module. It helps verifying the overall product. I hope it helps to you too. Enjoy...
- Word size of 64 is tested only.
- Code generation is disabled for now.
- The IP cores can be purchased.
- NIST Test vectors
SHA3 php has sha3 online and sha3 python of sha3 keccak
while sha3 c# solves sha3 java with sha3 sgd using keccak.
sha 3 wiki shows sha 3 winner is sha 3 java implementation.
sha 3 length is sha 3 announced with sha 3 keccak.
SHA 3 blake generates sha 3 php.
Keccak test vectors are calculated for keccak php,
keccak java, and bruce schneier.
Skein calculates joan daemen.
Sponge function is in sha-3.
FIPS PUB 202
sha-3 php generates sha-3 implementation in sha-3 competition
at sha-3 conference. Most likely sha-3 winner is sha-3 python
The following is a list of algorithms I provide expertise. Please refer to the actual algorithm specification pages for the most accurate list of algorithms.
Encryption - Block Ciphers
FIPS 197 - Advanced Encryption Standard (AES)
SP 800-67 - Recommendation for the Triple Data Encryption Algorithm (TDEA) Block Cipher
FIPS 185 - Escrowed Encryption Standard containing the Skipjack algorithm
Block Cipher Modes
SP 800-38A - Recommendation for Block Cipher Modes of Operation: Methods and Techniques
AES All Modes
TDES All Modes
SP 800-38B - Recommendation for Block Cipher Modes of Operation: The CMAC Mode for Authentication
SP 800-38C - Recommendation for Block Cipher Modes of Operation: The CCM Mode for Authentication and Confidentiality
SP 800-38D - Recommendation for Block Cipher Modes of Operation: Galois/Counter Mode (GCM) and GMAC
SP 800-38F - Recommendation for Block Cipher Modes of Operation: Methods for Key Wrapping
Key wrapping (KW and KWP)
Key wrapping (TKW)
SP 800-38G -Recommendation for Block Cipher Modes of Operation: Methods for Format-Preserving Encryption
FIPS 186-4 - Digital Signature Standard
DSA All Domain Parameter Sizes
ECDSA All Prime Curves
All Characteristic2 Curves
FIPS 180-2 - Secure Hash Standard
All Digest Sizes
Additional data for SHA2 algorithms (without intermediate values)
FIPS 202 - SHA-3 Standard: Permutation-Based Hash and Extendable-Output Functions
Input Message Length
0-bit 5-bit 30-bit 1600-bit 1605-bit 1630-bit
SHA3-224 file file file file file file
SHA3-256 file file file file file file
SHA3-384 file file file file file file
SHA3-512 file file file file file file
SHAKE128 file file file file file file
SHAKE256 file file file file file file
Samples to illustrate SHAKE128 for output bit lengths that are not divisible by 8.
SP 800-56A - Recommendation for Pair-Wise Key Establishment Schemes Using Discrete Logorithm Cryptography
Finite Field Cryptography based Samples All Domain Parameter Sizes
Elliptic Curve Cryptography All Curves
All Prime Curves
All Characteristic2 Curves
Random Number Generation
FIPS 186-2 - Digital Signature Standard, Appendices 3.1 and 3.2 and Change Notice #1 FIPS 186-2
ANSI X9.31 Digital Signatures Using Reversible Public Key Cryptography for the Financial Services Industry, Appendix A.2.4 ANSI X9.31
ANSI X9.62-1998 Public Key Cryptography for the Financial Services Industry: The Elliptic Curve Digital Signature Algorithm(ECDSA), Annex A.4 ANSI X9.62-1998
SP 800-90 - Recommendation for Random Number Generation Using Deterministic Random Bit Generators All algorithms
CTR_DRBG no Derivation Function
CTR_DRBG with Derivation Function
FIPS 198 - The Keyed-Hash Message Authentication Code (HMAC)
All the material listed and linked at this World Wide Web domain are strictly private property and copyrighted.
Levent Ozturk. All rights reserved. Reproduction or use of any material, documents and related graphics and any other material
from this World Wide Web server is strictly prohibited.