Overview#
A Cryptographic Hash Function formerly called Keccak, chosen in 2012 after a public competition among non-NSA designers.SHA-3 is Stream Cipher using a Sponge Function
SHA-3 supports the same Message-Digest lengths as SHA-2, but its internal structure differs significantly from the rest of the SHA family.
More Information#
There might be more information for this subject on one of the following:- Best Practices for LDAP Security
- FIPS 180
- FIPS 202
- Glossary Of LDAP And Directory Terminology
- Keccak
- Length extension attack
- Secure Hash Algorithm