Overview#
A
Cryptographic Hash Function formerly called
Keccak, chosen in
2012 after a public competition among non-
NSA designers.
SHA-3 is Stream Cipher using a Sponge Function
SHA-3 supports the same Message-Digest lengths as SHA-2, but its internal structure differs significantly from the rest of the SHA family.
There might be more information for this subject on one of the following:
- - SHA-3
- based on information obtained 2018-08-22