The SHA-3 Family of Cryptographic Hash Functions and Extendable-Output Functions - Maple Application Center
Application Center Applications The SHA-3 Family of Cryptographic Hash Functions and Extendable-Output Functions

The SHA-3 Family of Cryptographic Hash Functions and Extendable-Output Functions

Authors
: José Luis Gómez Pardo
Engineering software solutions from Maplesoft
This Application runs in Maple. Don't have Maple? No problem!
 Try Maple free for 15 days!
The National Institute of Standards and Technology (NIST) has released the final version of its "Secure Hash Algorithm-3" (SHA-3) standard in August 2015. The new standard ("Federal Information Processing Standard (FIPS) 202") specifies four cryptographic hash functions, called SHA3-224, SHA3-256, SHA3-384 and SHA3-512, as well as two Extendable-Output Functions (XOFs), called SHAKE128 and SHAKE256. These functions are based on the Keccak sponge function, designed by G. Bertoni, J. Daemen, M. Peeters and G. Van Assche. The hash functions are an essential tool for securing the integrity of electronic information and the XOFs offer the added flexibility of having a variable output length. This application contains an implementation of these functions and also of the SHA-3-based Message Authentication Code HMAC.

Application Details

Publish Date: October 16, 2015
Created In: Maple 2015
Language: English

More Like This

Linear Codes and Syndrome Decoding
The Advanced Encryption Standard and its modes of operation
Frequency Analysis and the Kama Sutra Substitution Cipher
Secure Symmetric-Key Block Cipher Based on Generalized Finite Fields
RSA with maple
Mersenne Primes-Based Symmetric-Key Masquerade Block Cipher
Exploring the Modified IDEA Using the topicIDEA Package
User-Friendly ElGamal Public-Key Encryption Scheme
Elliptic Curve Cryptography
Elliptic Curve Arithmetic over the Real Numbers
A Symmetric-Key Block Cipher Generating Cryptograms Containing Characters Belonging to the Definite Set