Statements (97)
Predicate | Object |
---|---|
gptkbp:instance_of |
gptkb:currency
|
gptkbp:bfsLayer |
3
|
gptkbp:bfsParent |
gptkb:Federal_Information_Processing_Standards_Publication_186
|
gptkbp:based_on |
gptkb:Keccak
|
gptkbp:designed_by |
gptkb:Research_Institute
|
gptkbp:developed_by |
gptkb:NIST
|
gptkbp:future_plans |
gptkb:theorem
|
gptkbp:has_programs |
gptkb:currency
|
https://www.w3.org/2000/01/rdf-schema#label |
SHA-3
|
gptkbp:is_adopted_by |
gptkb:RFC_8439
gptkb:IETF gptkb:RFC_7693 gptkb:municipality gptkb:ISO/_IEC cryptographic libraries RFC 8554 |
gptkbp:is_compared_to |
gptkb:SHA-1
M D5 |
gptkbp:is_compatible_with |
digital signatures
various programming languages |
gptkbp:is_designed_for |
data integrity
digital signatures password hashing message authentication |
gptkbp:is_evaluated_by |
gptkb:benchmark
gptkb:software algorithm efficiency cryptographers cryptographic strength |
gptkbp:is_implemented_in |
various programming languages
|
gptkbp:is_part_of |
gptkb:NIST_hash_function_family
encryption protocols cryptographic protocols data protection strategies Secure Hash Standard data confidentiality measures |
gptkbp:is_standardized_by |
gptkb:NIST
FIPSPUB 202 |
gptkbp:is_supported_by |
cryptographic libraries
hardware accelerators |
gptkbp:is_used_in |
gptkb:PGP
gptkb:TLS_1.3 gptkb:software_framework gptkb:SSH gptkb:motorcycle gptkb:S/_MIME gptkb:currency gptkb:X.509_certificates data recovery regulatory compliance application security cloud security data encryption data integrity verification firmware updates identity verification network security secure communications secure storage authentication systems secure transactions secure messaging data deduplication digital certificates digital forensics digital rights management password hashing blockchain applications secure boot secure backups cloud storage security file integrity checking file integrity checks system integrity checks Io T security data signing |
gptkbp:is_vulnerable_to |
gptkb:currency
length extension attacks |
gptkbp:provides |
collision resistance
pre-image resistance second pre-image resistance |
gptkbp:published_by |
gptkb:2015
|
gptkbp:resolution |
256 bits
384 bits 224 bits 512 bits |
gptkbp:security_features |
gptkb:theorem
high |
gptkbp:speed |
gptkb:SHA-2
SHA-2 in some applications |
gptkbp:successor |
gptkb:SHA-2
|
gptkbp:supports |
variable output lengths
|
gptkbp:uses |
modular arithmetic
bitwise XOR permutations bitwise operations sponge construction |