SHA-3 Hash Calculator

hash

All hashing runs in your browser. Data is never sent to any server.

Text Input

File Input

📁

Drag & drop a file or click to select

1. How to Use

  1. Choose SHA3 variant (224, 256, 384, or 512 bit) from the dropdown.
  2. Enter text or upload a file to generate SHA-3 hash.
  3. Click 'Generate SHA-3 Hash' for the result.
  4. Verify SHA3 hashes or use for post-quantum cryptography preparation.
  5. Variant determines output length: 56, 64, 96, or 128 hex characters.

2. How It Works

SHA-3 is based on the Keccak sponge construction, unlike SHA-2's Merkle–Damgård. It uses a permutation (Keccak-f) on a 1600-bit state (5×5×64 bits).

Sponge: Absorb input into the state in r-bit blocks (rate), then squeeze output. Capacity c = 1600−r. For SHA3-256: r=1088, c=512; output is squeezed and truncated to 256 bits.

Keccak-f permutation: 24 rounds. Each round: θ (parity diffusions), ρ (bit rotations), π (lane permutations), χ (non-linear mixing: a[i][j] XOR= (¬a[i][j+1])∧a[i][j+2]), ι (round constant XOR).

Padding: Keccak uses pad10*1: append 0x06, then pad with 0x00 and final 0x80 so (message|pad) is a multiple of the rate. Different from SHA3: original Keccak used simpler padding.

3. About SHA-3

SHA-3 (Keccak) is the NIST standard from the SHA-3 competition (2012). It uses a completely different design than SHA-2.

This SHA-3 hash calculator supports SHA3-224, SHA3-256, SHA3-384, and SHA3-512. SHA-3 is resistant to length-extension attacks and has a different security profile than SHA-2.

All variants run in your browser with no server involvement.

4. Advantages

  • Different design: Sponge construction avoids length-extension vulnerabilities.
  • NIST standard: Officially approved for cryptographic use.
  • Multiple sizes: 224 to 512 bits for different security levels.
  • Post-quantum consideration: Sponge structures are studied for PQ resistance.

5. Real-World Use Cases

  • Future-proof hashing: When SHA-2 compatibility is not required.
  • Length-extension resistance: Where SHA-2's property is a concern.
  • Cryptographic protocols: New designs often prefer SHA-3.
  • Testing and development: Verify SHA-3 implementations.