SHA-3 Hash Calculator
hash
All hashing runs in your browser. Data is never sent to any server.
Text Input
File Input
Drag & drop a file or click to select
1. How to Use
- Choose SHA3 variant (224, 256, 384, or 512 bit) from the dropdown.
- Enter text or upload a file to generate SHA-3 hash.
- Click 'Generate SHA-3 Hash' for the result.
- Verify SHA3 hashes or use for post-quantum cryptography preparation.
- Variant determines output length: 56, 64, 96, or 128 hex characters.
2. How It Works
SHA-3 is based on the Keccak sponge construction, unlike SHA-2's Merkle–Damgård. It uses a permutation (Keccak-f) on a 1600-bit state (5×5×64 bits).
Sponge: Absorb input into the state in r-bit blocks (rate), then squeeze output. Capacity c = 1600−r. For SHA3-256: r=1088, c=512; output is squeezed and truncated to 256 bits.
Keccak-f permutation: 24 rounds. Each round: θ (parity diffusions), ρ (bit rotations), π (lane permutations), χ (non-linear mixing: a[i][j] XOR= (¬a[i][j+1])∧a[i][j+2]), ι (round constant XOR).
Padding: Keccak uses pad10*1: append 0x06, then pad with 0x00 and final 0x80 so (message|pad) is a multiple of the rate. Different from SHA3: original Keccak used simpler padding.
3. About SHA-3
SHA-3 (Keccak) is the NIST standard from the SHA-3 competition (2012). It uses a completely different design than SHA-2.
This SHA-3 hash calculator supports SHA3-224, SHA3-256, SHA3-384, and SHA3-512. SHA-3 is resistant to length-extension attacks and has a different security profile than SHA-2.
All variants run in your browser with no server involvement.
4. Advantages
- Different design: Sponge construction avoids length-extension vulnerabilities.
- NIST standard: Officially approved for cryptographic use.
- Multiple sizes: 224 to 512 bits for different security levels.
- Post-quantum consideration: Sponge structures are studied for PQ resistance.
5. Real-World Use Cases
- Future-proof hashing: When SHA-2 compatibility is not required.
- Length-extension resistance: Where SHA-2's property is a concern.
- Cryptographic protocols: New designs often prefer SHA-3.
- Testing and development: Verify SHA-3 implementations.