The SHA-3 Zoo (work in progress) is a collection of cryptographic hash functions (in alphabetical order) submitted to the SHA-3 contest (see also here). It aims to provide an overview of design and cryptanalysis of all submissions. A list of all SHA-3 submitters is also available. For a software performance related overview, see eBASH. At a separate page, we also collect hardware implementation results of the candidates. Another categorization of the SHA-3 submissions can be found here.

The idea of the SHA-3 Zoo is to give a good overview of cryptanalytic results. We try to avoid additional judgement whether a submission is broken. The answer to this question is left to NIST. However, we categorize the cryptanalytic results by their impact from very theoretic to practical attacks. A detailed description is given in Cryptanalysis Categories.

At this time, 56 out of 64 submissions to the SHA-3 competition are publicly known and available. 51 submissions have advanced to round 1, 14 submissions have made it into round 2 and 5 candidates have been selected for the final.

The following tables give a first impression on the cryptanalysis of the SHA-3 candidates. The tables only show the best known attack, more detailed results are collected at the individual hash function pages. A description of the main table is given here.

Recent updates of the SHA-3 Zoo (Your analysis is not mentioned? Drop a line at sha3zoo@iaik.tugraz.at to let us know!)





Keccak has been selected as the SHA-3 standard:

Hash Name Principal Submitter Best Attack on Main NIST Requirements Best Attack on other Hash Requirements Keccak The Keccak Team







The other 4 finalists of the SHA-3 competition are:

Hash Name Principal Submitter Best Attack on Main NIST Requirements Best Attack on other Hash Requirements BLAKE Jean-Philippe Aumasson Grøstl Lars R. Knudsen JH Hongjun Wu preimage Skein Bruce Schneier







The following SHA-3 candidates advanced to round 2 but did not get into the final:

Round 2 tweaks for all candidates





Hash Name Principal Submitter Best Attack on Main NIST Requirements Best Attack on other Hash Requirements Blue Midnight Wish Svein Johan Knapskog CubeHash Daniel J. Bernstein preimage ECHO Henri Gilbert Fugue Charanjit S. Jutla Hamsi Özgül Küçük Luffa Dai Watanabe Shabal Jean-François Misarsky SHAvite-3 Orr Dunkelman SIMD Gaëtan Leurent









The following submitted hash functions have not advanced to round 2: