6 cpb on a typical x86-64-based machine for Keccak-f plus XORing 1024 bits, which roughly corresponds to SHA2-256. Secure Hash Algorithm family of standards, released by NIST on August rightmost bitcoin, 2015. Keccak is based on a novel approach called sponge construction. NIST does not currently plan to withdraw SHA-2 or remove it from the revised Secure Hash Standard.
The purpose of SHA-3 is that it can be directly substituted for SHA-2 in current applications if necessary, and to significantly improve the robustness of NIST’s overall hash algorithm toolkit. Michael Peeters, and Gilles Van Assche. In 2006 NIST started to organize the NIST hash function competition to create a new hash standard, SHA-3. SHA-3 is not meant to replace SHA-2, as no significant attack on SHA-2 has been demonstrated. After a setup period, admissions were to be submitted by the end of 2008.
Keccak was accepted as one of the 51 candidates. In July 2009, 14 algorithms were selected for the second round. Keccak advanced to the last round in December 2010. During the competition, entrants were permitted to “tweak” their algorithms to address issues that were discovered. The rate r was increased to the security limit, rather than rounding down to the nearest power of 2. On October 2, 2012, Keccak was selected as the winner of the competition. In 2014, the NIST published a draft FIPS 202 “SHA-3 Standard: Permutation-Based Hash and Extendable-Output Functions”.