1321:
1349:
109:, the choice being made by a 256-bit round-dependent key schedule. Equivalently, combine each input block with a key bit, and map the result through a 5â4 bit S-box.
1301:
1131:
984:
904:
33:
292:
190:
182:
321:
243:
170:
0x 90ecf2f76f9d2c8017d979ad5ab96b87d58fc8fc4b83060f3f900774faa2c8fabe69c5f4ff1ec2b61d6b316941cedee117fb04b1f4c5bc1b919ae841c50eec4f
1410:
91:
by
Hongjun Wu. Though chosen as one of the five finalists of the competition, in 2012 JH ultimately lost to NIST hash candidate
1405:
1386:
920:
681:
848:
173:
Even a small change in the message will (with overwhelming probability) result in a mostly different hash, due to the
977:
95:. JH has a 1024-bit state, and works on 512-bit input blocks. Processing an input block consists of three steps:
285:
132:
The resulting digest is the last 224, 256, 384 or 512 bits from the 1024-bit final value. It is well suited to a
113:
1180:
889:
374:
326:
88:
102:
Apply a 42-round unkeyed permutation (encryption function) to the state. This consists of 42 repetitions of:
676:
258:
VHDL source code developed by the
Cryptographic Engineering Research Group (CERG) at George Mason University
970:
894:
1415:
1296:
1251:
1064:
663:
305:
301:
84:
53:
1175:
278:
1379:
1291:
559:
364:
166:
0x 2fe5f71b1b3290d3c017fb3c1a4d02a5cbeb03a0476481e25082434a881994b0ff99e078d2c16b105ad069b569315328
1281:
1271:
1126:
899:
735:
434:
429:
1276:
1266:
1069:
1029:
1022:
1012:
1007:
822:
642:
1017:
930:
316:
257:
1324:
1170:
1116:
945:
595:
549:
439:
397:
382:
1360:
1372:
1286:
1210:
615:
519:
469:
444:
123:
Permute 4-bit blocks so that they will be adjacent to different blocks in following rounds.
240:
8:
1049:
940:
817:
766:
705:
605:
524:
484:
464:
1155:
1139:
1086:
874:
858:
807:
1215:
1205:
1076:
751:
1150:
838:
792:
554:
174:
853:
802:
797:
585:
300:
247:
141:
67:
1356:
1225:
1145:
1106:
1054:
1039:
843:
571:
212:
1399:
1306:
1261:
1220:
1200:
1096:
1059:
1034:
935:
812:
105:
Break the input into 256 4-bit blocks, and map each through one of two 4-bit
514:
1256:
1101:
1091:
1081:
1044:
993:
117:
1235:
925:
771:
700:
696:
133:
1195:
1165:
1160:
1121:
1185:
600:
479:
387:
195:
0x d001ae2315421c5d3272bac4f4aa524bddd207530d5d26bbf51794f0da18fafc
187:
0x 6a049fed5fc6874acfdc4a08b568a4f8cbac27de933496f031015b38961608a0
162:
0x 46e64619c18bb0a92a5e87185a47eef83ca747b8fcc8e1412921357e326df434
1230:
1190:
879:
776:
761:
756:
746:
710:
630:
544:
424:
213:"NIST Selects Winner of Secure Hash Algorithm (SHA-3) Competition"
715:
671:
449:
252:
1348:
1111:
884:
625:
620:
590:
580:
539:
534:
529:
509:
504:
474:
459:
419:
92:
71:
610:
499:
454:
402:
359:
354:
348:
106:
158:
0x 2c99df889b019309051c60fecc2bd285a774940e43175b76b2626630
725:
720:
691:
686:
650:
216:
177:. For example, adding a period to the end of the sentence:
137:
494:
489:
342:
1132:
Cryptographically secure pseudorandom number generator
128:
XOR the input block into the right half of the state.
262:
99:
XOR the input block into the left half of the state.
74:in 64-bit mode using SSE2; 37.3 cpb using ANSI C.
1397:
1380:
978:
286:
191:The quick brown fox jumps over the lazy dog
183:The quick brown fox jumps over the lazy dog
1387:
1373:
985:
971:
293:
279:
147:
1355:This cryptography-related article is a
140:instruction set, giving speeds of 16.8
1398:
966:
274:
1343:
13:
112:Mix adjacent 4-bit blocks using a
14:
1427:
234:
1347:
1320:
1319:
992:
114:maximum distance separable code
1411:NIST hash function competition
1181:Information-theoretic security
890:NIST hash function competition
205:
89:NIST hash function competition
1:
198:
152:Hash values of empty string.
1406:Cryptographic hash functions
1359:. You can help Knowledge by
895:Password Hashing Competition
306:message authentication codes
302:Cryptographic hash functions
7:
1297:Message authentication code
1252:Cryptographic hash function
1065:Cryptographic hash function
849:MerkleâDamgĂ„rd construction
85:cryptographic hash function
16:Cryptographic hash function
10:
1432:
1342:
1176:Harvest now, decrypt later
1315:
1292:Post-quantum cryptography
1244:
1000:
962:
913:
867:
831:
785:
734:
662:
639:
568:
412:
373:
335:
312:
270:
266:
136:implementation using the
62:
52:
47:
39:
29:
24:
1282:Quantum key distribution
1272:Authenticated encryption
1127:Random number generation
643:key derivation functions
253:JH page on the SHA-3 Zoo
1277:Public-key cryptography
1267:Symmetric-key algorithm
1070:Key derivation function
1030:Cryptographic primitive
1023:Authentication protocol
1013:Outline of cryptography
1008:History of cryptography
921:Hash-based cryptography
823:Length extension attack
1018:Cryptographic protocol
931:Message authentication
1171:End-to-end encryption
1117:Cryptojacking malware
148:Examples of JH hashes
1287:Quantum cryptography
1211:Trusted timestamping
1050:Cryptographic nonce
818:Side-channel attack
21:
1416:Cryptography stubs
1156:Subliminal channel
1140:Pseudorandom noise
1087:Key (cryptography)
875:CAESAR Competition
859:HAIFA construction
808:Brute-force attack
246:2011-12-04 at the
58:224, 256, 384, 512
19:
1368:
1367:
1337:
1336:
1333:
1332:
1216:Key-based routing
1206:Trapdoor function
1077:Digital signature
958:
957:
954:
953:
752:ChaCha20-Poly1305
569:Password hashing/
215:(Press release).
87:submitted to the
78:
77:
1423:
1389:
1382:
1375:
1351:
1344:
1323:
1322:
1151:Insecure channel
987:
980:
973:
964:
963:
839:Avalanche effect
793:Collision attack
336:Common functions
295:
288:
281:
272:
271:
268:
267:
264:
263:
228:
227:
225:
224:
209:
194:
186:
175:avalanche effect
169:
165:
161:
157:
22:
18:
1431:
1430:
1426:
1425:
1424:
1422:
1421:
1420:
1396:
1395:
1394:
1393:
1340:
1338:
1329:
1311:
1240:
996:
991:
950:
909:
868:Standardization
863:
854:Sponge function
827:
803:Birthday attack
798:Preimage attack
781:
737:
730:
658:
641:
640:General purpose
635:
570:
564:
413:Other functions
408:
375:SHA-3 finalists
369:
331:
308:
299:
248:Wayback Machine
241:The JH web site
237:
232:
231:
222:
220:
211:
210:
206:
201:
196:
188:
180:
171:
167:
163:
159:
155:
150:
142:cycles per byte
17:
12:
11:
5:
1429:
1419:
1418:
1413:
1408:
1392:
1391:
1384:
1377:
1369:
1366:
1365:
1352:
1335:
1334:
1331:
1330:
1328:
1327:
1316:
1313:
1312:
1310:
1309:
1304:
1302:Random numbers
1299:
1294:
1289:
1284:
1279:
1274:
1269:
1264:
1259:
1254:
1248:
1246:
1242:
1241:
1239:
1238:
1233:
1228:
1226:Garlic routing
1223:
1218:
1213:
1208:
1203:
1198:
1193:
1188:
1183:
1178:
1173:
1168:
1163:
1158:
1153:
1148:
1146:Secure channel
1143:
1137:
1136:
1135:
1124:
1119:
1114:
1109:
1107:Key stretching
1104:
1099:
1094:
1089:
1084:
1079:
1074:
1073:
1072:
1067:
1057:
1055:Cryptovirology
1052:
1047:
1042:
1040:Cryptocurrency
1037:
1032:
1027:
1026:
1025:
1015:
1010:
1004:
1002:
998:
997:
990:
989:
982:
975:
967:
960:
959:
956:
955:
952:
951:
949:
948:
943:
938:
933:
928:
923:
917:
915:
911:
910:
908:
907:
902:
897:
892:
887:
882:
877:
871:
869:
865:
864:
862:
861:
856:
851:
846:
844:Hash collision
841:
835:
833:
829:
828:
826:
825:
820:
815:
810:
805:
800:
795:
789:
787:
783:
782:
780:
779:
774:
769:
764:
759:
754:
749:
743:
741:
732:
731:
729:
728:
723:
718:
713:
708:
703:
694:
689:
684:
679:
674:
668:
666:
660:
659:
657:
656:
653:
647:
645:
637:
636:
634:
633:
628:
623:
618:
613:
608:
603:
598:
593:
588:
583:
577:
575:
572:key stretching
566:
565:
563:
562:
557:
552:
547:
542:
537:
532:
527:
522:
517:
512:
507:
502:
497:
492:
487:
482:
477:
472:
467:
462:
457:
452:
447:
442:
437:
432:
427:
422:
416:
414:
410:
409:
407:
406:
400:
395:
390:
385:
379:
377:
371:
370:
368:
367:
362:
357:
352:
346:
339:
337:
333:
332:
330:
329:
324:
319:
313:
310:
309:
298:
297:
290:
283:
275:
261:
260:
255:
250:
236:
235:External links
233:
230:
229:
203:
202:
200:
197:
179:
154:
149:
146:
130:
129:
126:
125:
124:
121:
110:
100:
76:
75:
64:
60:
59:
56:
50:
49:
45:
44:
43:SHA-3 finalist
41:
37:
36:
31:
27:
26:
15:
9:
6:
4:
3:
2:
1428:
1417:
1414:
1412:
1409:
1407:
1404:
1403:
1401:
1390:
1385:
1383:
1378:
1376:
1371:
1370:
1364:
1362:
1358:
1353:
1350:
1346:
1345:
1341:
1326:
1318:
1317:
1314:
1308:
1307:Steganography
1305:
1303:
1300:
1298:
1295:
1293:
1290:
1288:
1285:
1283:
1280:
1278:
1275:
1273:
1270:
1268:
1265:
1263:
1262:Stream cipher
1260:
1258:
1255:
1253:
1250:
1249:
1247:
1243:
1237:
1234:
1232:
1229:
1227:
1224:
1222:
1221:Onion routing
1219:
1217:
1214:
1212:
1209:
1207:
1204:
1202:
1201:Shared secret
1199:
1197:
1194:
1192:
1189:
1187:
1184:
1182:
1179:
1177:
1174:
1172:
1169:
1167:
1164:
1162:
1159:
1157:
1154:
1152:
1149:
1147:
1144:
1141:
1138:
1133:
1130:
1129:
1128:
1125:
1123:
1120:
1118:
1115:
1113:
1110:
1108:
1105:
1103:
1100:
1098:
1097:Key generator
1095:
1093:
1090:
1088:
1085:
1083:
1080:
1078:
1075:
1071:
1068:
1066:
1063:
1062:
1061:
1060:Hash function
1058:
1056:
1053:
1051:
1048:
1046:
1043:
1041:
1038:
1036:
1035:Cryptanalysis
1033:
1031:
1028:
1024:
1021:
1020:
1019:
1016:
1014:
1011:
1009:
1006:
1005:
1003:
999:
995:
988:
983:
981:
976:
974:
969:
968:
965:
961:
947:
944:
942:
939:
937:
936:Proof of work
934:
932:
929:
927:
924:
922:
919:
918:
916:
912:
906:
903:
901:
898:
896:
893:
891:
888:
886:
883:
881:
878:
876:
873:
872:
870:
866:
860:
857:
855:
852:
850:
847:
845:
842:
840:
837:
836:
834:
830:
824:
821:
819:
816:
814:
813:Rainbow table
811:
809:
806:
804:
801:
799:
796:
794:
791:
790:
788:
784:
778:
775:
773:
770:
768:
765:
763:
760:
758:
755:
753:
750:
748:
745:
744:
742:
739:
736:Authenticated
733:
727:
724:
722:
719:
717:
714:
712:
709:
707:
704:
702:
698:
695:
693:
690:
688:
685:
683:
680:
678:
675:
673:
670:
669:
667:
665:
664:MAC functions
661:
654:
652:
649:
648:
646:
644:
638:
632:
629:
627:
624:
622:
619:
617:
614:
612:
609:
607:
604:
602:
599:
597:
594:
592:
589:
587:
584:
582:
579:
578:
576:
573:
567:
561:
558:
556:
553:
551:
548:
546:
543:
541:
538:
536:
533:
531:
528:
526:
523:
521:
518:
516:
513:
511:
508:
506:
503:
501:
498:
496:
493:
491:
488:
486:
483:
481:
478:
476:
473:
471:
468:
466:
463:
461:
458:
456:
453:
451:
448:
446:
443:
441:
438:
436:
433:
431:
428:
426:
423:
421:
418:
417:
415:
411:
404:
401:
399:
396:
394:
391:
389:
386:
384:
381:
380:
378:
376:
372:
366:
363:
361:
358:
356:
353:
351:(compromised)
350:
347:
345:(compromised)
344:
341:
340:
338:
334:
328:
327:Known attacks
325:
323:
320:
318:
315:
314:
311:
307:
303:
296:
291:
289:
284:
282:
277:
276:
273:
269:
265:
259:
256:
254:
251:
249:
245:
242:
239:
238:
218:
214:
208:
204:
192:
184:
178:
176:
153:
145:
143:
139:
135:
127:
122:
119:
115:
111:
108:
104:
103:
101:
98:
97:
96:
94:
90:
86:
82:
73:
69:
65:
61:
57:
55:
51:
46:
42:
40:Certification
38:
35:
32:
28:
23:
1361:expanding it
1354:
1339:
1257:Block cipher
1102:Key schedule
1092:Key exchange
1082:Kleptography
1045:Cryptosystem
994:Cryptography
392:
221:. Retrieved
219:. 2012-10-02
207:
172:
151:
131:
80:
79:
54:Digest sizes
1245:Mathematics
1236:Mix network
926:Merkle tree
914:Utilization
900:NSA Suite B
134:bit slicing
1400:Categories
1196:Ciphertext
1166:Decryption
1161:Encryption
1122:Ransomware
738:encryption
515:RadioGatĂșn
322:Comparison
223:2012-10-02
199:References
168:JH-512("")
164:JH-384("")
160:JH-256("")
156:JH-224("")
34:Hongjun Wu
1186:Plaintext
655:KDF1/KDF2
574:functions
560:Whirlpool
30:Designers
1325:Category
1231:Kademlia
1191:Codetext
1134:(CSPRNG)
880:CRYPTREC
711:Poly1305
631:yescrypt
545:Streebog
425:CubeHash
405:(winner)
244:Archived
189:JH-256("
181:JH-256("
1001:General
786:Attacks
716:SipHash
672:CBC-MAC
606:LM hash
586:Balloon
450:HAS-160
107:S-boxes
25:General
1112:Keygen
946:Pepper
885:NESSIE
832:Design
626:scrypt
621:PBKDF2
596:Catena
591:bcrypt
581:Argon2
540:Snefru
535:Shabal
530:SWIFFT
510:RIPEMD
505:N-hash
480:MASH-2
475:MASH-1
460:Kupyna
420:BLAKE3
403:Keccak
388:GrĂžstl
365:BLAKE2
93:Keccak
83:is a
72:Core 2
48:Detail
1142:(PRN)
740:modes
616:Makwa
611:Lyra2
601:crypt
550:Tiger
500:MDC-2
455:HAVAL
440:Fugue
398:Skein
383:BLAKE
360:SHA-3
355:SHA-2
349:SHA-1
118:GF(2)
116:over
66:16.1
63:Speed
1357:stub
941:Salt
905:CNSA
772:IAPM
726:VMAC
721:UMAC
706:PMAC
701:CMAC
697:OMAC
692:NMAC
687:HMAC
682:GMAC
651:HKDF
520:SIMD
470:Lane
445:GOST
430:ECOH
317:List
304:and
217:NIST
138:SSE2
777:OCB
767:GCM
762:EAX
757:CWC
747:CCM
677:DAA
555:VSH
525:SM3
495:MD6
490:MD4
485:MD2
465:LSH
435:FSB
343:MD5
193:.")
70:on
68:cpb
1402::
393:JH
185:")
144:.
81:JH
20:JH
1388:e
1381:t
1374:v
1363:.
986:e
979:t
972:v
699:/
294:e
287:t
280:v
226:.
120:.
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.