SHA3-224 Hash Tool
Other Hash Generator
MD2 MD4 MD5 SHA1 SHA224 SHA256 SHA384 SHA512/224 SHA512/256 SHA512 SHA3-224 SHA3-256 SHA3-384 SHA3-512 RIPEMD128 RIPEMD160 RIPEMD256 RIPEMD320 WHIRLPOOL TIGER128,3 TIGER160,3 TIGER192,3 TIGER128,4 TIGER160,4 TIGER192,4 SNEFRU SNEFRU256 GOST GOST-CRYPTO ADLER32 CRC32 CRC32B CRC32C FNV132 FNV1A32 FNV164 FNV1A64 JOAAT MURMUR3A MURMUR3C MURMUR3F XXH32 XXH64 XXH3 XXH128 HAVAL128,3 HAVAL160,3 HAVAL192,3 HAVAL224,3 HAVAL256,3 HAVAL128,4 HAVAL160,4 HAVAL192,4 HAVAL224,4 HAVAL256,4 HAVAL128,5 HAVAL160,5 HAVAL192,5 HAVAL224,5 HAVAL256,5The SHA3-224 algorithm is a member of the SHA-3 family of cryptographic hash functions, standardized by NIST in 2015. It produces a fixed output of 224 bits, regardless of the input length. SHA3-224 is based on the Keccak algorithm, which utilizes a sponge construction to absorb input data and squeeze output bits. The algorithm operates on a state array of 5×5 lanes, where each lane consists of 64 bits, although SHA3-224 uses only 448 bits for the rate portion during absorption.
Initialization
The internal state of SHA3-224 is initialized to all zeros. The state is represented as a 5×5×64-bit array. A padding scheme is applied to the input message to ensure its length is a multiple of the rate. The padding used is the multi-rate padding (also known as pad10*1), which appends a '1' bit, followed by zero or more '0' bits, and a final '1' bit to fill the last block.
Absorption Phase
During the absorption phase, the input message is divided into blocks of size equal to the rate. Each block is XORed into the first portion of the state array. After XORing, a permutation function, known as Keccak-f, is applied. This permutation consists of multiple rounds, each composed of five sequential steps: theta, rho, pi, chi, and iota. Theta mixes bits across columns, rho performs rotations within lanes, pi transposes positions, chi introduces non-linearity through AND/XOR operations, and iota adds round constants to prevent symmetry.
Squeezing Phase
Once all message blocks are absorbed, the squeezing phase begins. In this phase, the algorithm extracts output bits from the state array. If more output bits are required than are available in the current rate portion, the permutation function is applied again, and additional bits are extracted. This process continues until the desired 224-bit hash is generated. The final output is a fixed-length digest that uniquely represents the input data with strong resistance against preimage, second preimage, and collision attacks.
Properties and Security
SHA3-224 inherits the security properties of the Keccak function. It provides a high level of diffusion, ensuring that small changes in the input result in significant changes in the output. Its sponge construction allows flexible output lengths, although SHA3-224 specifically outputs 224 bits. The algorithm is resistant to differential and linear cryptanalysis due to the structure of the permutation and the non-linear chi step. Additionally, SHA3-224 avoids vulnerabilities present in earlier SHA-2 functions while offering efficient implementation in both software and hardware.