You have JavaScript disabled. This site requires JavaScript to be enabled for complete site functionality.

An official website of the United States government

Here’s how you know

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

NIST SP 800-185

SHA-3 Derived Functions: cSHAKE, KMAC, TupleHash, and ParallelHash

Date Published: December 2016

Planning Note (03/13/2025):

NIST has decided to revise this publication. See this announcement for more details.


Author(s)

John Kelsey (NIST), Shu-jen Chang (NIST), Ray Perlner (NIST)

Abstract

Keywords

authentication; cryptography; cSHAKE; customizable SHAKE function; hash function; information security; integrity; KECCAK; KMAC; message authentication code; parallel hashing; ParallelHash; PRF; pseudorandom function; SHA-3; SHAKE; tuple hashing; TupleHash
Control Families

Identification and Authentication; System and Information Integrity

Documentation

Publication:
https://doi.org/10.6028/NIST.SP.800-185
Download URL

Supplemental Material:
Comments Received on Draft SP 800-185 (pdf)

Related NIST Publications:
FIPS 202

Document History:
12/22/16: SP 800-185 (Final)

Morty Proxy This is a proxified and sanitized view of the page, visit original site.