Secure Hash Algorithm-3: A cryptographic hash function that was announced as the winner of the NIST hash function competition in 2012. Despite being part of the same family, SHA-3 is fundamentally different from SHA-1 and SHA-2, offering better performance and resistance against potential vulnerabilities. SHA-3 can be used for creating hash values to ensure data integrity, generating unique identifiers for data, and creating digital signatures, among other uses.
Categories: CC D5: Security Operations | CCSP D2: Cloud Data Security | CISM D3: Information Security Program | CISSP D3: Security Architecture and Engineering | Security+ D1: General Security Concepts | SSCP D5: Cryptography
Related Articles: