All Algorithms
SHA-3-256
Conditionally SafeHash Function algorithm
This algorithm is safe with sufficient key/output size. Grover's algorithm halves the effective security level.
Algorithm Details
Category
Hash Function
Quantum Safety
Conditionally Safe
Key Lengths (bits)
256
FIPS Standard
FIPS 202
Known Vulnerabilities
- Grover's algorithm (collision resistance ~85-bit, preimage ~128-bit)
Notes
Keccak-based hash. Different internal structure from SHA-2 provides algorithm diversity. Quantum-safe at this output size.
Discover which algorithms your organization is using.
Run Free Assessment