Market Cap: $2.53T 0.73% 24h Vol: $76.18B 45.00% BTC Dom: 56.37% 0.06%

SHA-3 Algorithm | cryptocurrencies, blockchains & live prices

Explore all 16 cryptocurrencies using SHA-3. Track live prices, market capitalization, and 24-hour trading volume.

Category: Hashing

What is SHA-3?

SHA-3 is a cryptographic algorithm used by blockchain networks for hashing and mining operations. Blockspot.io tracks 16 cryptocurrencies using SHA-3, of which 8 are currently active. 1 blockchain networks use SHA-3.

SHA-3 (Secure Hash Algorithm 3) is the latest member of the Secure Hash Algorithm family, standardized by NIST in 2015 as FIPS 202. It is based on the Keccak algorithm and uses a sponge construction, fundamentally different from the Merkle-Damgård structure employed by SHA-1 and SHA-2. The sponge construction works in two phases: an absorbing phase where input blocks are XORed into a subset of the internal state and permuted, and a squeezing phase where output blocks are extracted from the state. SHA-3 operates on a 1600-bit state using the Keccak-f[1600] permutation, which consists of 24 rounds of five step mappings that provide thorough diffusion and confusion of the input data.

SHA-3 offers several important security advantages over its predecessors. Its completely different internal structure from SHA-2 provides algorithmic diversity — if a fundamental flaw were ever discovered in the Merkle-Damgård paradigm, SHA-3 would remain unaffected. The sponge construction inherently resists length extension attacks without requiring wrapper constructions like HMAC. SHA-3 supports multiple output lengths (SHA3-224, SHA3-256, SHA3-384, SHA3-512) as well as extendable-output functions (SHAKE128 and SHAKE256) that can produce arbitrary-length digests. While SHA-3 is somewhat slower than SHA-2 in software implementations on modern CPUs, it excels in hardware implementations where its simple bitwise operations enable compact and efficient circuits.

SHA-3 was selected through NIST's public hash function competition, which ran from 2007 to 2012 and evaluated 64 initial submissions. Keccak was chosen as the winner based on its large security margin, elegant design, and strong performance in hardware. In the cryptocurrency space, SHA-3 is used directly as a mining algorithm by a small number of projects, though its broader influence is felt through its adoption in various blockchain protocols for internal hashing operations. The algorithm serves as an important backup to SHA-2 in the global cryptographic infrastructure, ensuring that the world has a well-vetted alternative hash function ready for deployment should weaknesses in SHA-2 ever emerge.

Read more ↓

SHA-3 statistics

$9.68M Combined Market Cap
Total Coins 16
Active Coins 8
Blockchains Using 1
Coins With Price 2
Top coins
1 Bitcoin File BIFI $7.46M
2 Nexus NXS $2.22M

All SHA-3 cryptocurrencies

Browse all cryptocurrencies using SHA-3 with live prices, market cap, and trading volume.
# Coin Ticker Price 24h % Market Cap Volume (24h)

Advertise

Are you looking to advertise? We offer press release publications, display banners, featured listings and more.

Contact us for questions, submit a PR or request our media kit.