All Algorithms

SHA-3-256

Conditionally Safe

Hash Function algorithm

This algorithm is safe with sufficient key/output size. Grover's algorithm halves the effective security level.

Algorithm Details

Category

Hash Function

Quantum Safety

Conditionally Safe

Key Lengths (bits)

256

FIPS Standard

FIPS 202

Known Vulnerabilities

  • Grover's algorithm (collision resistance ~85-bit, preimage ~128-bit)

Notes

Keccak-based hash. Different internal structure from SHA-2 provides algorithm diversity. Quantum-safe at this output size.

Discover which algorithms your organization is using.

Run Free Assessment
NetflixOracleFigmaCoinbaseDellServiceNowAppleDeloitteNikeAWSJPMorgan ChaseT-MobileAtlassianBoschStripeL'OrealDatadogMicrosoftPalantirHPRobinhoodEYSonyCanvaVisaAutoCADDiscordBellAdobeCharles SchwabE*TRADENVIDIAGoogleJohnson & JohnsonFidelityClaudeMastercardIntuitBoeingAT&TShopifyPwCOpenAIKPMGIBMDatabricksSalesforceGitHubAmerican ExpressWorkday