Document 3
Document 3
---
- **SHA-3**:
- A newer hashing standard based on the Keccak algorithm.
- Designed to be resistant to current cryptographic attacks.
- **Password Storage**:
Instead of storing plain-text passwords, systems store hashed passwords. Adding a
random **salt** makes it harder for attackers to use precomputed hash tables
(rainbow tables).
- **Digital Signatures**:
Hash functions are used to verify the integrity of signed messages in
cryptographic protocols like RSA and ECDSA.
- **Data Integrity**:
Checksums based on hash functions help detect accidental modifications or
corruption in files and network transmissions.
- **Blockchain and Cryptocurrencies**:
- Bitcoin uses SHA-256 for transaction verification and proof-of-work mining.
- Ethereum uses Keccak-256 for securing blockchain data.
---