Test vectors for HMAC-SHA-3
This page originally provided some provisional test vectors for the HMAC-SHA-3 family of message authentication schemes using the SHA-3 secure hash algorithm (Keccak) published in October 2012. This turns out to have been premature.
Creating a MAC with SHA-3
From the Keccak page:
Unlike SHA-1 and SHA-2, Keccak does not have the length-extension weakness, hence does not need the HMAC nested construction. Instead, MAC computation can be performed by simply prepending the message with the key.
MAC(k, M) = SHA3(k || M).
There still might eventually be be an officially-approved HMAC construction using SHA-3. Let's wait and see.
For more information, or to comment on this page, please send us a message.
This page first published 2 November 2012. Last updated 16 August 2014.