NIST launched a competition in 2007 to develop a new cryptographic hash algorithm, SHA-3, after existing algorithms like SHA-1 were found to be vulnerable to attacks. The competition involved public input and evaluation of various algorithms, and it concluded in 2012 with KECCAK being selected as the winner. KECCAK was then standardized as SHA-3, providing a more secure alternative for cryptographic applications such as digital signatures and data integrity checks.
The competition was a response to security concerns with older hash functions and aimed to ensure the continued reliability of cryptographic standards. SHA-3 is now widely used in security systems, offering improved resistance to attacks compared to its predecessors. The development and standardization of SHA-3 took about five years, from the start of the competition in 2007 to its final approval in 2012.
Source: https://www.nist.gov/programs-projects/cryptographic-hash-algorithm-competition
Keywords: SHA-3, hash function, NIST