Software resources

Different software implementations of Keccak, the standard SHA-3 and SHAKE functions, Ketje, Keyak and Kravatte are available. The first place to look for an implementation is the Keccak Code Package. For reference implementations and tools for cryptanalysis, we propose KeccakTools. There are also plenty of third-party implementations in different languages, as in the non-exhaustive selection below.

For software performance figures, see this page. For older packages, see the archives.

The Keccak code package

The Keccak Code Package (or KCP) gathers different free and open-source implementations of Keccak and closely related variants, such as the SHAKE extendable-output functions and SHA-3 hash functions, the cSHAKE, KMAC, ParallelHash and TupleHash functions, the Ketje and Keyak authenticated encryption schemes, the fast KangarooTwelve extendable-output function and the Kravatte pseudo-random function.

The KCP is organized in a way that one can easily switch between optimized implementations of the Keccak-p permutations for different platforms, without touching on the higher-level code.

Written in C and in assembly, the KCP also contains some standalone implementations in Python and Rust.


KeccakTools is a set of C++ classes that can help analyze Keccak and the related variants.

KeccakTools contains:

  • the reference implementation of the Keccak-p permutations, and of most of the Keccak instances and variants, including Ketje, Keyak and Kravatte;
  • the generation of optimized code for the round function of Keccak-p;
  • the generation of mathematical equations underlying the operations in Keccak-p;
  • a plethora of tools to analyze Keccak-p under differential and linear cryptanalysis, as used to prove lower bounds on the weight of trails.

Third-party implementations

First, this list identifies implementations that have been validated by NIST as SHA-3.

Then, the following open-source libraries integrate Keccak, SHA-3 and/or SHAKE functions.

Some blockchain-based projects use Keccak and therefore contain their implementation, e.g.,

Finally, here is a non-exhaustive list of other implementations that can be found on the web. (If you feel your implementation should be in that list, do not hesitate to drop us an email.)

fehashmacHarald von FellenbergCKeccak, SHA-3, SHAKE, KMAC
keccak-tinyDavid Leon GilCA tiny implementation of SHA-3, SHAKE, Keccak, and sha3sum
libkeccak and sha3sumMattias AndréeCKeccak, SHA-3, SHAKE
sha3sum and then someJim McDevittCKeccak, SHA-3, SHAKE and a highly parameterizable utility program
tiny_sha3Markku-Juhani O. SaarinenCVery small, readable implementation of SHA-3 and SHAKE
digestppkerukuroC++Keccak, SHA-3, SHAKE, cSHAKE, KMAC, KangarooTwelve
elm-keccakprozacchiwawaelmKeccak, SHA-3
Fork of golang-cryptochainGoKeccak, SHA-3, SHAKE, cSHAKE, KMAC, TupleHash
GoKangarooTwelveDavid WongGoKangarooTwelve
StrobeGoDavid WongGoThe Strobe protocol (Keccak-f[1600])
CryptographyBobulousJavaKeccak, SHA-3, SHAKE
js-sha3Chen, Yi-CyuanJavaScriptKeccak, SHA-3, SHAKE, cSHAKE, KMAC
Digest::SHA3Mark ShelorPerlSHA-3, SHAKE
tiny-keccakMarek KotewiczRustKeccak, SHA-3, SHAKE
libkeccak and ksumDaniel KingSPARK/AdaKeccak, SHA-3, SHAKE, cSHAKE, KMAC, KangarooTwelve, TupleHash, ParallelHash