Keccak-256
Keccak-256 is a cryptographic hash function that produces a 256-bit output from any given input. It is a member of the Keccak family of algorithms, which won the SHA-3 competition organized by the National Institute of Standards and Technology (NIST) in 2012. While SHA-3 is the standardized version, Ethereum specifically uses Keccak-256, which slightly differs in its padding and configuration. It is widely used for securing blockchain data, creating digital signatures, and generating wallet addresses.
How Does Keccak-256 Work?
Keccak-256 belongs to the family of sponge construction algorithms. This means it absorbs input data into a state, mixes it using a complex permutation function, and then squeezes out a fixed-length hash.
Key properties:
- Deterministic:
The same input always gives the same output - Fast and lightweight:
Suitable for embedded and smart contract use - Collision-resistant:
Extremely difficult to find two different inputs with the same output - Irreversible:
The original input cannot be reconstructed from the hash
These traits make Keccak-256 ideal for securing blockchain data and verifying integrity.
Why Does Ethereum Use Keccak-256?
Unlike Bitcoin, which uses SHA-256, Ethereum relies on Keccak-256 for several core functionalities:
- Address generation:
Ethereum wallet addresses are derived from Keccak-256 hashes - Smart contract verification:
Function selectors and internal calls depend on hashed signatures - Transaction integrity:
Hashing ensures transactions cannot be altered after submission
Ethereum uses a non-standardized version of SHA-3 (pre-finalization), which is why it’s still called Keccak-256 and not simply SHA3-256.
Keccak-256 vs SHA-256
While both Keccak-256 and SHA-256 are cryptographic hash algorithms, they differ significantly in structure:
- SHA-256 is based on the Merkle–Damgård construction
- Keccak-256 uses a sponge construction for more flexibility
- SHA-256 is used in Bitcoin and Proof-of-Work
- Keccak-256 is used in Ethereum and smart contract platforms
Keccak-256 is considered equally secure, with some researchers suggesting it may offer greater resistance to certain attacks.
Use Cases Beyond Ethereum
Keccak-256 is also used in:
- Other EVM-compatible chains (e.g. BNB Chain, Polygon)
- Decentralized identity protocols
- Hash-based digital signatures
- Off-chain data validation and integrity tools
Its versatility and efficiency make it a trusted standard in the crypto industry.
Final Thoughts
Keccak-256 is one of the most important cryptographic tools in modern blockchain technology. It powers Ethereum’s security model, ensures transaction integrity, and protects user data.
Although it often operates behind the scenes, its role is foundational. For anyone working with Ethereum or smart contracts, understanding Keccak-256 is crucial — because it’s the cryptographic glue that holds the system together.