No comment on commercial tools since our shop builds and integrates software. We rely heavily upon hash function guidance provided by NIST. Specifically, we reference FIPS 202, which specifies the new SHA-3 family of permutation-based functions based onKECCAKas a result of the“SHA-3” Cryptographic Hash Algorithm Competition.
FIPS 202 specifies:
Four fixed-length hash algorithms: SHA3-224, SHA3-256, SHA3-384, and SHA3-512; and
Two closely related, “extendable-output” functions (XOFs): SHAKE128 and SHAKE256.
Currently, only the four fixed-length SHA-3 algorithms areapprovedhash algorithms, providing alternatives to the SHA-2 family of hash functions.
A lot of these algorithms have found their way into the Legion of the Bouncy Castle Java cryptography APIs and FIPS mode "jars" so that makes including the functions easy.