Cryptographic hashing algorithms play a pivotal role in securing digital information, ensuring data integrity, and verifying authenticity. Among the plethora of hash functions, the SHA-3 (Secure Hash Algorithm 3) stands out as a significant milestone in cryptographic hash functions. The SHA-3 algorithm, developed by Keccak, was chosen through a rigorous…