This document analyzes the performance of SHA-2 and SHA-3 finalists using cycles per byte as a metric, highlighting that SKIN and BLAKE from the SHA-3 finalists perform comparably to SHA-2. The evaluation emphasizes the importance of security, performance, and cost, with SHA-3 designed to provide a robust alternative to SHA-2. Implementations and tests were conducted in Java on various systems, revealing differing performance results based on input size and algorithm used.