Difference between revisions of "SHA-256"
(4 intermediate revisions by the same user not shown) | |||
Line 1: | Line 1: | ||
− | '''SHA-256''' is a hash function in the '''SHA-2''' family. '''SHA''' stands for '''Secure Hash Algorithm''' and refers to a set of cryptographic hash functions designed by the National Security Agency and published by the National Institute of Standards and Technology as a U.S. Federal Information Processing Standard. The cryptographic hash function, a basic tool of modern cryptography, is a mathematical algorithm that maps data of arbitrary size to a bit array of a fixed size ("hash"). '''SHA-256''' uses 32-byte words. In computing, a word is the natural unit of data used by a particular processor design. | + | '''SHA-256''' is a hash function in the '''SHA-2''' family. '''SHA''' stands for '''Secure Hash Algorithm''' and refers to a set of cryptographic hash functions designed by the National Security Agency and published by the National Institute of Standards and Technology as a U.S. Federal Information Processing Standard. The cryptographic hash function, a basic tool of modern cryptography, is a mathematical algorithm that maps data of arbitrary size to a bit array of a fixed size ("hash"). A hash is like a signature or fingerprint for a data set. '''SHA-256''' uses 32-byte words. In computing, a word is the natural unit of data used by a particular processor design. '''SHA-256''' is considered a "one-way" function and thus is suitable for checking the integrity of data. |
+ | |||
+ | Example: | ||
+ | |||
+ | '''String:''' | ||
+ | |||
+ | <code>Hello world!</code> | ||
+ | |||
+ | '''SHA-256 (produces a 256-bit (32-byte) hash value):''' | ||
+ | |||
+ | c0535e4be2b79ffd93291305436bf889314e4a3faec05ecffcbb7df31ad9e51a | ||
+ | |||
+ | ===See also:=== | ||
+ | [[Cryptographic Fingerprint (SHA 256 Hash)]] | ||
+ | |||
+ | [[Category:Glossary]] | ||
+ | [[Category:Technical]] |
Latest revision as of 18:29, 31 July 2020
SHA-256 is a hash function in the SHA-2 family. SHA stands for Secure Hash Algorithm and refers to a set of cryptographic hash functions designed by the National Security Agency and published by the National Institute of Standards and Technology as a U.S. Federal Information Processing Standard. The cryptographic hash function, a basic tool of modern cryptography, is a mathematical algorithm that maps data of arbitrary size to a bit array of a fixed size ("hash"). A hash is like a signature or fingerprint for a data set. SHA-256 uses 32-byte words. In computing, a word is the natural unit of data used by a particular processor design. SHA-256 is considered a "one-way" function and thus is suitable for checking the integrity of data.
Example:
String:
Hello world!
SHA-256 (produces a 256-bit (32-byte) hash value):
c0535e4be2b79ffd93291305436bf889314e4a3faec05ecffcbb7df31ad9e51a