Difference between revisions of "SHA-256"
Line 11: | Line 11: | ||
c0535e4be2b79ffd93291305436bf889314e4a3faec05ecffcbb7df31ad9e51a | c0535e4be2b79ffd93291305436bf889314e4a3faec05ecffcbb7df31ad9e51a | ||
+ | ===See also:=== | ||
+ | [[Cryptographic Fingerprint (SHA 256 Hash)]] | ||
[[Category:Glossary]] | [[Category:Glossary]] | ||
[[Category:Technical]] | [[Category:Technical]] |
Latest revision as of 18:29, 31 July 2020
SHA-256 is a hash function in the SHA-2 family. SHA stands for Secure Hash Algorithm and refers to a set of cryptographic hash functions designed by the National Security Agency and published by the National Institute of Standards and Technology as a U.S. Federal Information Processing Standard. The cryptographic hash function, a basic tool of modern cryptography, is a mathematical algorithm that maps data of arbitrary size to a bit array of a fixed size ("hash"). A hash is like a signature or fingerprint for a data set. SHA-256 uses 32-byte words. In computing, a word is the natural unit of data used by a particular processor design. SHA-256 is considered a "one-way" function and thus is suitable for checking the integrity of data.
Example:
String:
Hello world!
SHA-256 (produces a 256-bit (32-byte) hash value):
c0535e4be2b79ffd93291305436bf889314e4a3faec05ecffcbb7df31ad9e51a