# Difference between revisions of "SHA-256"

(One intermediate revision by the same user not shown) | |||

Line 10: | Line 10: | ||

c0535e4be2b79ffd93291305436bf889314e4a3faec05ecffcbb7df31ad9e51a | c0535e4be2b79ffd93291305436bf889314e4a3faec05ecffcbb7df31ad9e51a | ||

+ | |||

+ | |||

+ | [[Category:Glossary]] | ||

+ | [[Category:Technical]] |

## Revision as of 14:41, 31 July 2020

**SHA-256** is a hash function in the **SHA-2** family. **SHA** stands for **Secure Hash Algorithm** and refers to a set of cryptographic hash functions designed by the National Security Agency and published by the National Institute of Standards and Technology as a U.S. Federal Information Processing Standard. The cryptographic hash function, a basic tool of modern cryptography, is a mathematical algorithm that maps data of arbitrary size to a bit array of a fixed size ("hash"). A hash is like a signature or fingerprint for a data set. **SHA-256** uses 32-byte words. In computing, a word is the natural unit of data used by a particular processor design. **SHA-256** is considered a "one-way" function and thus is suitable for checking the integrity of data.

Example:

**String:**

`Hello world!`

**SHA-256 (produces a 256-bit (32-byte) hash value):**

c0535e4be2b79ffd93291305436bf889314e4a3faec05ecffcbb7df31ad9e51a