Difference between revisions of "SHA-256"

From Market Ruler Help
Jump to: navigation, search
(Created page with "'''SHA''' stands for '''Secure Hash Algorithm''' and refers to a family of cryptographic hash functions published by the National Institute of Standards and Technology. SHA-2")
 
 
(5 intermediate revisions by the same user not shown)
Line 1: Line 1:
'''SHA''' stands for '''Secure Hash Algorithm''' and refers to a family of cryptographic hash functions published by the National Institute of Standards and Technology. SHA-2
+
'''SHA-256''' is a hash function in the '''SHA-2''' family. '''SHA''' stands for '''Secure Hash Algorithm''' and refers to a set of cryptographic hash functions designed by the National Security Agency and published by the National Institute of Standards and Technology as a U.S. Federal Information Processing Standard. The cryptographic hash function, a basic tool of modern cryptography, is a mathematical algorithm that maps data of arbitrary size to a bit array of a fixed size ("hash"). A hash is like a signature or fingerprint for a data set. '''SHA-256''' uses 32-byte words. In computing, a word is the natural unit of data used by a particular processor design. '''SHA-256''' is considered a "one-way" function and thus is suitable for checking the integrity of data.
 +
 
 +
Example:
 +
 
 +
'''String:'''
 +
 
 +
<code>Hello world!</code>
 +
 +
'''SHA-256 (produces a 256-bit (32-byte) hash value):'''
 +
 +
c0535e4be2b79ffd93291305436bf889314e4a3faec05ecffcbb7df31ad9e51a
 +
 
 +
===See also:===
 +
[[Cryptographic Fingerprint (SHA 256 Hash)]]
 +
 
 +
[[Category:Glossary]]
 +
[[Category:Technical]]

Latest revision as of 18:29, 31 July 2020

SHA-256 is a hash function in the SHA-2 family. SHA stands for Secure Hash Algorithm and refers to a set of cryptographic hash functions designed by the National Security Agency and published by the National Institute of Standards and Technology as a U.S. Federal Information Processing Standard. The cryptographic hash function, a basic tool of modern cryptography, is a mathematical algorithm that maps data of arbitrary size to a bit array of a fixed size ("hash"). A hash is like a signature or fingerprint for a data set. SHA-256 uses 32-byte words. In computing, a word is the natural unit of data used by a particular processor design. SHA-256 is considered a "one-way" function and thus is suitable for checking the integrity of data.

Example:

String:

Hello world!

SHA-256 (produces a 256-bit (32-byte) hash value):

c0535e4be2b79ffd93291305436bf889314e4a3faec05ecffcbb7df31ad9e51a

See also:

Cryptographic Fingerprint (SHA 256 Hash)