Difference between revisions of "SHA-256"

From Market Ruler Help
Jump to: navigation, search
 
Line 11: Line 11:
 
  c0535e4be2b79ffd93291305436bf889314e4a3faec05ecffcbb7df31ad9e51a
 
  c0535e4be2b79ffd93291305436bf889314e4a3faec05ecffcbb7df31ad9e51a
  
 +
===See also:===
 +
[[Cryptographic Fingerprint (SHA 256 Hash)]]
  
 
[[Category:Glossary]]
 
[[Category:Glossary]]
 
[[Category:Technical]]
 
[[Category:Technical]]

Latest revision as of 18:29, 31 July 2020

SHA-256 is a hash function in the SHA-2 family. SHA stands for Secure Hash Algorithm and refers to a set of cryptographic hash functions designed by the National Security Agency and published by the National Institute of Standards and Technology as a U.S. Federal Information Processing Standard. The cryptographic hash function, a basic tool of modern cryptography, is a mathematical algorithm that maps data of arbitrary size to a bit array of a fixed size ("hash"). A hash is like a signature or fingerprint for a data set. SHA-256 uses 32-byte words. In computing, a word is the natural unit of data used by a particular processor design. SHA-256 is considered a "one-way" function and thus is suitable for checking the integrity of data.

Example:

String:

Hello world!

SHA-256 (produces a 256-bit (32-byte) hash value):

c0535e4be2b79ffd93291305436bf889314e4a3faec05ecffcbb7df31ad9e51a

See also:

Cryptographic Fingerprint (SHA 256 Hash)