Secure Hash Algorithm (SHA)

SHA is used to generate unique fixed-length digital fingerprints of input data known as hashes. SHA variations such as SHA-2 and SHA-3 are commonly used to ensure data integrity and authenticity. The tiniest change in input data drastically modifies the hash output, indicating a loss of integrity. Hashing is the process of storing key value pairs with the help of a hash function into a hash table.

Characteristics of Secure Hash Algorithm (SHA)

  • Security: The SHA 256 is highly recognized for its robust security features, among hashing algorithms. It effectively prevents collision attacks ensuring that different inputs do not produce the hash value. Websites prioritize user privacy by storing passwords in a format.
  • One-way hashing: Using SHA algorithms for one way hashing enables the storage of information like passwords. Data hashing into a fixed length output simplifies indexing and comparisons. Even a minor change in the message results, in a hash when using SHA algorithms facilitating the identification of corrupted data.
  • Avalanche effect: A small change in the input value, even a single bit, completely changes the resultant hash value. This is called the
  • Variable input length and fixed output length: SHA algorithm consits of a variable input length (meaning the length of input is dynamic) and a fixed output length.

Basics of Cryptographic Algorithms

Cryptography is a process of hiding transmitted information by the sender such that it may be read only by the intended recipient. In this article, we will learn more about various cryptographic algorithms. Cryptography is widely used in various fields such as end-to-end messaging, banking and finance, secure web communication, and access control.

Similar Reads

What are Cryptographic Algorithms?

A cryptographic algorithm is a set of steps that can be used to convert plain text into cipher text. A cryptographic algorithm is also known as an encryption algorithm....

Types of Cryptographic Algorithms

To protect sensitive data and conversations, cryptography uses complex algorithms. These mathematical formulas enable the encryption, decryption, signature, and verification processes that protect secret data during transmission and storage....

1. Advanced Encryption Standard (AES)

AES (Advanced Encryption Standard) is a popular encryption algorithm which uses the same key for encryption and decryption It is a symmetric block cipher algorithm with block size of 128 bits, 192 bits or 256 bits. AES algorithm is widely regarded as the replacement of DES (Data encryption standard) algorithm, which we will learn more about later in this article....

2. Data Encryption Standard (DES)

DES is an older encryption algorithm that is used to convert 64-bit plaintext data into 48-bit encrypted ciphertext. It uses symmetric keys (which means same key for encryption and decryption). It is kind of old by today’s standard but can be used as a basic building block for learning newer encryption algorithms....

3. RSA Algorithm (Rivest, Shamir, Adleman Algorithm)

So, RSA is an basic asymmetric cryptographic algorithm which uses two different keys for encryption. The RSA algorithm works on a block cipher concept that converts plain text into cipher text and vice versa....

4. Secure Hash Algorithm (SHA)

SHA is used to generate unique fixed-length digital fingerprints of input data known as hashes. SHA variations such as SHA-2 and SHA-3 are commonly used to ensure data integrity and authenticity. The tiniest change in input data drastically modifies the hash output, indicating a loss of integrity. Hashing is the process of storing key value pairs with the help of a hash function into a hash table....

Conclusion

In conclusion, there are 4 major types of cryptographic algorithms namely AES, DES, RSA & SHA. Cryptographic algorithms are use to implement cryptography in its real world application while Cryptography is the study of these algorithms. Cryptography is very important for secure data transmission and preventing various data leaks....

Frequently Asked Questions on Basics of Cryptographic Algorithms – FAQs

What is the most secure cryptographic algorithm?...