Secure Hash Algorithm (SHA)
SHA is used to generate unique fixed-length digital fingerprints of input data known as hashes. SHA variations such as SHA-2 and SHA-3 are commonly used to ensure data integrity and authenticity. The tiniest change in input data drastically modifies the hash output, indicating a loss of integrity. Hashing is the process of storing key value pairs with the help of a hash function into a hash table.
Characteristics of Secure Hash Algorithm (SHA)
- Security: The SHA 256 is highly recognized for its robust security features, among hashing algorithms. It effectively prevents collision attacks ensuring that different inputs do not produce the hash value. Websites prioritize user privacy by storing passwords in a format.
- One-way hashing: Using SHA algorithms for one way hashing enables the storage of information like passwords. Data hashing into a fixed length output simplifies indexing and comparisons. Even a minor change in the message results, in a hash when using SHA algorithms facilitating the identification of corrupted data.
- Avalanche effect: A small change in the input value, even a single bit, completely changes the resultant hash value. This is called the
- Variable input length and fixed output length: SHA algorithm consits of a variable input length (meaning the length of input is dynamic) and a fixed output length.
Basics of Cryptographic Algorithms
Cryptography is a process of hiding transmitted information by the sender such that it may be read only by the intended recipient. In this article, we will learn more about various cryptographic algorithms. Cryptography is widely used in various fields such as end-to-end messaging, banking and finance, secure web communication, and access control.