The SHA (Secure Hash Algorithm) family
Consists of cryptographic hash functions designed by the National Security Agency (NSA) and published by the National Institute of Standards and Technology (NIST). These hash functions are widely used for various security applications, including data integrity verification, digital signatures, and password storage. The SHA family includes several variants with different hash sizes, providing flexibility for different security requirements.
Brief Info
1. SHA-1 (Secure Hash Algorithm 1)
Output Size 160 bits (20 bytes)
Notable Usage Once widely used, but vulnerabilities to collision attacks have led to its deprecation in favor of more secure hash functions.
2. SHA-224
Output Size 224 bits (28 bytes)
Derived from SHA-256, providing a shorter hash value.
3. SHA-256
Output Size 256 bits (32 bytes)
Commonly used for data integrity verification, digital signatures, and various cryptographic applications.
4. SHA-384
Output Size 384 bits (48 bytes)
Derived from SHA-512, providing a shorter hash value with increased security.
5. SHA-512
Output Size 512 bits (64 bytes)
Offers a larger hash size for applications requiring higher security.
6. SHA-3 (Secure Hash Algorithm 3)
SHA-3 is the latest member of the SHA family, designed by Keccak and selected as the winner of the NIST hash function competition.
SHA-3 includes multiple hash sizes SHA3-224, SHA3-256, SHA3-384, SHA3-512, SHA3-224, SHA3-256, SHA3-384, SHA3-512.
Comments
Post a Comment
Provide your valuable feedback, we would love to hear from you!! Follow our WhatsApp Channel at
https://whatsapp.com/channel/0029VaKapP65a23urLOUs40y