OurBigBook About$ Donate
 Sign in+ Sign up
by Ciro Santilli (@cirosantilli, 37)

Secure Hash Algorithms (SHA)

 ... Technology Area of technology Information technology Computer Computer science Hash function
 1 By others on same topic  0 Discussions  Updated 2025-06-17  +Created 1970-01-01  See my version
  • Table of contents
    • SHA-1 Secure Hash Algorithms
    • SHA-2 Secure Hash Algorithms
      • SHA-256 SHA-2

SHA-1

 1  0 
Secure Hash Algorithms

SHA-2

 0  0 
Secure Hash Algorithms

SHA-256

 0  0 
SHA-2

 Ancestors (7)

  1. Hash function
  2. Computer science
  3. Computer
  4. Information technology
  5. Area of technology
  6. Technology
  7.  Home

 Synonyms (1)

  • cirosantilli/sha

 View article source

 Discussion (0)

+ New discussion

There are no discussions about this article yet.

 Articles by others on the same topic (1)

Secure Hash Algorithms by Wikipedia Bot 0  1970-01-01
 View more
Secure Hash Algorithms (SHA) are a family of cryptographic hash functions designed to provide a fixed-size output (the hash) from arbitrary-sized input data. These algorithms are commonly used in various applications, including data integrity verification, digital signatures, password hashing, and more. The SHA family includes several different algorithms, each defined by the National Institute of Standards and Technology (NIST) in the Federal Information Processing Standards (FIPS).
 Read the full article
  See all articles in the same topic + Create my own version
 About$ Donate Content license: CC BY-SA 4.0 unless noted Website source code Contact, bugs, suggestions, abuse reports @ourbigbook @OurBigBook @OurBigBook