In cryptography, the Secure Hashing Algorithms are a group of cryptographic hash functions released by the National Institute of Standards and Technology (NIST).[1] The algorithms take an input and produce a hash value (often shown in hexadecimal).[2] The length of the hash depends on the digest length of the algorithm.

Family

  • SHA-0: It was the name used for the original Secure Hashing Algorithm that was released in 1993. It was no longer used because it was not safe to use and was quickly replaced with SHA-1.[3]
  • SHA-1: It is the first name used for the official Secure Hashing Algorithm. It was released after a weakness in SHA-0. It was made by the National Security Agency (NSA).[4] It was also found to be weak and unsafe.[5]
  • SHA-2: It is one of the most popular type of SHA.[6] There are options to set the length (by changing the digest size) of the hash to 256 or 512 bits.[5] SHA256 and SHA512 refer to these algorithms. It was also made by the National Security Agency.
  • SHA-3 (Keccak)[7][8]: The latest type of SHA. It was made by Guido Bertoni, Joan Daemen, Michaël Peeters and Gilles Van Assche.[8] It was selected after a competition held by the NIST.[9]

The Secure Hashing Algorithms, being Federal Information Processing Standard (FIPS) compliant algorithms are subject to the Cryptographic Algorithm Validation Program[10]

References

Wikiwand in your browser!

Seamless Wikipedia browsing. On steroids.

Every time you click a link to Wikipedia, Wiktionary or Wikiquote in your browser's search results, it will show the modern Wikiwand interface.

Wikiwand extension is a five stars, simple, with minimum permission required to keep your browsing private, safe and transparent.