A cryptographic hash function converts arbitrarily long input data into a predetermined fixed-length output value. Hash functions generally include padding as well as termination schemes that work in union with the function itself to provide greater security to the output value. The most commonly used cryptographic » Continue Reading.
Tag: hash function
SHA-1 is a cryptographic hash function that can convert an arbitrarily long string of data into a digest with a fixed size of 160 bits. This digest is commonly displayed as a 40 character hexadecimal number. The SHA-1 algorithm is considered insecure, and is being deprecated » Continue Reading.
SHA-2 refers to a family of cryptographic hash functions that can convert arbitrarily long strings of data into digests of a fixed size. This digest is commonly displayed as a fixed value hexadecimal number. (SHA-256, for instance, returns a 64 character code.) SHA-2 has supplanted SHA-1 in security protocols like SSL/TLS. » Continue Reading.