SHA - 256 (Secured Hashing Algorithm)
SHA - 256 (Secured Hashing Algorithm)
Hashing Algorithm)
D . S A I K U M A R - 1 D S 1 8 E C 11 6
S . R E D D Y T H R I N AT H - 1 D S 1 8 E C 1 4 0
S.SRI HARSHA PHANI-1DS18EC151
Introduction
The SHA-256 algorithm is one flavor of SHA-2(secured Hash Algorithm 2) which was created by the
National Security Agency in 2001 as a successor to SHA-1.SHA-256 is a patented cryptographic hash
function that outputs a value that is 256 bits long.
The SHA-256 is a developed by the NSA & NIST joint development and has a multiple familes such as
SHA-0,SHA-1,SHA-2 & SHA-3.
The significance of the 256 in the name stands for the final hash digest value, i.e. irrespective of the size of
plaintext/clear text, the hash value will always be 256 bits. The other algorithms in the SHA family are
more or less similar to SHA 256.
SHA-256, or Secure Hash Algorithm 256, is a hashing algorithm used to convert text of any length into a
fixed-size string of 256 bits (32 bytes).
SHA256 is irreversible as it is a hashing function, not an encryption function. Secondly, since SHA256 is not
an encryption function, it cannot be decrypted.
SHA Charcteristics
Message Length: The length of the cleartext should be less than 264 bits. The size needs to be in the
comparison area to keep the digest as random as possible.
Digest Length: The length of the hash digest should be 256 bits in SHA 256 algorithm, 512 bits in SHA-512,
and so on. Bigger digests usually suggest significantly more calculations at the cost of speed and space.
Irreversible: By design, all hash functions such as the SHA 256 are irreversible. You should neither get a
plaintext when you have the digest beforehand nor should the digest provide its original value when you
pass it through the hash function again.
Applications
Digital Signature Verification: Digital signatures follow asymmetric encryption methodology to verify the
authenticity of a document/file. Hash algorithms like SHA 256 go a long way in ensuring the verification of the
signature.
Password Hashing: As discussed above, websites store user passwords in a hashed format for two benefits. It
helps foster a sense of privacy, and it lessens the load on the central database since all the digests are of
similar size.
SSL Handshake: The SSL handshake is a crucial segment of the web browsing sessions, and it’s done using SHA
functions. It consists of your web browsers and the web servers agreeing on encryption keys and hashing
authentication to prepare a secure connection.
integrity Checks: As discussed above, verifying file integrity has been using variants like SHA 256 algorithm
and the MD5 algorithm. It helps maintain the full value functionality of files and makes sure they were not
altered in transit.