Secure Hash Algorithm (hash) engine allows direct processing of arbitrary length messages using a variety of hashing algorithms.
The SHA2 group, especially SHA-512, is probably the most easily available highly secure hashing algorithms available.
SHA-256 algorithm generates an almost-unique, fixed size 256-bit (32-byte) hash. Hash is a one way function – it cannot be decrypted back.
Calculate a SHA hash with 512 Bits from your sensitive data like passwords.
There are several well-known hash functions in use today:
- Hashed Message Authentication Code (HMAC): Combines authentication via a shared secret with hashing.
- Message Digest 2 (MD2): Byte-oriented, produces a 128-bit hash value from an arbitrary-length message, designed for smart cards.
- MD4: Similar to MD2, designed specifically for fast processing in software.
- MD5: Similar to MD4 but slower because the data is manipulated more. Developed after potential weaknesses were reported in MD4.
- Secure Hash Algorithm (SHA): Modeled after MD4 and proposed by NIST for the Secure Hash Standard (SHS), produces a 160-bit hash value.