…
Secure Hashing Algorithm or SHA is a modified version of MD5 that uses bitwise operations, modular additions, and compression functions to reduce the input data into a smaller form. The main distinction between hashing and encryption is that hashing is one-way; once data has been hashed, the resulting hash digest cannot be decrypted unless a brute force assault is applied.
Secure Hash Algorithm (hash) engine allows direct processing of arbitrary length messages using a variety of hashing algorithms.
The SHA2 group, especially SHA-512, is probably the most easily available highly secure hashing algorithms available.
SHA-256 algorithm generates an almost-unique, fixed size 256-bit (32-byte) hash. Hash is a one way function – it cannot be decrypted back.
Calculate a SHA hash with 512 bits from your sensitive data like passwords.
There are several well-known hash functions in use today:
BASIC is to computer programming as QWERTY is to typing.
…