[WEBINAR] The New Normal: Dealing with the Reality of an Unsecure World

Secure Hash Algorithm 2 (SHA-2)

Definition - What does Secure Hash Algorithm 2 (SHA-2) mean?

The Secure Hash Algorithm 2 (SHA-2) is a computer security cryptographic algorithm. It was created by the US National Security Agency (NSA) in collaboration with the National Institute of Science and Technology (NIST) as an enhancement to the SHA-1 algorithm. SHA-2 has six different variants, which differ in proportion with the bit size used for encrypting data.

Techopedia explains Secure Hash Algorithm 2 (SHA-2)

The SHA-2 family of hash functions includes:

  • SHA-224
  • SHA-256
  • SHA-284
  • SHA-512
  • SHA-512/224
  • SHA-512/256

The number in each variant represents the bit values. SHA-2 provides better prevention against collision, meaning the same input data always has a different hash value. SHA-2 uses from 64 to 80 rounds of cryptography operations, and it is commonly used to validate and sign digital security certificates and documents.

Techopedia Deals

Connect with us

Techopedia on Linkedin
Techopedia on Linkedin
"Techopedia" on Twitter

Sign up for Techopedia's Free Newsletter!

Email Newsletter

Join thousands of others with our weekly newsletter

Free Whitepaper: The Path to Hybrid Cloud
Free Whitepaper: The Path to Hybrid Cloud:
The Path to Hybrid Cloud: Intelligent Bursting To Amazon Web Services & Microsoft Azure
Free E-Book: Public Cloud Guide
Free E-Book: Public Cloud Guide:
This white paper is for leaders of Operations, Engineering, or Infrastructure teams who are creating or executing an IT roadmap.
Free Tool: Virtual Health Monitor
Free Tool: Virtual Health Monitor:
Virtual Health Monitor is a free virtualization monitoring and reporting tool for VMware, Hyper-V, RHEV, and XenServer environments.
Free 30 Day Trial – Turbonomic
Free 30 Day Trial – Turbonomic:
Turbonomic delivers an autonomic platform where virtual and cloud environments self-manage in real-time to assure application performance.