Owner
National authority
SHA-2 is part of the so-called "cryptographic hash algorithms" that can generate. Out any amount of data (for example, a piece of text) a unique "fingerprint" (a predetermined fixed length) A change in the data will lead to a change in the fingerprint. The above properties that these algorithms are ideally suited for use in certain security applications, such as an electronic signature.
Detailed information
Published on
Last update
Status
Completed