Class 7: Data Structures 2S2019
Class 7: Data Structures 2S2019
It’s a technique that does not involve the use of keys but rather a fixed length hash
value that is computed on the basis of a plain text message. This functions are
commonly used to check the integrity of a message, that this message has not been
altered or compromised.
SHA-2
Secure Hash Algorithm 2 is a set of cryptographic hash functions designed by the
United States National Security Agency (NSA). It consists of 6 functions that are 224,
256, 384 or 512 bits:
■ SHA-224
■ SHA-256
■ SHA-384
■ SHA-512
■ SHA-512/224
■ SHA-512/256
The technical limit for an input string in SHA-256 is ~= 2’091’752 terabytes, just
reading that quantity of data would take about 220 years using the fastest SSD’s on the
market.