0% found this document useful (0 votes)
2 views2 pages

Become A Certified Ethical Hacker!

The document discusses hashing and the SHA-256 algorithm, highlighting its significance in network security and encryption. Hashing is described as a process that transforms raw information into a non-reversible hash value, primarily used for applications like password storage. The SHA-256 algorithm, a widely utilized hash function, is emphasized for its 256-bit digest size and real-world applications in cybersecurity.

Uploaded by

Thomas Kraemburg
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
2 views2 pages

Become A Certified Ethical Hacker!

The document discusses hashing and the SHA-256 algorithm, highlighting its significance in network security and encryption. Hashing is described as a process that transforms raw information into a non-reversible hash value, primarily used for applications like password storage. The SHA-256 algorithm, a widely utilized hash function, is emphasized for its 256-bit digest size and real-world applications in cybersecurity.

Uploaded by

Thomas Kraemburg
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

Table of Contents

What is Hashing?
What is the SHA-256 Algorithm?
What are the Characteristics of the SHA-256 Algorithm?
Steps in SHA-256 Algorithm
Applications of SHA algorithm
View More
Among the many advancements seen in network security, encryption and hashing
have been the core principles of additional security modules. The secure hash
algorithm with a digest size of 256 bits, or the SHA 256 algorithm, is one of the most
widely used hash algorithms. While there are other variants, SHA 256 has been at the
forefront of real-world applications.

To understand the working of the SHA 256 algorithm and delve deeper into the realm
of cybersecurity you need first to understand hashing and its functional
characteristics.

Become a Certified Ethical Hacker!


CEH v13 - Certified Ethical Hacking CourseEXPLORE PROGRAM

What is Hashing?

Hashing is the process of scrambling raw information to the extent that it cannot
reproduce it back to its original form. It takes a piece of information and passes it
through a function that performs mathematical operations on the plaintext. This
function is called the hash function, and the output is called the hash value/digest.
As seen from the above image, the hash function is responsible for converting the
plaintext to its respective hash digest. They are designed to be irreversible, which
means your digest should not provide you with the original plaintext by any means
necessary. Hash functions also provide the same output value if the input remains
unchanged, irrespective of the number of iterations.

There are two primary applications of hashing:

• Password Hashes: In most website servers, it converts user passwords


into a hash value before being stored on the server. It compares the hash
value re-calculated during login to the one stored in the database for
validation.

You might also like