Can someone explain me about SHA 2 (secure hash algorithm 2)

What exactly is SHA 256 hash function and how it’s useful .

SHA - 256 is an industry standard of signature hash functions for websites.
SHA-256 is used in some of the most popular authentication and encryption protocols, including SSL, TLS, IPsec, SSH, and PGP. In Unix and Linux, SHA-256 is used for secure password hashing.

The SHA-256 algorithm returns hash value of 256-bits, or 64 hexadecimal digits. It is more useful than MD5. This is a stronger hashing algorithm and Should be used a BASE function for keeping user data safe and secure.This can be cracked like any other hash but the catch is sometimes even cracking a SHA-256 hash can take months, years, weeks, or even days it really depends.

Let me quote:
“To crack a hash, you need not just the first 17 digits to match the given hash, but all 64 of the digits to match. So, extrapolating from the above, it would take 10 * 3.92 * 10^ 56 minutes to crack a SHA256 hash using all of the mining power of the entire bitcoin network. That’s a long time.”

3 Likes

hi my name is cay how u doing

thanks for the info !

This topic was automatically closed after 121 days. New replies are no longer allowed.