paint-brush
A Step-By-Step Look into How SHA-256 Works by@wagslane
643 reads
643 reads

A Step-By-Step Look into How SHA-256 Works

by Lane Wagner13mMay 11th, 2022
Read on Terminal Reader
Read this story w/o Javascript
tldt arrow

Too Long; Didn't Read

A cryptographic hash is an almost perfectly unique string of characters that is generated from a separate piece of input text. For example, SHA-256 generates a 256-bit (32-byte) signature. A hash function generates a “fingerprint” for a given input string. SHA-2 is a successor to the SHA-1 hash and remains one of the strongest hash functions in use today. In this article, we will break down each step of SHA 256’s cryptographic algorithm and work through a real example.

Companies Mentioned

Mention Thumbnail
Mention Thumbnail
featured image - A Step-By-Step Look into How SHA-256 Works
Lane Wagner HackerNoon profile picture
Lane Wagner

Lane Wagner

@wagslane

Founder of Boot.dev. Whining about coding sins since 2011. Committing coding sins for the same.

About @wagslane
LEARN MORE ABOUT @WAGSLANE'S
EXPERTISE AND PLACE ON THE INTERNET.
L O A D I N G
. . . comments & more!

About Author

Lane Wagner HackerNoon profile picture
Lane Wagner@wagslane
Founder of Boot.dev. Whining about coding sins since 2011. Committing coding sins for the same.

TOPICS

THIS ARTICLE WAS FEATURED IN...

Permanent on Arweave
Read on Terminal Reader
Read this story in a terminal
 Terminal
Read this story w/o Javascript
Read this story w/o Javascript
 Lite
Also published here