SHA stands for Secure Hash Algorithm and is a cryptographic function for comparing unique checksums ("hashes"). SHA encryption does not allow any inference of the original string, as the encrypted text is converted into a unique combination of numbers and digits, known as a "SHA Hash".
If a text or string is changed at even a single point, an entirely different checksum is generated. The SHA algorithm is used, for example, to verify the integrity of documents or files.
Our free SHA Generator helps you easily convert texts into SHA1, SHA256, SHA384 or SHA512 hashes.
The difference lies in the bit length of the created hash or checksum. SHA1 hashes are only 160 bits long. In comparison:
The larger the bit length, the less likely it is that different inputs will accidentally calculate the same checksum (see SHA1 collision attacks).
The SHA family of algorithms was developed by the National Security Agency (NSA) and published by the National Institute of Standards and Technology (NIST). The evolution of SHA algorithms reflects the ongoing arms race in cryptographic security:
SHA256 and SHA512 are particularly important in modern cryptography, being used in: