DIZNR INTERNATIONAL

Network Security Secure hashing algorithm or SHA algorithm and it’s various versions network secure.

Network Security Secure hashing algorithm or SHA algorithm and it’s various versions network secure.

https://www.gyanodhan.com/video/7B3.%20GATE%20CSEIT/Computer%20Network/300.%20Network%20Security%20%20Secure%20hashing%20algorithn%20or%20SHA%20algorithm%20and%20it%27s%20various%20versionsnetwork%20securi.mp4

Here’s a complete guide to the Secure Hashing Algorithm (SHA), including its versions, uses in network security, and importance in cryptography β€” especially relevant for GATE CSE, Cybersecurity, Networking, and Computer Science Engineering students.


What is SHA (Secure Hashing Algorithm)?

SHA is a family of cryptographic hash functions designed to ensure data integrity by generating a fixed-size hash (or digest) from input data (message).

Hash Function: Takes an input (of any size) β†’ produces a fixed-length hash value.


Why is SHA Important in Network Security?


SHA Versions Overview

Version Output Size Year Introduced Status Use Cases
SHA-0 160 bits 1993 Obsolete Weak security
SHA-1 160 bits 1995 Broken/Retired Was widely used (SSL, Git, etc.)
SHA-2 224/256/384/512 bits 2001 Secure Widely used in modern cryptography
SHA-3 224/256/384/512 bits 2025 Secure Backup standard (based on Keccak)

SHA-1 (Insecure) – Avoid using!


SHA-2 Family (Secure, Recommended)

Includes:

SHA-256:

Used in:


SHA-3 (New Standard)


How Hashing Works (Simple Illustration)

Input Message β†’ SHA Algorithm β†’ Unique Hash Code

Example:
Input: "hello"
SHA-256 Output:  
2cf24dba5fb0a... (64 hex characters = 256 bits)

Properties of a Good Hash Function

  1. Deterministic – Same input β†’ same output
  2. Fast – Efficient to compute
  3. Irreversible – Can’t reverse to get input
  4. Collision-resistant – No two inputs β†’ same hash
  5. Avalanche effect – Tiny change β†’ big hash change

Summary Table

Feature SHA-1 SHA-2 (256/512) SHA-3
Output Length 160 bits 256–512 bits 256–512 bits
Security Weak (Broken) Strong Strong (Keccak)
Collision Resistance Low High Very High
Applications Legacy Systems Modern Crypto Advanced/Research

SHA in Exams & Interviews

GATE, UGC NET, and ISRO exams often ask:


Want More?

I can provide:

Would you like a diagram, code example, or quiz based on SHA?

Network Security Secure hashing algorithm or SHA algorithm and it’s various versions network secure.

CRYPTOGRAPHIC SECURE HASH ALGORITHM WITH …

A REVIEW OF VARIOUS SECURE HASH ALGORITHMS …

Hashing for Message Authentication Lecture Notes on β€œ …

cryptography and network security lecture notes