Cryptographic hash functions are vital security components of current computers. They form a key part of digital signatures, message authentication codes, and other security protocols. So far, there are four series of cryptographic hash functions generally known as Secure Hash Algorithms (SHA). These are SHA-0 (published in 1993), SHA-1 (published in 1996), SHA-2 (published in […]