SHA (Secure Hash Algorithm) refers to a family of cryptographic hash functions, including SHA-1, SHA-256, and SHA-3. These functions convert input data into fixed-length digests that are deterministic and collision-resistant. SHAs are used in digital signatures, password hashing, checksums, and many security protocols.
Why it matters
Cryptographic hashes are fundamental to data integrity and authentication. Understanding SHA variants helps developers choose secure algorithms and avoid outdated or vulnerable ones such as SHA-1.
Examples
Using SHA-256 to verify file integrity or secure a JWT signature. Lessons in security tracks reinforce SHA usage.