Back to Lingo

SHA

Security

SHA (Secure Hash Algorithm) refers to a family of cryptographic hash functions, including SHA-1, SHA-256, and SHA-3. These functions convert input data into fixed-length digests that are deterministic and collision-resistant. SHAs are used in digital signatures, password hashing, checksums, and many security protocols.

Why it matters

Cryptographic hashes are fundamental to data integrity and authentication. Understanding SHA variants helps developers choose secure algorithms and avoid outdated or vulnerable ones such as SHA-1.

Examples

Using SHA-256 to verify file integrity or secure a JWT signature. Lessons in security tracks reinforce SHA usage.

See More

Further Reading

You need to be signed in to leave a comment and join the discussion