Today, we’ll understand SHA-1 encryption!
SHA-1 (short for Secure Hash Algorithm 1) is one of several cryptographic hash functions.
SHA-1 is most often used to verify that a file has been unaltered. This is done by producing a checksum before the file has been transmitted, and then again once it reaches its destination.
Vulnerabilities of the SHA Hash Function
SHA-1 is only one of the four algorithms in the Secure Hash Algorithm (SHA) family. Most were developed by the US National Security Agency (NSA) and published by the National Institute of Standards and Technology (NIST).
- SHA-0 has a 160-bit message digest (hash value) size and was the first version of this algorithm.
- SHA-1 is the second iteration of this cryptographic hash function. SHA-1 also has a message digest of 160 bits
- SHA-2 is stronger than SHA-1 and attacks made against SHA-2 are unlikely to happen with current computing power.