Glossary
SHA-1/SHA-2 (Secure Hash Algorithm)
SHA-1 and SHA-2 are part of a family of cryptographic hash functions known as the Secure Hash Algorithm series. Developed by the National Security Agency (NSA) and published by the National Institute of Standards and Technology (NIST), these algorithms are designed to ensure data integrity through the creation of a unique, fixed-size hash value from data inputs of any size.
SHA-1 is one of the earliest members of this family, producing a 160-bit hash value typically rendered as a 40-digit hexadecimal number. While SHA-1 has been widely used for security applications, such as digital signatures and SSL certificates, it is no longer considered secure against well-funded attackers as vulnerabilities have been discovered that could lead to collision attacks (where two distinct inputs produce the same hash output).
SHA-2 includes several hash functions with hash values that are 224, 256, 384, or 512 bits long, known as SHA-224, SHA-256, SHA-384, and SHA-512, respectively. SHA-2 is significantly more secure than SHA-1 and is used in various security applications and protocols, including TLS and SSL, PGP, SSH, IPsec, and Bitcoin, among others.
SHA-2’s increased bit lengths offer stronger security against brute-force attacks and collision vulnerabilities, making it a preferred choice in most security protocols that require strong cryptography. The adoption of SHA-2 has accelerated as organizations move away from SHA-1 due to its potential security risks. Looking ahead, SHA-3 is the latest addition to the Secure Hash Algorithm family, providing an alternative hashing algorithm that differs structurally from the SHA-2 series, further enhancing cryptographic security.