Hello, you are using an old browser that's unsafe and no longer supported. Please consider updating your browser to a newer version, or downloading a modern browser.
Training Camp • Cybersecurity Glossary
Secure Hash Algorithm (SHA) is a cryptographic hash function that generates a fixed-size hash value used for data integrity verification.
Secure Hash Algorithm Definition: Secure Hash Algorithm (SHA) is a cryptographic hash function that generates a fixed-size hash value used for data integrity verification.
Secure Hash Algorithm is a cryptographic function that takes an input (or message) and generates a fixed-size string of bytes, known as a hash value, in a way that is computationally infeasible to reverse. It is designed to be secure against tampering and can be used for data integrity verification, password storage, digital signatures, and various security mechanisms. Commonly used versions include SHA-1, SHA-256, and SHA-3.
Turn knowledge into credentials. Browse our instructor-led cybersecurity courses.
View All Courses →