SHA-2 Hash Kalkuleta
Ƙirƙirar SHA-2 hashes cikin sauri da sauƙi
Game da SHA-2
SHA-2 (Secure Hash Algorithm 2) is a set of cryptographic hash functions designed by the United States National Security Agency (NSA). It consists of six hash functions with digests (hash values) that range from 224 to 512 bits: SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, and SHA-512/256.
Ana amfani da SHA-2 sosai a cikin aikace-aikacen tsaro da ƙa'idodi daban-daban, gami da TLS, SSL, PGP, SSH, da cryptocurrencies kamar Bitcoin. Ana ɗaukarsa amintacce daga duk sanannun hare-haren, kuma ba a sami wani babban rauni a kowane ɗayan ayyukan SHA-2 ba.
Note:Ana ɗaukar SHA-2 amintacce don aikace-aikacen zamani. Koyaya, ana ba da shawarar yin ƙaura zuwa SHA-3 don aikace-aikacen da ke buƙatar mafi girman matakin tsaro, musamman kan barazanar ƙididdigewa.
Abubuwan Amfani da Jama'a
- Amintaccen ma'ajin kalmar sirri
- Sa hannu na dijital
- Binciken ingancin fayil
- Blockchain da cryptocurrency
- Amintattun ka'idojin sadarwa
Bayanin Fasaha
Related Tools
Mai Rarraba Mass Unit
Canza tsakanin raka'a daban-daban na taro tare da daidaito don bukatun ku na kimiyya da na yau da kullun
SHA3-512 Hash Kalkuleta
Ƙirƙirar SHA3-512 hashes cikin sauri da sauƙi
CRC-16 Hash Kalkuleta
Ƙirƙirar ƙididdigar CRC-16 cikin sauri da sauƙi
Kalkuleta na Harajin Talla
A sauƙaƙe lissafin harajin tallace-tallace da jimlar farashin tare da ilhamar lissafin harajin tallace-tallace.
SHA3-224 Hash Kalkuleta
Ƙirƙirar SHA3-224 hashes cikin sauri da sauƙi
Canjin Wutar Lantarki
Canza tsakanin raka'o'in lantarki daban-daban tare da madaidaicin lissafin injiniyan ku