International Journal of Engineering Trends and Technology
SHA (Secure Hash Algorithm) is the condensed representation of binary data. A cryptographic hash function is a deterministic process whose input is arbitrary random block of data and produces an output of fixed size, which is known as the hash value. These functions were initially introduced to provide information security, integrity and authentication. In recent years there have been serious and alarming cryptanalytic attacks on several commonly used hash functions, such as MD4, MD5, SHA0, SHA1 and SHA2.