A cryptographic algorithm that is used for hashing data and certificate files. It is adopted by PKI market for digital signatures. SHA-1 and SHA-2 are two forms of this algorithm and they secure plain text input by turning it into an encrypted message digest.
| 7 Min Read
| 8 Min Read