Computer Science, asked by sakshinangia26, 6 months ago

What basic arithmetical and logical functions are used in SHA?​

Answers

Answered by goolcuy
7

Answer:

bitwise operations, modular additions, and compression functions

Answered by anjaliom1122
1

Answer:

Circular shifts, AND, OR, NOT and XOR is the basic arithmetical and logical functions are used in SHA.

Explanation:

Secure Hash Algorithm (SHA) is a hashing algorithm that is used to hash data and certificate files. Every piece of data generates a unique hash that is completely indistinguishable from that of any other piece of data. The resulting digital signature is also one-of-a-kind because it is based on the hash generated from the data.

Secure Hash Algorithms, or SHA, are a group of cryptographic functions that are used to keep data secure. It works by transforming data with a hash function, which is a bitwise operations, modular additions, and compression functions-based algorithm.

  • The Secure Hash Algorithm 1, or SHA-1, was created by the National Institute of Standards and Technology in the United States in 1993. (NIST).
  • TLS, SSL, PGP, SSH, IPsec, and S/MIME are just a few of the security applications and protocols that use it.
  • Secure hashing algorithm (SHA) is an acronym for secure hashing algorithm.
  • SHA is a hashing algorithm that is based on MD5. It is used to hash data and certificates.
  • Using bitwise operations, modular additions, and compression functions, a hashing algorithm compresses the input data into a smaller form that cannot be understood.
Similar questions