SHA-2 is a standard which can be employed to ensure data integrity. SHA-2 derives a „fingerprint“ from any supplied text. Any, even the smallest change of the underlying text will then result in a total change of the fingerprint; in this way, modification of the text can be detected. SHA-2 is used in situations, when integrity of a delivered message must be ensured.
For more information on SHA-2, visit Wikipedia, article SHA.
Next chapter: | SMS 007 – modern cryptography on your side |
Previous chapter: | AES |