CAT2 Peripheral Driver Library

Secure Hash Algorithm (SHA) More...

Modules

 Macros
 
 Enums
 
 Structures
 
 Functions
 

Detailed Description

Secure Hash Algorithm (SHA)

SHA generates an almost-unique 256-bit/384-bit/512-bit signature for a text. The applications of SHA include hash tables, integrity verification, challenge handshake authentication, digital signatures, etc.