The SHA-2 family of cryptographic hash functions consists of six hash functions. These are:
- SHA-224, with 224 bit hash values
- SHA-256, with 256 bit hash values
- SHA-384, with 384 bit hash values
- SHA-512, with 512 bit hash values
- SHA-512/224, with 512 bit hash values
- SHA-512/256, with 512 bit hash values
Among these, SHA-256 and SHA-512 are the most commonly accepted and used hash functions computed with 32-bit and 64-bit words, respectively. SHA-224 and SHA-384 are truncated versions of SHA-256 and SHA-512 respectively, computed with different initial values.
To calculate cryptographic hashing value in Java, MessageDigest Class is used, under the package java.security.
MessagDigest Class provides following cryptographic hash function to find hash value of a text as follows:
These algorithms are initialized in static method called getInstance(). After selecting the algorithm the message digest value is calculated and the results are returned as a byte array. BigInteger class is used, to convert the resultant byte array into its signum representation. This representation is then converted into a hexadecimal format to get the expected MessageDigest.
Input : hello world
Input : GeeksForGeeks
Program: Below program shows the implementation of SHA-384 hash in Java.
HashCode Generated by SHA-384 for: GeeksForGeeks : 19cc78d220368a892cc9c54d2f43d5e1823 534f3e22b0d475de18e030e7c4b411704c79e9600bb93399688 e7f09bb226 hello world : fdbd8e75a67f29f701a4e040385e2e2398630 3ea10239211af907fcbb83578b3e417cb71ce646efd0819dd8c 088de1bd
- Data Integrity
Attention reader! Don’t stop learning now. Get hold of all the important Java and Collections concepts with the Fundamentals of Java and Java Collections Course at a student-friendly price and become industry ready.
- Implementing our Own Hash Table with Separate Chaining in Java
- MD5 hash in Java
- SHA-512 Hash In Java
- SHA-224 Hash In Java
- MD2 Hash In Java
- SHA-256 Hash in Java
- Cryptographic Hash Function in Java
- Data Structures | Hash | Question 1
- Data Structures | Hash | Question 2
- Data Structures | Hash | Question 3
- Data Structures | Hash | Question 4
- Data Structures | Hash | Question 5
- Hash Functions in System Security
- SHA-1 Hash
- What is HMAC(Hash based Message Authentication Code)?
- String hashing using Polynomial rolling hash function
- Getting hash of a file using CMD
- Java.util.BitSet class methods in Java with Examples | Set 2
- Java.Lang.Float class in Java
- Java.io.BufferedInputStream class in Java
If you like GeeksforGeeks and would like to contribute, you can also write an article using contribute.geeksforgeeks.org or mail your article to email@example.com. See your article appearing on the GeeksforGeeks main page and help other Geeks.
Please Improve this article if you find anything incorrect by clicking on the "Improve Article" button below.