How SHA-256 Works Step-By-Step |

SHA-2 (Secure Hash Algorithm 2), of which SHA-256 is a part, is one of the most popular hash algorithms around. In this article, we will break down each step of the cryptographic algorithm and work through a real example by hand. SHA-2 is known for its security (it hasn’t broken down like SHA-1) and its speed. In cases where keys are not generated, such as mining Bitcoin, a fast hash algorithm like SHA-2 often has the upper hand.

Source: How SHA-256 Works Step-By-Step |