Create a ticket
Sign in Sign up
Locker support Locker support

No results found.

Home Locker Whitepaper Security Fundamentals Hash Function
Vietnamese English
Hash Function

A cryptographic hash function is an algorithm that maps data of an arbitrary size to a bit array of a fixed size. A hash function is a one-way function, making it infeasible to reverse its computation to retrieve the original input corresponding to the desired hash value. Thus, in cryptography and information security, hash functions are used to authenticate data integrity, sign and verify digital signatures, uniquely identify data,…

Locker uses the SHA-256 hash function for all of its hashing. The SHA-256 (Secure Hash Algorithm 256) is a branch of the SHA-2 hash function family - one of the few sets of cryptographic hash functions designed and published by the United States National Security Agency (NSA) in 2001. It is a cryptographic hash function with a 256-bit output that is nearly unique and impossible to reverse. SHA-256 is not much more computationally complex than the hash functions of the previous-generation SHA-1, but its 256-bit keys have never been compromised so far.

Was this page helpful?
Join Our Community