SHA-2 (Secure Hash Algorithm 2), of which SHA-256 is a part, is one of the most popular hashing algorithms out there. SHA-2 is known for its security (it hasn’t broken down like SHA-1), and its speed. In cases where keys are not being generated, such as mining Bitcoin, a fast hash algorithm like SHA-2 often reigns supreme.
- Pre-Processing
- Initialize Hash Values (h)
- Initialize Round Constants (k)
- Chunk Loop
- Create Message Schedule (w)
- Compression
- Modify Final Values
- Concatenate Final Hash