
The SHA-3 is the latest member of the Secure Hash Algorithms, released by National Institute of Standards and Technology (NIST). Java supports the following SHA-2 algorithms: The SHA-2 is a widely used hashing algorithm designed by the National Security Agency (NSA). SHA-2 and SHA-3ġ.1 The SHA-2 (Secure Hash Algorithm 2) is defined in FIPS PUB 180-4.


The hashing is a one-way compression function to convert inputs of different lengths into a fixed-length output (hash value).
