Also known as: Secure Hash Algorithms

SHA is a family of cryptographic hash functions used for data integrity verification. One can use an algorithm such SHA-256 to create a “signature” for a dataset. Determining whether the dataset has been tampered with is simply a matter of comparing this signature with the latest SHA-256 hash of the data. This method is used by security protocols to provide data integrity, ensuring that packets have not been tampered with.