Into AI

Into AI

A Deep Dive into SHA-256 By Learning To Hash by Hand

A thorough exploration of the fundamental details of the algorithm that preserves the security of today’s computer systems

Dr. Ashish Bamania's avatar
Dr. Ashish Bamania
May 16, 2024
∙ Paid
5
5
Share
Image generated with DALL-E 3

SHA-256 or the Secure-Hash-Algorithm 256-bit is a cryptographic hashing algorithm/ function that is widely used by almost all computers today.

It belongs to a family of SHA-2 hashing algorithms developed by the National Security Agency (NSA) and first published in 2001.

Some popular use cases of this algorithm today are:

  • Digital certificates for SSL/ TLS

  • Mining algorithm of Bitcoin and other cryptocurrencies

  • Bitcoin wallet address generation

  • Checking the integrity of files in version control systems like Git

  • Password hashing, storage and verification

This is a story that discusses this algorithm in great depth and teaches its implementation by hand.

Keep reading with a 7-day free trial

Subscribe to Into AI to keep reading this post and get 7 days of free access to the full post archives.

Already a paid subscriber? Sign in
© 2025 Dr. Ashish Bamania
Privacy ∙ Terms ∙ Collection notice
Start writingGet the app
Substack is the home for great culture