tharunchitipolu / SHA-256-Verilog-HDL

SHA-2 (Secure Hash Algorithm 2), of which SHA-256 is a part, is one of the most popular hashing algorithms out there.

Geek Repo:Geek Repo

Github PK Tool:Github PK Tool

SHA-256-Verilog-HDL

SHA-2 (Secure Hash Algorithm 2), of which SHA-256 is a part, is one of the most popular hashing algorithms out there. SHA-2 is known for its security (it hasn’t broken down like SHA-1), and its speed. In cases where keys are not being generated, such as mining Bitcoin, a fast hash algorithm like SHA-2 often reigns supreme.

Algorithm steps

  1. Pre-Processing
  2. Initialize Hash Values (h)
  3. Initialize Round Constants (k)
  4. Chunk Loop
  5. Create Message Schedule (w)
  6. Compression
  7. Modify Final Values
  8. Concatenate Final Hash

About

SHA-2 (Secure Hash Algorithm 2), of which SHA-256 is a part, is one of the most popular hashing algorithms out there.


Languages

Language:Verilog 93.3%Language:Python 6.7%