SHA256 Hash & Five requirement of Hash Algoriithms

In a way you can say that a fingerprint is an identifier of a person and that's a very powerful concept which is used by forensics departments in the police where they can identify criminals just by their fingerprints and take that as evidence to court.Now what if we could take the same principle and apply it to digital documents. But if we could come up with a sort of fingerprint that would identify these documents for us and such a fingerprint exists it's called Shower 256 hash. The algorithm behind Shutt 256 was developed by the NSA.And a lot of places in the World War applications use to store passwords. Check digital documents too.And in fact in blotching it is used like one of the core things core principles building blocks of block chain as we will see further down in this section and the code for the algorithm for Shudra and 56 is open source.Anybody can learn it. Understand how it works out.The hash is called Chateau-Renaud 56 because Shas stands for secure hash alg...