A set of cryptographic algorithms for hashing passwords, generating digital signatures, and other purposes. They are based on the creation of a unique one-way hash for each individual block of information. Included are the currently unused SHA-0 algorithm, the obsolete SHA-1, and the SHA-2 family of cryptographic methods. The latter is the new standard for establishing a secure connection, and includes various options that differ by the bit length of the signature.