All Algorithms

SHA-256

Conditionally Safe

Hash Function algorithm

This algorithm is safe with sufficient key/output size. Grover's algorithm halves the effective security level.

Algorithm Details

Category

Hash Function

Quantum Safety

Conditionally Safe

Key Lengths (bits)

256

FIPS Standard

FIPS 180-4

Known Vulnerabilities

  • Grover's algorithm (collision resistance ~85-bit, preimage ~128-bit)

Notes

Post-Grover preimage resistance of ~128 bits is sufficient. Collision resistance reduced to ~85 bits. Considered safe for most applications.

Discover which algorithms your organization is using.

Run Free Assessment
NetflixOracleFigmaCoinbaseDellServiceNowAppleDeloitteNikeAWSJPMorgan ChaseT-MobileAtlassianBoschStripeL'OrealDatadogMicrosoftPalantirHPRobinhoodEYSonyCanvaVisaAutoCADDiscordBellAdobeCharles SchwabE*TRADENVIDIAGoogleJohnson & JohnsonFidelityClaudeMastercardIntuitBoeingAT&TShopifyPwCOpenAIKPMGIBMDatabricksSalesforceGitHubAmerican ExpressWorkday