SHA-2 is based closely upon the SHA-1 Algorithm. SHA-2 actually combines the SHA-224, SHA-256, SHA-384 and SHA-512 algorithms, some of which we will look at in more detail later. Federal agencies and other government authorities should start using the SHA-2 family of algorithms before 2010. People are still unsure about how secure SHA-2

What are NIST Encryption Standards? Read this before What are NIST Encryption Standards for Hash Functions? FIPS 180 specifies the SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224 and SHA-512/256 hash functions. These are sometimes just known as SHA-1 and SHA-2, the number following the hyphen denotes the length of the output. Security - KeePass SHA-256 is a cryptographic hash function that is considered to be very secure. It has been standardized in NIST FIPS 180-4. The attack against SHA-1 discovered in 2005 does not affect the security of SHA-256. In order to generate the key for the encryption algorithm, K is transformed using a key derivation function (with a random salt). This How to choose your CMK configuration - AWS Key Management

There is also a top-level secure hash algorithm known as SHA-3 or "Keccak" that developed from a crowd sourcing contest to see who could design another new algorithm for cybersecurity. All of these secure hash algorithms are part of new encryption standards to keep sensitive data safe and prevent different types of attacks.

Sha1 Decrypt & Encrypt - More than 15.000.000.000 hashes

Is MD5 an encryption algorithm? | Develop Paper

Security - KeePass