In this HackerRank Java SHA-256 problem in the java programming language Cryptographic hash functions are mathematical operations run on digital data; by comparing the computed hash (i.e., the output produced by executing a hashing algorithm) to a known and expected hash value, a person can determine the data’s integrity. For example, computing the hash of a downloaded file and comparing the result to a previously published hash result can show whether the download has been modified or tampered with. In addition, cryptographic hash functions are extremely collision-resistant; in other words, it should be extremely difficult to produce the same hash output from two different input values using a cryptographic hash function.
HackerRank Java SHA-256 problem solution.
import java.io.*;
import java.util.*;
import java.security.*;
public class Solution {
public static void main(String[] args) throws NoSuchAlgorithmException {
Scanner input = new Scanner(System.in);
MessageDigest m = MessageDigest.getInstance("SHA-256");
m.reset();
m.update(input.nextLine().getBytes());
for (byte i : m.digest()) {
System.out.print(String.format("%02x", i));
}
System.out.println();
}
}
Second solution
import java.io.*; import java.util.*; import java.security.*; public class Solution { public static void main(String[] args) throws NoSuchAlgorithmException { Scanner input = new Scanner(System.in); MessageDigest m = MessageDigest.getInstance("SHA-256"); m.reset(); m.update(input.nextLine().getBytes()); for (byte i : m.digest()) { System.out.print(String.format("%02x", i)); } System.out.println(); } }