SHA256 IMPLEMENTATION OF SHA-256 This is just an example of the implementation of the SHA256 algorithm in a simpler format The constants used are represented in Big endian convention while rest uses little endian convention RESOURCES 1.https://en.wikipedia.org/wiki/SHA-2#Pseudocode