3.4. Secure Hash Algorithms: SHA-1, SHA-2 Notes | Information Security BIT | TU | TABFlux