3.4. Secure Hash Algorithms: SHA-1, SHA-2 Questions & Answers | Information Security BIT | TU | TABFlux