3.4. Secure Hash Algorithms: SHA-1, SHA-2 Verbal Notes | Information Security BIT | TU | TABFlux