3.4. Secure Hash Algorithms Notes | Information Security BIM | TU | TABFlux