The SHA-1 function is now considered cryptographically broken. Namely, it is feasible to find multiple inputs producing the same hash. For a fast-performing, cryptographically secure hash function, see SHA512/256, BLAKE2 or BLAKE3.
The SHA-1 function is now considered cryptographically broken. Namely, it is feasible to find multiple inputs producing the same hash. For a fast-performing, cryptographically secure hash function, see SHA512/256, BLAKE2 or BLAKE3.