3.3.1 SHA-1, SHA-2, and SHA-3 Structures