SHA1 is vulnerable to attacks, and should be avoided. The Common Weakness Enumeration organization recommends against usage of weak cryptographic algorithms such as SHA1. Reff: https://cwe.mitre.org/data/definitions/327.html.
I suggest the use of SHA512 , which is more secure.
SHA1 is vulnerable to attacks, and should be avoided. The Common Weakness Enumeration organization recommends against usage of weak cryptographic algorithms such as SHA1. Reff: https://cwe.mitre.org/data/definitions/327.html.
I suggest the use of SHA512 , which is more secure.