Cryptographic hash functions are used for message authentication, digital signatures, and other applications. They take a variable-length input and produce a fixed-length output. Secure Hash Algorithm (SHA) is a cryptographic hash function designed by the National Institute of Standards and Technology. SHA-1 produces a 160-bit hash. SHA-2 includes SHA-256, SHA-384, and SHA-512, which produce hashes of 256, 384, and 512 bits respectively. SHA-512 processes the message in 1024-bit blocks through 80 rounds, updating buffer values in each round using a 64-bit value derived from the block and an additive constant.