Which two statements about the SHA-1 algorithm are true? (Choose two)
A.
The SHA-1 algorithm is considered secure because it always produces a unique hash
for the same message.
B.
The SHA-1 algorithm takes input message of any length and produces 160-bit hash
output.
C.
The SHA-1 algorithm is considered secure because it is possible to find a message
from its hash.
D.
The purpose of the SHA-1 algorithm is to provide data confidentiality.
E.
The purpose of the SHA-1 algorithm is to provide data authenticity.