This document outlines the Secure Hashing Algorithm (SHA), focusing on SHA-1, developed by NIST and NSA in 1993 as a federal information processing standard. It details the functioning of SHA-1, including its input requirements, operational steps, and the processing of 512-bit blocks through multiple rounds and iterations. The algorithm is used in various applications, such as secure password hashing and digital signatures.