Text this: Pipeline implementation of secure hash algorithm (SHA-l) for cryptographic application in network security