SHA-256 Security: Opportunities and Threats