The document discusses the design of secure hash algorithms SHA-256 and SHA-3. SHA-256 has a block size of 512 bits and processes messages in 64 rounds. SHA-3 uses a sponge construction that absorbs data into a state and then squeezes out the output hash. Both algorithms are used to secure blockchains like Bitcoin and Ethereum.