Which two characteristics of a secure hashing algorithm are true? (Choose two.)