Utilize SHA2 and configuration instead of hash strategy
This removes the hash strategy configuration and moves it to a method in the base class — along with some configuration for the SHA2 usage.
This removes the hash strategy configuration and moves it to a method in the base class — along with some configuration for the SHA2 usage.