Improvement in SHA-3 Algorithm Using Different Internal Methods and Operations