cryptographic hash functions   2 Stories