Whether it is feasible to locate a shorter password which hashes to your same price as an extended password, the hashing algorithm is damaged. $endgroup$The hash function used in this process is often the id functionality, which maps the enter info to alone. In cases like this, the key of the data is made use of since the index within the hash desk