Design and analysis of cryptographic hash functions by