Hash Function In Information Security