How Hash Function Works In Cryptography