Hashing algorithms form the foundation in modern cryptography and data management. These mathematical functions encode any input data, regardless of its magnitude, into a fixed-length output known as a hash value. This mapping is designed to be consistent, meaning that the same input will always produce the same hash value. Despite this, the