application of cryptographic hash function