Figure 1 Among the most useful primitives that are crucial for data security is the cryptographic hash function, which offers message authentication, data integrity, and d [1]-[3]. Additionally, it is employed as a c cryptographic protocols, secure transaction currencies. Fig. 1 presents an output of a fixed igital signature ore element of s and crypto- length (termed as a message digest or hash code) that uses a one-way function (known as a hash function) with an input of arbitrary length (also termed as a “message” or “plain text”) [4]. The mathematical definition of a hash function (H) is defined as follows: