Cryptographic Hash Functions and Its Security Analysis Netinfo Security . 2012, (2): 0 -0 .