Design and analysis of cryptographic hash functions door