I. Introduction
Cryptographic hash functions are widely used for protection of data streams transmission. Well-known hashing algorithms vary in various values of reliability, including cryptographic strength, speed, complexity, bit depth, and other properties.