The In's and Out's of Cryptographic Hash Functions