Whether it is feasible to find a shorter password which hashes to the same value as a longer password, the hashing algorithm is broken. $endgroup$The hash function used in this technique is usually the identity function, which maps the enter info to itself. In such a case, The important thing of the information is utilised given that the index in t