If it is feasible to locate a shorter password which hashes to the same price as an extended password, the hashing algorithm is broken. $endgroup$The hash functionality Employed in this technique is usually the identity perform, which maps the enter facts to alone. In this case, The crucial element of the information is applied as being the index w