It is easy to map data of arbitrary length to output of fixed length.
At present, the widely used hash algorithms mainly include sha 1, sha256, sha384, etc. And our national secret corresponds to the SM3 algorithm, and the security is also increasing. A few years ago, Google crashed SHA- 1 to verify its security.