Security requirement of hash function