A Note on the Security of Cryptographic Hash Functions