Secure hash functions

If we use a strong hash function such as the 64-bit hash mentioned, we expect the chances of stumbling upon two items with an identical hash to be negligible in practice. But for some applications, we actually need it to be impossible in practice to find a collision. Such applications include:

Note that what we call secure hash functions here are sometimes called cryptographic hash functions, one-way hash functions or message digests.