Recently in one of the interviews, I was asked following,
We have our own hash implementation. Let\'s say we open source our Hash implementation where th