Exploring the CñiMs Hash and the Power of Hash Functions in Cybersecurity