“…Meanwhile, the hash matching principle is used to retrieve data from each scattered storage location, as is the case when matching login passwords, where the hash technique used in this research is SHA256. In 2018 and 2022, several researchers conducted research proving that The SHA256 hash method is still a reasonably safe method for securing data stored in standard blockchain applications or intelligent systems [52,53]. Apart from that, from 2014 to 2021, a group of people also researched the comparative analysis between several hash methods, where SHA is always compared.…”