Text this: Investigating the Avalanche Effect of Various Cryptographically Secure Hash Functions and Hash-Based Applications