For cryptographic hashes,
Your approach isn't likely to help the second and third feature I mentioned.
For example, the successful attacks against MD5 created two messages of the same length with the same signature. Your variation is no more secure than plain MD5 in that case.
|
|---|