Say I have two values $x$ and $y$ of slightly different lengths. They can be passwords or keys or any other critical value, and I want to deterministically map them to two values of the same length.
Would using a secure hash function to achieve that purpose introduce any weakness into the system? We can assume the the output length of the hash function is not too small compared to the original inputs (e.g. the original inputs are not files worth MBs but simple strings of at most a few hundred bits).
Additionally, how does this compare to simply padding one of the inputs with zeros?