This paper describes the state of art for secure hash functions based on chaotic maps for e-commerce applications. We start by reviewing the cryptography parts, and then discuss the types and properties of the hash functions. Then we discuss chaos theory in cryptography and review similarities and differences between chaotic systems and cryptographic algorithms. Afterwards we briefly survey number of attacked chaotic hash functions. Finally, we discuss and suggest how it will be feasible to design new secure hash functions based on chaotic maps with high security and performance to be adopted in e-commerce applications.