From introduction to algorithms:
When using the division method, we avoid certain values โโof m. For example, m should not have degree 2. Since , if m = 2 ^ p, then h (k) is p the least significant bits of k. If it is not known that all the lower p-bit patterns are equally likely ,
it is better to make a hash function dependent on all bits of the key.
As you see the image below, if I chose 2 ^ 3, which means p = 3 and m = 8. The hashed keys depend only on the lower 3 (p) bits, which is bad because when you use the hash, you want to enable as much as possible more data for good dissemination.

source share