hash function

(redirected from Hash algorithm)

hash function

(programming)
A hash coding function which assigns a data item distinguished by some "key" into one of a number of possible "hash buckets" in a hash table. The hash function is usually combined with another more precise function.

For example a program might take a string of letters and put it in one of twenty six lists depending on its first letter. Ideally, a hash function should distribute items evenly between the buckets to reduce the number of hash collisions. If, for example, the strings were names beginning with "Mr.", "Miss" or "Mrs." then taking the first letter would be a very poor hash function because all names would hash the same.

hash function

An algorithm that turns a variable amount of text into a small, fixed-length value called a "hash value" or "hash code." Hash functions are widely used to create codes for message authentication (see MAC). They are also employed to create lookup tables (see hash table) as well as condensations of text for content analysis (see hash buster). See one-way hash function and HMAC.
References in periodicals archive ?
Tenders are invited for Digital Encryption Certificate With Two Years Validity In Two Copies Of Usb Toke Same Encryption Specification Shs-256 Hash Algorithm And 2048 Bit Rsa Key.
The SHA-3 hash algorithm offers strong security with exceptional performance capabilities in hardware implementations and an advanced cryptographic hash scheme
Digital fingerprinting ensures that for every file sent to InfiniVault, a hash algorithm is performed to produce a digital fingerprint, Imation added.
There are many hash algorithms developed over the years, such as MD5, RIPEMD, and SHA-1 (Secure Hash Algorithm) and SHA-2.
Skein is a cryptographic hash function and an entrant in the National Institute of Standards and Technology (NIST) hash function competition to design what will become the new Secure Hash Algorithm (SHA-3) standard.
In one version change -- the worm has gone through five major revisions -- the worm adopted the MD-6 cryptographic hash algorithm.
This has been the most widely used secure hash algorithm particularly in Internet-standard message authentication.
AURORA" is a highly efficient cryptographic hash algorithm that leverages the experience and expertise that Sony has accumulated thought the development of its secure and efficient block cipher, "CLEFI(TM)"[8].
Digital signatures typically range from 128 bits using the MD5 algorithm to 160 bits in size using the more secure SHA1 (Secure Hash Algorithm 1).
Specific functions include the Data Encryption Standard (DES) for encryption and decryption, secure key storage and Secure Hash Algorithm (SHA) acceleration.
Other cryptographic algorithms currently validated by the CMVP are the Data Encryption Standard (DES), the Triple Data Encryption Standard (TDES), the Digital Signature Algorithm (DSA), the Secure Hash Algorithm (SHA-1), and the Random Number Generator algorithm (RNG).
If the original data is run through the same hash algorithm as the hash, the resulting hash should be the same.