hash function

(redirected from Hashing algorithm)

hash function

(programming)
A hash coding function which assigns a data item distinguished by some "key" into one of a number of possible "hash buckets" in a hash table. The hash function is usually combined with another more precise function.

For example a program might take a string of letters and put it in one of twenty six lists depending on its first letter. Ideally, a hash function should distribute items evenly between the buckets to reduce the number of hash collisions. If, for example, the strings were names beginning with "Mr.", "Miss" or "Mrs." then taking the first letter would be a very poor hash function because all names would hash the same.

hash function

An algorithm that turns a variable amount of text into a small, fixed-length value called a "hash value" or "hash code." Hash functions are widely used to create codes for message authentication (see MAC). They are also employed to create lookup tables (see hash table) as well as condensations of text for content analysis (see hash buster). See one-way hash function and HMAC.
References in periodicals archive ?
While there are other similar services available on the market, this one is unique thanks to the SHA-3 hashing algorithm that is being used.
With Bitcoin becoming increasingly more difficult to "mine" via traditional computers thanks to the introduction of dedicated ASIC (Application-specific integrated circuit) machines, several derivatives of Litecoin, which in turn is derived from Bitcoin albeit using sCrypt rather than SHA-256 as a hashing algorithm, have been developed over the past months, only to succumb to the same fate as Bitcoin with the development of sCrypt ASICs.
LinkedIn confirmed since the breach that it obscured its passwords by using the SHA-1 hashing algorithm.
Solo-101 can perform operations using a hardware accelerated SHA-1 and SHA-256 hashing algorithm with no speed degradation.
By taking advantage of known flaws in the MD5 hashing algorithm used to create some of these certificates, the researchers were able to hack Verisign's RapidSSL.
The T3 Security Suite provides two-factor authentication using a MD5 hashing algorithm and CAST-128 bit encryption that ensures only authorized users having both the USB key and password can access the data.
MD5 is a hashing algorithm used to validate data integrity.
A hash is a fixed length blob derived from variable length data using a hashing algorithm.
Support is included for 3DES and digital signatures using Hashed Message Authentication Codes Message Digest (HMACMD5) and Secure Hashing Algorithm (HMA SHA-l).
For security of credit card numbers, use the secure hashing algorithm (known as SHA-1) to make a unique surrogate value that can be referenced, but not used to charge against the account.
The review of each algorithm included a methodical evaluation of the following characteristics: security (including any known attacks or weaknesses); efficiency (both speed and memory usage); flexibility (implementation on low- and high- end smart cards; support of additional key and block sizes, including whether the reference code actually supported the additional key sizes; suitability for use a pseudo-random number generator, hashing algorithm, etc.
Block-mean perceptual hashing algorithm is used where the algorithm takes the color pixels of an image to generate the hash value.