hash function

(redirected from Hashing algorithm)

hash function

(programming)
A hash coding function which assigns a data item distinguished by some "key" into one of a number of possible "hash buckets" in a hash table. The hash function is usually combined with another more precise function.

For example a program might take a string of letters and put it in one of twenty six lists depending on its first letter. Ideally, a hash function should distribute items evenly between the buckets to reduce the number of hash collisions. If, for example, the strings were names beginning with "Mr.", "Miss" or "Mrs." then taking the first letter would be a very poor hash function because all names would hash the same.

hash function

An algorithm that turns a variable amount of text into a small, fixed-length value called a "hash value," "hash code" or "digest." Hash functions are widely used to create codes for digital signatures and message authentication (see cryptographic hash function). Hash functions are also employed to create lookup tables (see hash table) as well as spam analysis (see hash buster).
References in periodicals archive ?
At the time of the breach, Imgur said it used the hashing algorithm SHA-256 which may have been cracked with brute force.
Sehgal warned the SHA-256 hashing algorithm used to encrypt passwords at the time of the breach is vulnerable to a brute force attack-an attack in which every possible combination is guessed until the correct combination of characters is discovered to find the decryption key-and the passwords could be exposed.
The most advanced of all, Ethash is the Proof of Work hashing algorithm for Ethereum mining.
one-way hashing algorithm, with multiple hashing iterations and individual salt
We hash passwords with a one-way hashing algorithm, with multiple hashing iterations and individual salt per password.
Therefore, this paper presents a dynamic linear hashing algorithm, based on the rotary split idea.
Optional tests include multiple attachments (MA), certificate exchange messaging (CEM), file name preservation (FN), file name preservation for multiple attachments (FN-MA), file name preservation with MDN notification (FN-MDN), chunked transfer encoding (CTE), reliability, restart, and secure hashing algorithm 2 (SHA-2).
Solo-101 can perform operations using a hardware accelerated SHA-1 and SHA-256 hashing algorithm with no speed degradation.
To solve this problem, Lamdan and Wolfson introduced a geometric hashing algorithm based on indexing to object recognition [19].
By taking advantage of known flaws in the MD5 hashing algorithm used to create some of these certificates, the researchers were able to hack Verisign's RapidSSL.
The T3 Security Suite provides two-factor authentication using a MD5 hashing algorithm and CAST-128 bit encryption that ensures only authorized users having both the USB key and password can access the data.
A hash is a fixed length blob derived from variable length data using a hashing algorithm.