hash function

(redirected from Hashing function)

hash function

(programming)
A hash coding function which assigns a data item distinguished by some "key" into one of a number of possible "hash buckets" in a hash table. The hash function is usually combined with another more precise function.

For example a program might take a string of letters and put it in one of twenty six lists depending on its first letter. Ideally, a hash function should distribute items evenly between the buckets to reduce the number of hash collisions. If, for example, the strings were names beginning with "Mr.", "Miss" or "Mrs." then taking the first letter would be a very poor hash function because all names would hash the same.

hash function

An algorithm that turns a variable amount of text into a small, fixed-length value called a "hash value," "hash code" or "digest." Hash functions are widely used to create codes for digital signatures and message authentication (see cryptographic hash function). Hash functions are also employed to create lookup tables (see hash table) as well as spam analysis (see hash buster).
References in periodicals archive ?
Though hashing is being used for deduplication, they were many instances where non-similar files were deleted because of a wrong notion of the hashing function.
Useer's Password: "Giants" [down arrow] Hashing Function (encryption only; no decryption) [down arrow] Hashed Value: "66tt" Exhibit 4 Hashed Passwords: Vulnerable to Rainbow Tables The password table (below, left) contains a hypothetical hashed value of each password in the clear-text table in Exhibit 1.
Each hashing function hi maps the part of the IP header of a packet indicating the flow to which it belongs, to one of the counters of stage [F.
Miners run cryptographic hashing functions on their computers and only when a consensus is reached on results is a transaction confirmed and added to the block chain.
MX28 processor includes hardware accelerated encryption/decryption and hashing functions, dedicated hardware support for AES128-based authenticated boot and signed/authenticated firmware, an AES crypto engine, secure off-chip storage mechanisms and other security features in addition to robust microcontroller functionality.
Locality sensitive hashing functions [1-5, 9, 10] (LSH) were defined as a locality preserving hash function family used in order to maximize the probability ([p.
The SHA-1 and SHA-2 hashing functions are considered to be today's standard and are the most advanced hashing methods recognized worldwide by all law enforcement authorities and court systems.
Ideal for use in e-commerce server applications, the SafeXcel-ISES chip provides extremely fast cryptographic acceleration for large number exponentiation, symmetric key and hashing functions.
That simplistic strategy has however two major drawbacks: it is costly in terms of computation time (we would need to compute m hashed values per element scanned), and, worse, it would necessitate a large set of independent hashing functions, for which no construction is known [1].
Further cryptographic functions available in QuickLogic's library include hashing functions, DES and Triple DES.
Security functions in the specification include cryptography, public key cryptography and digital signature, hashing functions, random number generation (RNG) and secure storage.
The Alcatel OmniAccess 500 series VPN implementation supports IPSec, Diffie-Hellman key exchange, MD5 and SHA-1 hashing functions, DSA and RSA digital signatures, DES, 3DES and AEA encryption algorithms, as well as standards-based authentication systems, including shared secret, RADIUS, LDAP, X.