hash function

(redirected from Hash algorithm)

hash function

(programming)
A hash coding function which assigns a data item distinguished by some "key" into one of a number of possible "hash buckets" in a hash table. The hash function is usually combined with another more precise function.

For example a program might take a string of letters and put it in one of twenty six lists depending on its first letter. Ideally, a hash function should distribute items evenly between the buckets to reduce the number of hash collisions. If, for example, the strings were names beginning with "Mr.", "Miss" or "Mrs." then taking the first letter would be a very poor hash function because all names would hash the same.

hash function

An algorithm that turns a variable amount of text into a small, fixed-length value called a "hash value," "hash code" or "digest." Hash functions are widely used to create codes for digital signatures and message authentication (see cryptographic hash function). Hash functions are also employed to create lookup tables (see hash table) as well as spam analysis (see hash buster).
References in periodicals archive ?
Users can now specify which hash algorithm to use for signing operations of outgoing S/MIME messages.
SHA-256 stands for Secure Hash Algorithm, and is the most commonly used algorithm for Bitcoin mining.
Due to security concerns of SHA-1 and recent advances in the cryptanalysis of hash algorithms, NIST held a public competition for a new hash algorithm standard SHA-3, which is meant to replace SHA-2[8].
The good news is that the passwords were encrypted with a strong hash algorithm, so they're relatively protected for now.
Efforts to upgrade from the use of the Secure Hash Algorithm (SHA)-1 standard, to SHA-256 are well underway by information technology professionals throughout the Department of Defense (DoD), other federal government agencies, academia, businesses, and private institutions.
As it can be seen from the table, the dynamic linear hash algorithm proposed has the highest efficiency.
Among the topics are the basics of security and cryptography, block cipher, the data encryption standard, asymmetric key algorithms, elliptic curve cryptography, the secure hash algorithm, fundamentals of identity-based cryptography, and symmetric key encryption acceleration on heterogeneous many-core architectures.
In addition we have applied another algorithm called Malakooti-Bazofti Hash algorithm to generate a unique Tag or Hash pattern for the entire database content to be compared with previous stored Tag.
SHA-1 as stable hash algorithm was chosen to calculate document's fingerprint.
There was a breakthrough in cryptanalysis of SHA-1 Hash Algorithm in August 2005.
Digital fingerprinting ensures that for every file sent to InfiniVault, a hash algorithm is performed to produce a digital fingerprint, Imation added.
There are many hash algorithms developed over the years, such as MD5, RIPEMD, and SHA-1 (Secure Hash Algorithm) and SHA-2.