# hash function

Also found in: Dictionary, Thesaurus, Medical, Financial, Wikipedia.

## hash function

(programming)
A hash coding function which assigns a data item distinguished by some "key" into one of a number of possible "hash buckets" in a hash table. The hash function is usually combined with another more precise function.

For example a program might take a string of letters and put it in one of twenty six lists depending on its first letter. Ideally, a hash function should distribute items evenly between the buckets to reduce the number of hash collisions. If, for example, the strings were names beginning with "Mr.", "Miss" or "Mrs." then taking the first letter would be a very poor hash function because all names would hash the same.

## hash function

An algorithm that turns a variable amount of text into a small, fixed-length value called a "hash value," "hash code" or "digest." Hash functions are widely used to create codes for digital signatures and message authentication (see cryptographic hash function). Hash functions are also employed to create lookup tables (see hash table) as well as spam analysis (see hash buster).
References in periodicals archive ?
Proof: Given an adversary A against the verifiability, we construct an efficient algorithm B to break the collision resistance of the underlying hash function [H.
2] hash function whose resultant random number is insecure (Fig.
29] General Purpose Hash Function Algorithms, http://partow.
This improved scheme adds a hash function to both the system-side and client-side implementations.
Our proposed methods are based on Encryption Algorithm, Cellular Automata, hash function operation and finally calculation of the Hash Value to generate the Authentication Tag.
Simply, the Proof of retrivability (POR) method can be generated by using the keyed hash function [h.
This is not directly similar to any of the hash function properties of although it is probably related to the non-correlation property.
A hash function is a deterministic procedure that converts a large, possibly variable-sized amount of data (message) Manuscript received March 19, 2012; accepted April 26, 2012.
Furthermore, we investigated the influence of the hash function algorithm for the value of entropy.
Password authentication method is usually considered weak, but in this work MD5 hash function was used to strengthen its performance.
Using of fractal geometry for the authentication process is an alternative to authentication process using the hash function.
Skein is a cryptographic hash function and an entrant in the National Institute of Standards and Technology (NIST) hash function competition to design what will become the new Secure Hash Algorithm (SHA-3) standard.

Site: Follow: Share:
Open / Close