hash value


Also found in: Dictionary, Thesaurus, Medical, Financial, Acronyms.

hash value

The fixed-length result of a hash function. See hash table, hash total and cryptographic hash function.
Copyright © 1981-2019 by The Computer Language Company Inc. All Rights reserved. THIS DEFINITION IS FOR PERSONAL USE ONLY. All other reproduction is strictly prohibited without permission from the publisher.
References in periodicals archive ?
In this state, if any instruction is executed to cause the modification of data, such as deletion of the data in a node, the hash value in the current transaction chain will change immediately.
(2) Hash value Specific information obtained by calculating the data.
In the handling of digital evidence there is a very important information that is the hash value. Generally the hash values used are SHA1 and MD5.
The hash value of any vote is linked to the hash value of the preceding vote in the database such that any alteration would affect the hash of the subsequent vote.
In order to identify itself to the AuC, the NFC POS executes the following functions on the values of M1, M2, and HIDM that have been received through the authentication challenge message from the NFC mobile: (1) generates the random number (R3); (2) executes the H (IDP [parallel] R1) function to compute the hash value (HIDP); (3) performs the H (KP [parallel] R1 [parallel] R3) function to compute the hash value (M3); (4) calculates the validation message (M4) as M4 = IDP [symmetry] R3.
As suggested by this example, a data file's hash value cannot be prognosticated.
If you feed my hash function the input "Ignatius," it outputs (100), which is thus the hash value for "Ignatius."
Reverse never happens that given the hash value, it computes the data as depicted in Figure 1.
The user ID, which is needed for user authentication in the second step, is inserted in a reserved space of the file system header in the generated image file, and the generated image file is encrypted using the hash value of the user PW as the key, thus completing the first step of user registration.
Despite these advantages, general client-side deduplication is vulnerable to a number of threats, as only a short and fixed identifier (e.g., hash value of the data) replaces the whole data.
Takes random data as input and generate a fixed size hash value as a output.