| | | | <- prev | |

Hash Functions

  • Mapping from type T to unsigned integers
    • T is the key type; elements of T are called keys
    • Corresponding unsigned integer called signature or hash value
  • NOT one-to-one
    • In theory and practice: not invertible
  • Two principal uses:
    • Secure signatures
    • Efficient tables
  • Security related to enigma attribute
    • Very difficult (computationally intractable) to discover key from signature
  • Table efficiency related to pseudo-random attribute
    • Mapping appears not to respect any T structure

<- prev | | Top of Page | 14. Hashing, Hash Functions, and Their Uses - 1 of 8