Explore tens of thousands of sets crafted by our community.
Hashing Techniques
6
Flashcards
0/6
Linear Hashing
Linear Hashing is a dynamic hashing technique that allows for incremental expansion of the hash table. It's designed to handle growing data by adding one bucket at a time, making it suitable for databases where the amount of data is steadily increasing.
CRC32
CRC32 (Cyclic Redundancy Check 32) is a hash function that generates a 32-bit hash value used primarily for error-checking purposes. It is often used to detect accidental changes to raw data in files, network transmissions, and storage.
MD5
MD5 (Message Digest Algorithm 5) produces a 128-bit hash value, typically rendered as a 32-character hexadecimal number. It is a widely used cryptographic hash function that is commonly used for verifying data integrity but is not recommended for security-sensitive applications due to vulnerabilities.
Bcrypt
Bcrypt is a password hashing function that uses a salt to protect against rainbow table attacks and employs an expensive key setup phase to deter brute-force attacks. It is a popular choice for securely storing passwords in databases.
Consistent Hashing
Consistent Hashing is a distributed hashing scheme that minimizes reorganization when the hash table is resized. It is useful in distributed systems, for example, to help distribute HTTP requests across a set of servers or to assign data to nodes in a distributed database.
SHA-256
SHA-256 (Secure Hash Algorithm 256-bit) is part of the SHA-2 family of cryptographic hash functions and produces a 256-bit hash value. It is designed to be secure against cryptographic attacks and is commonly used in secure protocols like SSL/TLS and cryptocurrency systems like Bitcoin.
© Hypatia.Tech. 2024 All rights reserved.