answersLogoWhite

0


Want this question answered?

Be notified when an answer is posted

Add your answer:

Earn +20 pts
Q: What is hashing Explain any two hash functions?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Related questions

Define hashing and describe briefly including types of hashing and where it is used and advantages and disadvantages of hashing?

Hashing is performed on arbitrary data by a hash function. A hash function is any function that can convert data to either a number or an alphanumeric code. There are possibly as many types of hashing as there are data. How precisely the hash function works depends on what data it is meant to generate a hash code from. Hashing is used for a variety of things. For example, a hash table is a data structure used for storing data in memory. Instead of iterating through the structure to find a specific item, we associate a key (hash code) to a particular item (data). A hash code can be generated from a file or disk image. If the data does not match the code, then the data is assumed to be corrupted. Hashing has the advantage of taking a larger amount of data and representing it as a smaller amount of data (hash code). The code generated is unique to the data it came from. Generating a hash code can take time however, depending on the function and the data. Some hash functions include Bernstein hash, Fowler-Noll-Vo hash, Jenkins hash, MurmurHash, Pearson hashing and Zobrist hashing.


Why you hash in c language?

ANSWERThe reasons to use hashing in C are the same as in any language. A hash value is used to reduce a value from a complex form into a simpler form, to simplify operations such as searches.


What is meant by hashing of a file?

Hashing a file is retrieving its unique hash. Any file is different and they all have other hashes. You can compare hashes with the fingerprint of a human. These hashes serve for many purposes.Virustotal.com for example, uses hashes to identify files which have already been scanned before. Many distributors of huge files (such as game clients or operating systems such as Ubuntu) often show the MD5 hash of the file. If you hash the file and get the same MD5 hash, the file has been downloaded entirely with no errors.You can hash a file using various applications. I use HashTab for that.


What is a hashing algorithm?

hashing algorithm contain two components - hashing function & collision. hashing is mechanism which generally used in random file organization to convert the record key value into address.


Identify and explain any 4 functions of groupware?

explain any 4 function of groupware?


What is hashing and its concepts in data structure?

Hashing allows us to map data of arbitrary length to data of fixed length. If we consider a table that contains thousands of objects, searching for a particular object could have a significant runtime cost if the objects require complex comparisons. Binary search would reduce that cost, however the cost of sorting the objects and then maintaining the order can be just as significant. Instead, we use a hash table. With a suitable hashing function, any object can be reduced to a single value. The range of output values is usually much smaller than the range of input values, thus two or more objects may well produce the same hash value. However, with an appropriate hash function, objects can be evenly distributed throughout the range of hash values. If we suppose that a single hash might be associated with up to n objects, then the size of the hash table will be up to n times smaller than the object table and can therefore be sorted and maintained n times more quickly than the object table. We then only need to sort n objects per hash to create an efficient hash lookup table. To search for an individual object, we pass the object through the hash function to obtain its hash and then search the hash table using a trivial binary search. If the hash exists (with a fixed-length table it is guaranteed to exist), we then use the more complex object comparisons to binary search the n objects associated with that hash value. The end result is that we narrow the search down to a much smaller subset of objects, thus significantly reducing the cost of searching. Hashing has other uses, particularly in cryptography. While it is possible to reverse engineer a hash value to produce n possible values for a given hash, cryptographic hashing is one-way only; we cannot use the hash to reproduce the input. Thus instead of storing passwords, we need only store the hashes produced by those passwords. Even knowing the precise implementation details of the hashing function won't help an attacker because in order to produce a particular hash value you'd still need to know which input actually produces it and that means testing each potential input individually. Doing it for just one input is hard enough, but doing it for two or more is nigh-on impossible (usernames, IP addresses, secret questions and answers and all other security information can also be hashed).


Is THC in any other drug?

Hash


What you sthe bit length of any generated digest when using the MD5 hashing algorithm?

128 Bits


What does MD5 encryption mean?

You are probably referring to the MD5 Message-Digest Algorithm which is a widely used cryptographic hash function that produces 128-bit (16-byte) hash values. A hash function is an algorithm that takes a block of data and creates a string of data (hash) of fixed length. By running the algorithm on a received block of data, a user should be able to detect whether the data has been altered because a given block of data should always yield the same hash unless it has been altered. Ideally a hash function will allow easy computation of the hash value for any given message but make it hard to start with the hash value and come up with a message that will yield that hash value. It should also be so difficult to modify a message without changing the hash that the time and effort necessary to do it exceeds the value of doing it and extremely difficult or impractical to find two different messages with the same hash. Note that by its nature the MD5 hash is not supposed to allow you to recover the message that was processed. Usually when we use the word "encryption" we are talking about a process where a message is converted to something called "cyphertext" which is unreadable unless you have the right algorithm and key to decrypt it and convert it back to the original message. In this respect it is more accurate to refer to "MD5 hashing" rather than MD5 encryption. See the attached link for more details on the MD5 hash.


What is hashing in digital signature?

A digital signature is a document fingerprint (also called a hash), encrypted with a PKI private key.A digital signature is created as follows: Thecontents of the document being signed are used to create a very long number, called a hash code, which is unique for that document and similar to a fingerprint. Thehash code is encrypted using the signer's private key. The resulting encrypted hash is a digital signature.The owners of private keys are required by the rules of PKI to maintain the secrecy of their private key so that only they can make their digital signature. According to these rules, the key owner can be held responsible for any use of their private key.


Is hash a felony in florida?

Depends on how much and if there are any priors.


How do you get a Windows XP password from a password hash?

There are several tools that will determine the password from the hash. You can find them via any Internet search engine.