internet.com
You are in the: Small Business Computing Channelarrow View Sites +
Small Business Technology
» ECommerce-Guide | Small Business Computing | Webopedia | WinPlanet |  »Close
Webopedia.com
Enter a word for a definition... ...or choose a computer category.
 
 

menu
   Home
   Term of the Day
   New Terms
   Pronunciation
   New Links
   Quick Reference
   Did You Know?
   Categories
   Tech Support
   Webopedia Jobs
   About Us
   Link to Us
   Advertising
  

talk to us
   Submit a URL
   Suggest a Term
   Report an Error

internet.com
Developer
Downloads
International
Internet Lists
Internet News
Internet Resources
IT
Linux/Open Source
Personal Technology
Small Business
Windows Technology
xSP Resources
Search internet.com
Advertise
Corporate Info
Newsletters
Tech Jobs
E-mail Offers
commerce
  Be a Commerce Partner
 
 
 
 
 
 
 
 
 
 
 
 
 
 

hashing
Last modified: Tuesday, October 14, 2003 

Producing hash values for accessing data or for security. A hash value (or simply hash), also called a message digest, is a number generated from a string of text. The hash is substantially smaller than the text itself, and is generated by a formula in such a way that it is extremely unlikely that some other text will produce the same hash value.

Hashes play a role in security systems where they're used to ensure that transmitted messages have not been tampered with. The sender generates a hash of the message, encrypts it, and sends it with the message itself. The recipient then decrypts both the message and the hash, produces another hash from the received message, and compares the two hashes. If they're the same, there is a very high probability that the message was transmitted intact.

Hashing is also a common method of accessing data records. Consider, for example, a list of names:

  • John Smith
  • Sarah Jones
  • Roger Adams
  • To create an index, called a hash table, for these records, you would apply a formula to each name to produce a unique numeric value. So you might get something like:

  • 1345873 John smith
  • 3097905 Sarah Jones
  • 4060964 Roger Adams
  • Then to search for the record containing Sarah Jones, you just need to reapply the formula, which directly yields the index key to the record. This is much more efficient than searching through all the records till the matching record is found.

    E-mail this definition to a colleague

    Sponsored listings

    Symantec: Virus Security and Removal - Symantec Enterprise Security Tools quickly contain security threats. Complete virus protection, removal and prevention with Symantec.


    For internet.com pages about hashing . Also check out the following links!

    Related Links

    related categories

    Digital Rights Management (DRM)

    Operators and Operations

    Security

    related terms

    index

    key


    webopedia
    Give Us Your
    Feedback


    Shopping
    hashing Products
    Compare Products,Prices and Stores

    Shop by Category:
    Shoes
    8 Store Offers

    Food and Drink
    31 Store Offers

    Books
    14 Model Matches

    Music
    9 Model Matches

    Musical Instruments
    0 Store Offers



    JupiterWeb networks:

    internet.comearthweb.comDevx.com graphics.com

    Search JupiterWeb:

    Jupitermedia Corporation has three divisions:
    Jupiterimages, JupiterWeb and JupiterResearch


    Legal Notices, Licensing, Reprints, & Permissions, Privacy Policy.

    Jupitermedia Corporate Info | Newsletters | Tech Jobs | Shopping | E-mail Offers