On 12/14/20 16:25, [email protected] wrote:

There are 3 kind of hashing algorithm

Four if you count the trails followed by runners drinking beer.
See on-on for instance.

The first one is used to check the sanity of input, against bit-swapping error for instance
See CRC for instance

The second one is used for cryptographic purposes
While the output distribution is supposed to be quite good, its most important aspect lies here: it is hard to craft an input matching a specific hash
See sha256 for instance
The last one combines both speed and output distribution
See xxhash for instance

--
Jay Hennigan - [email protected]
Network Engineering - CCIE #7880
503 897-8550 - WB6RDV

Reply via email to