On 12/14/20 16:25, [email protected] wrote:
There are 3 kind of hashing algorithm
Four if you count the trails followed by runners drinking beer.
See on-on for instance.
The first one is used to check the sanity of input, against bit-swapping
error for instance
See CRC for instance
The second one is used for cryptographic purposes
While the output distribution is supposed to be quite good, its most
important aspect lies here: it is hard to craft an input matching a
specific hash
See sha256 for instance
The last one combines both speed and output distribution
See xxhash for instance
--
Jay Hennigan - [email protected]
Network Engineering - CCIE #7880
503 897-8550 - WB6RDV