Questioning the Criteria for Evaluating Non-cryptographic Hash Functions

被引:0
|
作者
Hayes, Catherine [1 ]
Malone, David [1 ]
机构
[1] Maynooth University, 60026281, Ireland
来源
Queue | 2024年 / 22卷 / 04期
关键词
Hash functions;
D O I
10.1145/3690759
中图分类号
学科分类号
摘要
Although cryptographic and non-cryptographic hash functions are everywhere, there seems to be a gap in how they are designed. Lots of criteria exist for cryptographic hashes motivated by various security requirements, but on the non-cryptographic side there is a certain amount of folklore that, despite the long history of hash functions, has not been fully explored. While targeting a uniform distribution makes a lot of sense for real-world datasets, it can be a challenge when confronted by a dataset with particular patterns. © 2024 Owner/Author.
引用
收藏
页码:54 / 72
相关论文
共 50 条
  • [1] Questioning the Criteria for Evaluating Non- Cryptographic Hash Functions
    Hayes, Catherine
    Malone, David
    COMMUNICATIONS OF THE ACM, 2025, 68 (02) : 46 - 51
  • [2] Performance of the most common non-cryptographic hash functions
    Estebanez, Cesar
    Saez, Yago
    Recio, Gustavo
    Isasi, Pedro
    SOFTWARE-PRACTICE & EXPERIENCE, 2014, 44 (06): : 681 - 698
  • [3] Synthetic and real data sets for benchmarking non-cryptographic hash functions
    Saez, Yago
    Estebanez, Cesar
    Quintana, David
    Isasi, Pedro
    DATA IN BRIEF, 2019, 25
  • [4] Novel Non-cryptographic Hash Functions for Networking and Security Applications on FPGA
    Claesen, Thomas
    Sateesan, Arish
    Vliegen, Jo
    Mentens, Nele
    2021 24TH EUROMICRO CONFERENCE ON DIGITAL SYSTEM DESIGN (DSD 2021), 2021, : 347 - 354
  • [5] Optimized algorithms and architectures for fast non-cryptographic hash functions in hardware
    Sateesan, Arish
    Biesmans, Jelle
    Claesen, Thomas
    Vliegen, Jo
    Mentens, Nele
    MICROPROCESSORS AND MICROSYSTEMS, 2023, 98
  • [6] Evaluation and Design of Non-cryptographic Hash Functions for Network Data Stream Algorithms
    Cheng, Guang
    Yan, Yang
    2017 3RD INTERNATIONAL CONFERENCE ON BIG DATA COMPUTING AND COMMUNICATIONS (BIGCOM), 2017, : 239 - 244
  • [7] Towards an Automatic Design of Non-Cryptographic Hash Function
    Karasek, Jan
    Burget, Radim
    Morsky, Ondrej
    2011 34TH INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS AND SIGNAL PROCESSING (TSP), 2011, : 19 - 23
  • [8] An adaptive image steganography algorithm based on the use of non-cryptographic hash functions for data extraction
    Dryuchenko, M. A.
    COMPUTER OPTICS, 2023, 47 (03) : 415 - +
  • [9] Randomness testing of non-cryptographic hash functions for real-time hash table based storage and look-up of URLs
    Ahmad, Tahir
    Younis, Usman
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2014, 41 : 197 - 205
  • [10] Evolution of Non-Cryptographic Hash Function Pairs for FPGA-Based Network Applications
    Dobai, Roland
    Korenek, Jan
    2015 IEEE SYMPOSIUM SERIES ON COMPUTATIONAL INTELLIGENCE (IEEE SSCI), 2015, : 1214 - 1219