Skip to content

Latest commit

 

History

History
80 lines (74 loc) · 5.25 KB

README.md

File metadata and controls

80 lines (74 loc) · 5.25 KB

Build Status

hash-function

The main goal of this project is to provide simple example of hash function and basic description.

definition

Hash function is any function that can be used to map data of arbitrary size to data of a fixed size.

contract

  • Determinism - for a given input value it must always generate the same hash value. In other words, it must be a function of the data to be hashed, in the mathematical sense of the term.

    • Python hash functions could make use of a randomized seed that is generated once when the Python process starts in addition to the input to be hashed. The Python hash is still a valid hash function when used within a single run.
  • Uniformity - every hash value in the output range should be generated with roughly the same probability.

    • The uniformity of the distribution of hash values can be evaluated by the chi-squared test.
  • Defined range - it is often desirable that the output of a hash function have fixed size - such hashing is commonly used to accelerate data searches.

    • cryptographic hash functions produce a fixed-size output (hash value), regardless of the size of the input
    • This means that multiple different inputs could potentially map to the same hash value, a situation known as a collision
      • birthday paradox shows that a small number of collisions is virtually inevitable: in probability theory, the birthday problem or birthday paradox concerns the probability that, in a set of n randomly chosen people, some pair of them will have the same birthday. 99.9% probability is reached with just 70 people, and 50% probability with 23 people. For more info please refer my other github project: https://github.com/mtumilowicz/java11-birthday-paradox
      • collisions to be evenly distributed and unpredictable
        • example
          hash( 'abc' ) = ascii('a')+ascii('b')+ascii('c')
                = 97 + 98 + 99
                = 294
          
          • you can easily predict that hash('acb') will have the same result as hash('abc')
          • for a strong hash, there shouldn't be any way to do that (to convert one input into another which has the same hash)
            • it is faster than just hashing random inputs until you find one with the right hash (bruteforce)
  • Non-invertible - in cryptographic applications, hash functions are typically expected to be practically non-invertible.

    • obvious approach to invert a one-way function would be to compute many images and keep them in a table associating to each image the pre-image that produced it
      • rainbow table is a precomputed table for caching the outputs of a cryptographic hash function
    • real hash function is that hundreds of one-way operations take place sequentially and the results from earlier operations are used in later operations
    • features hashing algorithms use and how they help to make it non-reversible
    • Bit dependency: A hash algorithm is designed to ensure that each bit of the output is dependent upon every bit in the input. This prevents anyone from splitting the algorithm up and trying to reverse calculate an input from each bit of the output hash separately. In order to solve just one output bit, you have to know the entire input. In other words, when reversing a hash, it's all or nothing.
    • Avalanching: Related to bit dependency, a change in a single bit in the input (from 0 to 1 or vice-versa) is designed to result in a huge change in the internal state of the algorithm and of the final hash value. Since the output changes so dramatically with each input bit change, this stops people from building up relationships between inputs and outputs (or parts thereof).
    • Non-linearity: Hashing algorithms always contain non-linear operations - this prevents people from using linear algebra techniques to "solve" the input from a given output. Note the addition example I use above is a linear operation; building a hash algorithm using just addition operators is a really bad idea! In reality, hashing algorithms use many combinations of linear and non-linear operations.
    • example
      int SimpleHash(file) {
        return 0 if file.length is even;
        return 1 if file.length is odd;
      }
      
      • cryptographic hash function is a hash function with strong properties
      • it is not enough that the file can't be reconstituted
        • it has to be difficult for someone knowing the function to craft a file that hashes to 0

description

string.chars()
      .reduce(0, (x, y) -> 31 * x + y)

The value 31 was chosen because it is an odd prime. If it were even and the multiplication overflowed, information would be lost, as multiplication by 2 is equivalent to shifting. A nice property of 31 is that the multiplication can be replaced by a shift and a subtraction for better performance: 31 * i == (i << 5) - 1.
The advantage of using a prime is quite clear.