Preview

data structures

Powerful Essays
Open Document
Open Document
1321 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
data structures
Submitted to: Professor Faleh Alshamari
Submitted by: Wajeha Sultan

Final Project
Hashing: Open and Closed Hashing

Definition:

Hashing index is used to retrieve data. We can find, insert and delete data by using the hashing index and the idea is to map keys of a given file. A hash means a 1 to 1 relationship between data. This is a common data type in languages. A hash algorithm is a way to take an input and always have the same output, otherwise known as a 1 to 1 function. An ideal hash function is when this same process always yields a unique output.

Hash Function
Choosing a hash function that minimizes the number of collisions and also hashes uniformly is another critical issue. It is also used in many encryption algorithms.
Main formula for hashing index is:
H(k)=k mod m
H(k) means that where is the location of that key or data.
K mod m, content is the result of that index

Explanation:
So far, to find something in a tree, or in a list, we have searched. However, there is another technique called hashing. Assume we are looking for some element e in a set S, where S may be implemented as a vector. We apply some function to e, hash (e), and this delivers the position of e in S, and we can then go directly to that location to get e or information on e. For example, e might be the key to a record, such as someone's name, and we wish to extract details/info on that person. e might be a telephone number and we want to know address, or e might be address and we want telephone number.
A hashing algorithm takes a variable length data message and creates a fixed size message digest. The hashing algorithm is called the hash function-- probably the term is derived from the idea that the resulting hash value can be thought of as a "mixed up" version of the represented value. When a one-way hashing algorithm is used to generate the message digest the input cannot be determined from the output.
Hashing is basically used to bloom filters, finding

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Nt1310 Unit 8 Lab 1

    • 421 Words
    • 2 Pages

    12. Relate back to the C-I-A tenets of information systems security. Hashing provides file versioning while encryption provides file…

    • 421 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Nt1420 Unit 6

    • 1145 Words
    • 5 Pages

    Question 6 A hash table is a data structure that uses an array as its internal storage container. Items are added to the array based on the integer generated by a hash function. A hash function produces an integer based on some properties of the object. In Java hash functions are encapsulated via the hashcode method in the Object class and that many classes override.…

    • 1145 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    Unit 9 Lab 1

    • 334 Words
    • 2 Pages

    7. The Secure Hash Algorithm 1 (SHA-1) is a well-known and currently secure cryptographic hash function designed by the NSA. SHA1 and Triple DES are the same, they both use algorithms.…

    • 334 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Relate how a change to the data impacts the hash and why it is important to check the hash provided before executing or unzipping a binary or some other unknown file…

    • 559 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Unit 2 Assignment 2

    • 676 Words
    • 3 Pages

    3. A secure cryptographic hash algorithm is one that generates a unique identifier of a fixed size (known as a "digest" or simply "hash") for a block of data of…

    • 676 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    A database is essentially an electronic filing system. It allows you to quickly select desired pieces of information.…

    • 492 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Bis221 Mel Johnson

    • 765 Words
    • 3 Pages

    A database stores information for any given reason and can be tracked back for any needed purpose.…

    • 765 Words
    • 3 Pages
    Powerful Essays
  • Powerful Essays

    Nt1330 Unit 1 Assignment

    • 4639 Words
    • 19 Pages

    Computers store data ondisks using files, which are structured in specific ways in order to allow for faster access, higher reliability, and to make better use out of the drive's available space. The specific way in which files are stored on a disk is called a file system, and enables files to have names and attributes. It also allows them to be stored in a hierarchy of directories or folders arranged in a directory tree.…

    • 4639 Words
    • 19 Pages
    Powerful Essays
  • Good Essays

    Lab #3

    • 517 Words
    • 3 Pages

    This lab demonstrated how hashing tools can be used to ensure message and file transfer integrity and how encryption can be used to maximize confidentiality. Common hashing and encryption tools, including MD5, SHA1, and GnuPG, were used. You used GnuPG to generate both a public and private key and a secret key for encryption only.…

    • 517 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    ch02 c

    • 2468 Words
    • 11 Pages

    9. The term “data structures” refers to the speed at which data it is captured, analyzed, and reported.…

    • 2468 Words
    • 11 Pages
    Powerful Essays
  • Better Essays

    Is3230 Lab 1 PKI Analysis

    • 851 Words
    • 4 Pages

    A PKI (public key infrastructure) enables users of a basically unsecure public network such as the Internet to securely and privately exchange data and money through the use of a public and a private cryptographic key pair that is obtained and shared through a trusted authority. The private key system is sometimes known as symmetric cryptography and the public key system as asymmetric cryptography. The Hash algorithm (or hash function) is an algorithm that computes a value based on a data object such as a message or file. The object is usually of variable length, possibly very large, thereby mapping the data object to a smaller data object. This is the “hash result” which is usually a fixed-size value.…

    • 851 Words
    • 4 Pages
    Better Essays
  • Better Essays

    Analysing and Storing Data

    • 1242 Words
    • 5 Pages

    Data management within Human Resources (HR) is essential as this can be used when organisations have to make decisions, contact employees and also satisfy legal requirements.…

    • 1242 Words
    • 5 Pages
    Better Essays
  • Good Essays

    Storing Information

    • 1638 Words
    • 7 Pages

    LIMS is Laboratory Information Management System; this is software that is used in labs to exchange information form one lab to the other. Some of the features include real time data tracker or even data exchange. This is the type of system used in laboratory’s to store information rather than storing all files onto their computer systems and if need be for future use, they will have to go through the archives of the files in order to find them and it’s the same story for hard copies, they pile up so munch it’s hard to get a hold of the specific files or documents you’d need therefore we have the LIMS. LIMS is a great alternative to the conventional storage of files onto your personal computer or even external hard drives as LIMS provides real time data exchange from one lab to the next within an industry i.e. a hospital or even a college. 3…

    • 1638 Words
    • 7 Pages
    Good Essays
  • Powerful Essays

    Data that can be read and understood without any special measures is called plaintext or cleartext. Here Plain image is converted as Plaintext.The method of disguising plain image in such a way as to hide its substance is called encryption. Encrypting plain image results in unreadable gibberish called cipher image. You use encryption to ensure that information is hidden from anyone for whom it is not cipher image to its original plain image is called decryption. Figure 1.1 illustrates this.…

    • 12298 Words
    • 49 Pages
    Powerful Essays
  • Powerful Essays

    Networking

    • 1382 Words
    • 5 Pages

    Cryptography is derived from the Greek words kryptos meaning “hidden” and graphien, meaning “to write/study”. The process of making and using codes to secure the transmission of information is called cryptography. Before modern era cryptography was synonymous to encryption but today cryptography is heavily based on mathematical theory and computer science practice. Cryptography today deals with the ways to transfer information in such a manner that no one beside the recipients can read what was actually sent and also more advanced crypto techniques deal with ensuring that the information being transferred has not been compromised in the transit. Cryptanalysis is the process of obtaining the original message (Plaintext) from an encrypted message (ciphertetext) without knowing the algorithms and keys used in encryption. Crypto is a tool that can be used in both good and bad ways. Some of the good crypto uses are:…

    • 1382 Words
    • 5 Pages
    Powerful Essays