The # key on the telephone or keyboard. Also known as pound.
A mathematical calculation which creates a single number from critical fields in each transaction entry, as a check against inadvertent alteration of data contents due to hardware failure or program error.
A mathematically-irreversible algorithm used often for checking the validity of something without knowing what the something really is. For example, a password might be "encrypt." The computer doing the authentication would only store the hash of "encrypt," or #)GHLDB#893S. When someone tries to log in, the computer takes the password supplied, "hashes" it, and sees if the hash values match up. This is useful because even if an intruder knows the hash value, it is impossible to generate the actual password from that.
A number generated by applying a mathematical formula to a document or sequence of text. The hash is significantly shorter that the original text and is unique to the original document.
A fixed-length value created mathematically to uniquely identify data.
An algorithm that maps or translates one set of bits into another (generally smaller) set in such a way that : A message yields the same result every time the algorithm is executed using the same message as input. It is computationally infeasible for a message to be derived or reconstituted from the result produced by the algorithm. It is computationally infeasible to find two different messages that produce the same hash result using the same algorithm.
A value uniquely calculated by using a well-known algorithm to create a digest all of the data constituting an electronic record. An actor uses a private key to generate a digital signature by transforming this value. By recalculating the hash digest value, and using the actor's certificate's public key to transform the electronic signature, it is possible to attest to the actor's signing ceremony and to the integrity of the signed record.
a calculated value derived from each component's ID number
a collection of key,value pairs
a container that can hold multiple values
a fixed-length value generated from a file of arbitrary size using a one-way function algorithm, which means the process can't be reversed to discover the original data
a fixed size integer value determined by feeding a function variable- length-sized data
a function that maps keys to integers, usually to get an even distribution on a smaller set of values
a heckuva lot more than an even valued list
a list of (key, value) pairs, in which you can search for a particular key efficiently
a logically calculated string of characters against a given pass phrase which, when processed in reverse of specific algorithm, produce the exact same pass phrase back to original form
a mathematical function that can be applied to the bytes of a computer file to generate a fixed-length number
a mathematical function that maps values from a large domain into a smaller range
a mathematical representation often used to store passwords
a mathematical technique for doing this very quickly, which I'm not going to get into here
a much smaller, but unique, code derived by a mathematical transformation of the document
an access/storage method where a mathematical function is applied to a key
a number generated by a formula from a string of text in such a way that it is unlikely that some other text would produce the same value
a numerical value of fixed length which unequivocally identifies files of arbitrary legth
a one-way encryption algorithm that takes an input message of arbitrary length and produces a fixed length output message
a one-way, repeatable algorithm designed to turn data into a recognisable, comparable, fixed-length value
a piece of software that takes an arbitrary amount of information and computes from that information a fixed length checksum
a security algorithim that uses a key (a series of letters and numbers) and changes whatever your changing into a series of letters, numbers, and symbols
a series of bytes with a fixed length that uniquely identifies a software program or file
a small, fixed length value generated by a one-way function
a string created from another string, made by performing a series of mathematical calculations with the original string, such that the result is irreversible
a string of characters, like a password, that has been scrambled by an encryption algorithm
a structure of key, value pairs
a table position calculated from a association key
a unique code calculated from the password using an algorithm that cannot easily be reversed to obtain the original password
a unique value or checksum that is generated from a text string
a value mathematically derived from another value - in this case hardware configuration values
a value or key generated from the content of a string
a value that is computationally infeasable to spoof
An MD5 hash value is a number generated through a defined algorithmic formula which generates a unique identifier for any file. This value effectively becomes a digital fingerprint allowing the file to be uniquely identified. The odds that two files with differing contents would generate the same hash value are 2128. By generating hash values of known files (e.g. files known to part of a legitimate piece of software or alternatively a file known to contain indecent material) and compiling these into a library, files analysed as part of a case and subsequently cross referenced against a known hash library, Files can be included or excluded as appropriate from the case.
A number generated from text and used to ensure that transmitted data has not been tampered with.
Also called "hash function" or hashing, used extensively in many encryption algorithms. Hashing transforms a string of characters usually into a shorter, fixed-length value or key. Information in a database is faster to search when you use a hashed key, than if you were to try to match the original data.
A number generated from a string of text with an algorithm. The hash value is substantially smaller than the text itself. Hash numbers are used for security and for faster access to data.
A text generated number used to ensure that transmitted data has not been tampered with.
Improved checksum in which it is hard for someone to construct a data block that generates a predetermined checksum or hash value.
A "hash function" is a mathematical formula that converts a message of any length into a fixed-length string of digits known as the "hash" that represents the original message. Hash functions are one-way - that is, it is infeasible to reverse the process to determine the original message. Hash functions such as MD5 are strongly collision-free, which means it is very difficult to find two messages that produce the same hash.
Data allocated in an algorithmically randomized fashion in an attempt to evenly distribute data and smooth access patterns.
If the absolute URI reference[ RFC2396] for the Location's current location has a fragment identifier[ RFC2396], then the value of the hash attribute the value of this attribute MUST be the string concatenation of the hash mark(#) and the fragment identifier. Otherwise, the value of the hash attribute MUST be the empty string. When this atribute is set to a new value new-hash, user agents MUST perform the following steps: Give the hash attribute the value new-hash. Reconstruct the location URI Need to define the term "reconstruct the location URI". Navigate to the result of step 2. The remainder of these attribute descriptions need to be rewritten to state conformance requirements. In the manner of the above.
The resulting string of bits from a hash function.
A mathematical one-way, irreversable algorithm generating a string with fixed-length from another string of any length. Different input strings will usually produce different hashes (depending on the hash function).
A hash is Hexadecimal number generated from a string of text such that, no two different strings can produce the same hash.
The value generated by applying a complex mathematical function to several input values. Also see “Digital Fingerprint.
A function that converts a string into another string of fixed length in such a way that it is very hard to reverse the process and extract the original. Passwords should always be stored in a hashed form.
A short value calculated from digital data that serves to distinguish it from other data.
Hash is a number generated from a string of text. It plays a role in security systems where they are used to ensure that transmitted messages have not been tampered.
An algorithm that employs the science of cryptography, including encryption algorithms, cryptographic hash algorithms, digital signature algorithms, and key agreement algorithms.
A constant length distillation of a message. (see SHA-1)