当前位置:网站首页>Mature case and source code of hash quiz game system development technology
Mature case and source code of hash quiz game system development technology
2022-06-28 13:04:00 【VC_ MrsHu288】
Hash algorithm is to transform any length of input into a fixed length of output , Each byte affects the output value , And the input cannot be obtained by reverse calculation of the output .
Hash algorithm mainly includes constructor and conflict resolution .
The constructor criterion of hash algorithm is relatively simple 、 uniform , That is, the constructor can quickly calculate the hash value , At the same time, the constructor can distribute the keyword set evenly in the output address set {0,1,…,n-1} On , Keep the possibility of conflict to a minimum .
Common construction methods include : direct addressing 、 Digital analysis 、 Square with the middle method 、 Folding method 、 Random number method 、 Divide and leave the remainder, etc .
Hash,generally translated as hash or transliterated as hash,is generally called hash function.It is the processing of hash algorithm of input(also known as pre mapping pre image)of any length into output of fixed length,and the output data can be called hash value or hash value.This conversion is a kind of compression mapping,that is,a reasonable compression process.The space occupied by the output hash value is much smaller than the input space,but different inputs may be hashed into the same output.In other words,the output value is unique,but it is impossible to find the one-to-one corresponding input value.
Application direction
Due to the diversity of hash function applications , They are often designed for a particular application .
Error checking
Using a hash function, you can intuitively detect errors in data transmission . At the sender of the data , Apply hash functions to unsent data , And send the calculation results together with the original data . that , At the receiver of the data , The received data is processed using the same hash function , If the results of two hash functions are different , Then it means that there are errors in the process of data transmission . This is called redundancy check .
Information security
Hash Algorithm is one of the most secure methods in modern cryptography . Because the asymmetric algorithm is time-consuming and laborious , So in the digital signature protocol , The one-way hash function completely replaces the traditional encryption method .
Blockchain technology is also interested in it. It can only “ A one-way ” This feature of the operation , To bring it under his command , To verify all blocks extended by the entire blockchain based on the underlying blocks , To ensure the accuracy and consistency of subsequent uplink blocks .
Hash discreteness refers to two very similar files , Or a long data with only one digit difference between us , The value of the hash we calculated is very different , There is no similarity whatsoever , The discreteness of hash is mainly to avoid some characteristic attacks .
If the difference between your two files is only one , If the calculated hash is also very similar , It is more vulnerable to attack , So the normal hash has these three characteristics , Hash its length is 32 Bytes , Each byte is eight digits , Now the general hash is 256 Digit number , The hash value is 0-2 Of 256 Power , that 2 Of 256 How big is the power , It has more atoms than the universe .
边栏推荐
- The white paper on the panorama of the digital economy and the digitalization of consumer finance were released
- 泛海微FH511单片机IC方案小家电LED照明MCU丝印FH511
- You must configure either the server or JDBC driver (via the ‘serverTimezone‘ configuration property
- Commonly used "redmine" for # test bug
- Go语学习笔记 - gorm使用 - 数据库配置、表新增 | Web框架Gin(七)
- 嵌入式开发:估算电池寿命的7个技巧
- Online JSON to plaintext tool
- 哈希竞猜游戏系统开发技术成熟案例及源码
- The Research Report of Analysys' 2022 China Banking privacy computing platform supplier strength matrix analysis' was officially launched
- Tiantian mathematics serial 53: February 22
猜你喜欢

Manjaro easyconnecy error: libgtk-x11-2.0 so. 0: cannot open shared object file: No such file or directory

基于SSM实现水果蔬菜商城管理系统

一种跳板机的实现思路

Flutter series part: detailed explanation of GridView layout commonly used in flutter

Realization of a springboard machine

深入理解贝叶斯定理

基础软件照搬开源不可取,自力更生才是正途

从pdb源码到frame帧对象

From jsonpath and XPath to spl

Fastposter v2.8.4 release e-commerce poster generator
随机推荐
Flink流处理API大合集:掌握所有flink流处理技术,看这一篇就够了
高考失利进哈工大,毕业却留校要当“探索者”,丁效:科研就是厚积薄发
Wi-Fi 7 来啦,它到底有多强?
I ² C. SMBus, pmbus relationships
The press conference of Tencent cloud Database & CSDN engineer's ability lightweight certification is coming
华泰证券手机app下载 怎么办理开户最安全
10万美元AI竞赛:寻找大模型做得“更烂”的任务
5A同步整流芯片 20V转12V2A/5V4.5A大电流 24W大功率同步整流芯片 大电流降压IC FS2462
From jsonpath and XPath to spl
【云原生】自助报表和BI能做这么多事?
Validateur async. Vérificateur de données JS
FS7022方案系列FS4059A双节两节锂电池串联充电IC和保护IC
【历史上的今天】6 月 28 日:马斯克诞生;微软推出 Office 365;蔡氏电路的发明者出生
Deep understanding of Bayes theorem
I²C、SMBus、PMBus关系
June 28, 2022 Daily: Lecun's latest paper: the road to autonomous machine intelligence
Namespace and scope
Performance test-01-introduction
Embedded development: seven techniques for estimating battery life
How to install SSL certificates in Microsoft Exchange 2010