当前位置:网站首页>Mature case and source code of hash quiz game system development technology
Mature case and source code of hash quiz game system development technology
2022-06-28 13:04:00 【VC_ MrsHu288】
Hash algorithm is to transform any length of input into a fixed length of output , Each byte affects the output value , And the input cannot be obtained by reverse calculation of the output .
Hash algorithm mainly includes constructor and conflict resolution .
The constructor criterion of hash algorithm is relatively simple 、 uniform , That is, the constructor can quickly calculate the hash value , At the same time, the constructor can distribute the keyword set evenly in the output address set {0,1,…,n-1} On , Keep the possibility of conflict to a minimum .
Common construction methods include : direct addressing 、 Digital analysis 、 Square with the middle method 、 Folding method 、 Random number method 、 Divide and leave the remainder, etc .
Hash,generally translated as hash or transliterated as hash,is generally called hash function.It is the processing of hash algorithm of input(also known as pre mapping pre image)of any length into output of fixed length,and the output data can be called hash value or hash value.This conversion is a kind of compression mapping,that is,a reasonable compression process.The space occupied by the output hash value is much smaller than the input space,but different inputs may be hashed into the same output.In other words,the output value is unique,but it is impossible to find the one-to-one corresponding input value.
Application direction
Due to the diversity of hash function applications , They are often designed for a particular application .
Error checking
Using a hash function, you can intuitively detect errors in data transmission . At the sender of the data , Apply hash functions to unsent data , And send the calculation results together with the original data . that , At the receiver of the data , The received data is processed using the same hash function , If the results of two hash functions are different , Then it means that there are errors in the process of data transmission . This is called redundancy check .
Information security
Hash Algorithm is one of the most secure methods in modern cryptography . Because the asymmetric algorithm is time-consuming and laborious , So in the digital signature protocol , The one-way hash function completely replaces the traditional encryption method .
Blockchain technology is also interested in it. It can only “ A one-way ” This feature of the operation , To bring it under his command , To verify all blocks extended by the entire blockchain based on the underlying blocks , To ensure the accuracy and consistency of subsequent uplink blocks .
Hash discreteness refers to two very similar files , Or a long data with only one digit difference between us , The value of the hash we calculated is very different , There is no similarity whatsoever , The discreteness of hash is mainly to avoid some characteristic attacks .
If the difference between your two files is only one , If the calculated hash is also very similar , It is more vulnerable to attack , So the normal hash has these three characteristics , Hash its length is 32 Bytes , Each byte is eight digits , Now the general hash is 256 Digit number , The hash value is 0-2 Of 256 Power , that 2 Of 256 How big is the power , It has more atoms than the universe .
边栏推荐
猜你喜欢

pytorch模型

MySQ 8.0 推出直方图,性能大大提升!

mysql数据库扫盲,你真的知道什么是数据库嘛

词云的可视化设计教程

Xiaobai's e-commerce business is very important to choose the right mall system!

Flutter series part: detailed explanation of GridView layout commonly used in flutter
![[today in history] June 28: musk was born; Microsoft launches office 365; The inventor of Chua's circuit was born](/img/bf/09ccf36caec099098a22f0e8b670bd.png)
[today in history] June 28: musk was born; Microsoft launches office 365; The inventor of Chua's circuit was born

I²C、SMBus、PMBus关系

基础软件照搬开源不可取,自力更生才是正途

Go语学习笔记 - gorm使用 - 数据库配置、表新增 | Web框架Gin(七)
随机推荐
自定义MySQL连接池
Centos7 - installing mysql5.7
百度APP 基于Pipeline as Code的持续集成实践
I²C、SMBus、PMBus关系
ASP. NET CORE Study05
Why does CAD export PDF have no color
Watermaker of the Flink core
完全背包 初学篇「建议收藏」
华泰证券手机app下载 怎么办理开户最安全
matlab plotyy 坐标轴设置,[转载]Matlab plotyy画双纵坐标图实例[通俗易懂]
《数字经济全景白皮书》消费金融数字化篇 重磅发布
词云的可视化设计教程
Which securities company is the best and safest? How to open an account is the safest
Flink流处理API大合集:掌握所有flink流处理技术,看这一篇就够了
【云原生】自助报表和BI能做这么多事?
How to handle the safest account opening when downloading the mobile app of Huatai Securities
Digital twin energy system, creating a "perspective" in the low-carbon era
BUUCTF:[WUSTCTF2020]朴实无华
数启扬帆,智聚人才 | 腾讯云数据库 & CSDN 工程师能力轻量认证发布会重磅来袭!...
2. 01背包问题