IBM PureData System for Analytics, Version 7.1

Hashing functions

You can use hashing functions to encode data, transforming the input into a “hash code” or “hash value.” The hash algorithm is designed to minimize the chance that two inputs have the same hash value, termed a collision.

You can use hashing functions to speed up the retrieval of data records (simple one-way lookups), for the validation of data (“checksums”), and for cryptography. For lookups, the hash code is used as an index into a hash table which contains a pointer to the data record. For checksums, the hash code is computed for the data before storage or transmission and then recomputed afterward to verify data integrity; if the hash codes do not match, the data is corrupted. Cryptographic hash functions are used for data security.

Some common use cases for hashing functions include:


Feedback | Copyright IBM Corporation 2014 | Last updated: 2014-02-28