ChargeHash

--

I love hashing methods. I think it is like a card dealer performing a secret shuffle and arranging the cards to show the Aces on the top of the deck. No matter how much you look at the shuffle, you can’t work out how the Aces have risen to the top.

Overall, there are many types of hashing methods, including ones which are data-oriented and ones that a security-oriented:

A cryptographically secure hashing method should show that it is not possible to mathematically reverse the hash back to the original data, and where we cannot predict any of the bits that will change on the output. But, hashing methods are also used for hash tables, where we just need to make sure that we avoid hash collision. With this, we want a fast way of hashing data, and then using the hashed value to provide our look. Some of the most popular methods of this type of hash are xxHash64, City64 and Mumur:

ChargeHash

This week a new hash appeared: ChargeHash [here]. It has been produced by William Stafford Parsons and is an extremely…

--

--

Prof Bill Buchanan OBE FRSE
ASecuritySite: When Bob Met Alice

Professor of Cryptography. Serial innovator. Believer in fairness, justice & freedom. Based in Edinburgh. Old World Breaker. New World Creator. Building trust.