Photo by Julie Reid on Unsplash

Where Would You Find a Cuckoo In Cybersecurity?

In cybersecurity, we often hear of a canary, and which is a file that is used to probe for a response. But where would we find a cuckoo?

Well, cuckoo hashing involves a method that avoids having collisions in a hash table. Overall we in our table we have a hashkey-value pair, and where we take a look up term and hash it to provide a lookup hash. This hash then has an associated…

--

--

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store