Photo by Julie Reid on Unsplash

Where Would You Find a Cuckoo In Cybersecurity?

--

In cybersecurity, we often hear of a canary, and which is a file that is used to probe for a response. But where would we find a cuckoo?

Well, cuckoo hashing involves a method that avoids having collisions in a hash table. Overall we in our table we have a hashkey-value pair, and where we take a look up term and hash it to provide a lookup hash. This hash then has an associated…

--

--

Prof Bill Buchanan OBE FRSE
ASecuritySite: When Bob Met Alice

Professor of Cryptography. Serial innovator. Believer in fairness, justice & freedom. Based in Edinburgh. Old World Breaker. New World Creator. Building trust.