Non-cryptographic hash function
Appearance
The non-cryptographic hash functions are hash functions intended for applications that do not need the rigorous security requirements of the cryptographic hash functions (e.g., preimage resistance) and therefore can be faster less resource-intensive.[1] Typical examples of CPU-optimized non-cryptographic hashes include FNV-1a, Murmur3.[2]
Applications and requirements
Among the typical uses of the non-cryptographic hash functions are bloom filters, hash tables, count sketches. These applications require, in addition to speed, uniform distribution and avalanche properties.[2]
References
- ^ Sateesan et al. 2023, p. 1.
- ^ a b Sateesan et al. 2023, p. 2.
Sources
- Sateesan, Arish; Biesmans, Jelle; Claesen, Thomas; Vliegen, Jo; Mentens, Nele (April 2023). "Optimized algorithms and architectures for fast non-cryptographic hash functions in hardware". Microprocessors and Microsystems. 98: 104782. doi:10.1016/j.micpro.2023.104782. ISSN 0141-9331.