Unsolved
This post is more than 5 years old
7 Posts
0
3967
December 23rd, 2006 21:00
Re: Problems accessing home network
I am trying to find out what i can about hash links.. waht are they how do you creat them and what for, i have seen alot of them around and dont understand them as well as i would like...and wakepedia doesnt help alot more then a definition, where can i look?
0 events found
No Events found!


volcano11
2 Intern
•
28K Posts
0
December 23rd, 2006 21:00
Message Edited by volcano11 on 12-23-200605:37 PM
proflashrtist
7 Posts
0
December 24th, 2006 10:00
_Paladin
795 Posts
0
December 24th, 2006 11:00
_Paladin
795 Posts
0
December 24th, 2006 12:00
proflashrtist
7 Posts
0
December 24th, 2006 12:00
proflashrtist
7 Posts
0
December 24th, 2006 12:00
1.2. Hash functions and non-cryptographic uses
A typical non-cryptographic use for hash functions is for validating that the contents of a file have not been changed in transit. The originator computes the hash of the contents of the file and transfers it to the recipient of the file. The recipient uses the same hash function and verifies that the two hash values are the same.
The property of good hash functions that there is even probability that each bit in the output is a 0 or 1 for an arbitrary input makes hashes particularly good for human-based content validation. If a single bit in the input is changed, or the length of the input is changed by a single bit, it is likely that half of the bits in the output will change, and thus the representation of the hash will change radically.
Hash values are usually expressed in hexadecimal notation. Thus, the hash value of a file (using the
..hah.. hurts to be shown up by someone ... rather pathetic really since as of the mourning of last i had no prior education to the has functions.. but i suppose... you do work for dell so i should give you a break since it is in fact one of the low grade computer companies