![]() Objects, aspects, features, and advantages of embodiments disclosed herein will become more fully apparent from the following detailed description, the appended claims, and the accompanying drawings in which like reference numerals identify similar or identical elements. The operations further include calculating the hash function on a concatenation of the hash value and S(b). The hash function results in a hash value (H′(b)). ![]() The operations further include calculating a hash function on the data block producing a number of bytes hash. The bitwise and/or operation produces S(b). The operations include identifying a data block (block b) of a given size, dividing the data block into x number of segments, selecting y number of bytes from each of the segments, totaling y_total bytes, and performing a bitwise and/or on a z number of the y_total bytes. The computer program product includes instructions that, when executed by a computer, causes the computer to perform operations. The operations further include calculating the hash function on a concatenation of the hash value and S(b).Īnother aspect may provide a computer program product embodied on a non-transitory computer readable medium. When executed by the processor, the computer-executable instructions cause the processor to perform operations. The processor executes the computer-executable instructions. The system includes a memory having computer-executable instructions and a processor. The method also includes calculating the hash function on a concatenation of the hash value and S(b).Īnother aspect may provide a system for performing hash functions using a content based salt function. The method further includes calculating a hash function on the data block producing a number of bytes hash. The method includes identifying a data block (block b) of a given size, dividing the data block into x number of segments, selecting y number of bytes from each of the segments, totaling y_total bytes, and performing a bitwise and/or on a z number of the y_total bytes. One aspect may provide a method for performing hash functions using a content based salt function. This Summary is not intended to identify key features or essential features of the claimed subject matter, nor is it intended to be used to limit the scope of the claimed subject matter. This Summary is provided to introduce a selection of concepts in a simplified form that are further described herein in the Detailed Description. Thus, it is desirable to adopt new and improved security measures to safeguard data. It is known that in certain circumstances, hashing two separate entities can produce the same result, which is referred to as a collision. Most hashing functions produce outputs of a fixed length regardless of the content to which a selected hash function is applied.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |