A Novel Hashing Method Suitable for Lookup Functions
نویسندگان
چکیده
The paper describes a novel hashing method suitable for lookup functions. Traditional methods are either of lower hash quality or inferior performance. In this paper, we show how to compute a high-quality hash digest at extremely high performance on Intel ® processors using the crc32 instruction. Our method also generates multiple 32-bit hashes of an input data buffer, which have low correlation. This paper describes a novel hashing method suitable for lookup functions, based on the crc32 instruction. We show how to compute a high-quality 64-bit hash digest at extremely high performance on Intel ® processors. For large data buffers, the performance of our hash function tends to ~ 0.44 cycles/byte on a single thread of an Intel ® Core™ i5 650 processor. Even for small buffers (~24 bytes), the performance is better than 1 cycle/byte. The Intel ® Embedded Design Center provides qualified developers with web-based access to technical resources. Access Intel Confidential design materials, step-by step guidance, application reference solutions, training, Intel's tool loaner program, and connect with an e-help desk and the embedded community. Design Fast. Design Smart. Get started today. Overview This paper describes a novel hashing method suitable for lookup functions. Traditional methods are either of lower hash quality or inferior performance. In this paper, we show how to compute a high-quality hash digest at extremely high performance on Intel ® processors using the crc32 instruction [3]. Our method also generates multiple 32-bit hashes of an input data buffer, which have low correlation and is useful in contexts such as network processing applications.
منابع مشابه
Compressed Image Hashing using Minimum Magnitude CSLBP
Image hashing allows compression, enhancement or other signal processing operations on digital images which are usually acceptable manipulations. Whereas, cryptographic hash functions are very sensitive to even single bit changes in image. Image hashing is a sum of important quality features in quantized form. In this paper, we proposed a novel image hashing algorithm for authentication which i...
متن کاملA Seven-Dimensional Analysis of Hashing Methods and its Implications on Query Processing
Hashing is a solved problem. It allows us to get constant time access for lookups. Hashing is also simple. It is safe to use an arbitrary method as a black box and expect good performance, and optimizations to hashing can only improve it by a negligible delta. Why are all of the previous statements plain wrong? That is what this paper is about. In this paper we thoroughly study hashing for inte...
متن کاملAn Animated Guide © : Speed Merges : SAS V 9 . 1 Hashing
Hashing is one of the fastest table lookup techniques, not just in SAS®, but in any programming language. Figure 1 illustrates the concept of a table lookup and the speed advantage of SAS V9 Hashing over a format table lookup. If a programmer needs to select, from a large file, all subjects that are in a small file, hashing will likely save disk space and time. Hashing should be part of the too...
متن کاملA Comparison of Hashing Schemes for Address Lookup in Computer Networks Raj
The trend toward networks becoming larger and faster, and addresses increasing in size, has impelled a need to explore alternatives for fast address recognition. Hashing is one such alternative which can help minimize the address search time in adapters, bridges, routers, gateways, and name servers. Using a trace of address references, we compared the e ciency of several di erent hashing functi...
متن کاملA Comparison of Hashing Schemes for Address Lookup in Computer Networks
The trend toward networks becoming larger and faster, and addresses increasing in size, has impelled a need to explore alternatives for fast address recognition. Hashing is one such alternative which can help minimize the address search time in adapters, bridges, routers, gateways, and name servers. Using a trace of address references, we compared the e ciency of several di erent hashing functi...
متن کامل