Sample Essay on:
Computer Hashing

Here is the synopsis of our sample research paper on Computer Hashing. Have the paper e-mailed to you 24/7/365.

Essay / Research Paper Abstract

A 5 page paper discussing this programming and functional technique that has existed for many years, dating at least from the 1980s and before. In the early days, it provided an alternative to the sort function within database applications. Today, it still functions similarly but rather than becoming anachronistic among programmers, it has gained renewed life in security application. One of the most common uses for hashing today is in conjunction with the use of electronic signatures. Bibliography lists 8 sources.

Page Count:

5 pages (~225 words per page)

File: CC6_KSitHashing.rtf

Buy This Term Paper »

 

Unformatted sample text from the term paper:

functional technique that has existed for many years, dating at least from the 1980s and before. In the early days, it provided an alternative to the sort function within database applications. Today, it still functions similarly but rather than becoming anachronistic among programmers, it has gained renewed life in security application. One of the most common uses for hashing today is in conjunction with the use of electronic signatures. Hasings continued relevance to todays technological environment is evidenced by the fact that Federal Information Processing Standards (FIPS) recently released four updated algorithms for hashing use. Glossary of Terms and Acronyms "Bit. A binary digit having a value of 0 or 1. "Byte. A group of eight bits. "FIPS. Federal Information Processing Standard. "Word. A group of either 32 bits (4 bytes) or 64 bits (8 bytes), depending on the secure hash algorithm" (Secure Hash Standard, 2002). Hex digit. Representation of a 4-bit string. Integer. Represented as a word or pair of words. Early Use As stated above, hashing in its early days was used primarily in database applications. In 1994, Graefe, Linville and Shapiro described hashing as consisting of efficient "algorithms for processing large volumes of data are very important both for relational and new object-oriented database systems. Many query-processing operations can be implemented using sort- or hash-based algorithms, e.g., intersection, join, and duplicate elimination" (p. 934). Only sort-based algorithms were used in ...

Search and Find Your Term Paper On-Line

Can't locate a sample research paper?
Try searching again:

Can't find the perfect research paper? Order a Custom Written Term Paper Now