Hash tables Flashcards
What are the requirements for a Hashing function
Generate numeric value from a key
Uniform spread of indices
Minimise collisions
What is the mid-square method
First square the item.
Take the middle of the result
Then do the MOD for the address
What is the folding method
Divide item into equal pieces
Add the pieces together
Then do MOD
How many amount of slots should there be
The number of assigned slots must exceed the number of records by a third
What happens if the hash table becomes >70% full
The hash table will be re-sized
What happens if there is a collision
- Rehashing: If there is a collision it will find the next available hash.
- Create a linked list (Chaining): If there is a collision it will create a list that is linked to the hash
Use of hash tables
Can be used in check sums with barcode readers.
It can also be used in digital signatures for asymmetric encryption.
How are hash slots deleted
They will be marked with a dummy item. If a new item is added to the hash slot it will replace the dummy item.
How are hash tables used in asymmetric encryption
When a file is sent a hash algorithm is calculated giving a unique hash.
The file is sent with a public key and digital signature
The receiver decrypts the digital signature using the given public key
Then calculates the hash and compares to original hash