John Smith and Sandra Dee share the same hash value of 02, causing a hash collision.
In computer science, a hash collision or hash clash[1] is when two distinct pieces of data in a hash table share the same hash value. The hash value in this case is derived from a hash function which takes a data input and returns a fixed length of bits.[2]
Although hash algorithms, especially cryptographic hash algorithms, have been created with the intent of being collision resistant, they can still sometimes map different data to the same hash (by virtue of the pigeonhole principle). Malicious users can take advantage of this to mimic, access, or alter data.[3]
Due to the possible negative applications of hash collisions in data management and computer security (in particular, cryptographic hash functions), collision avoidance has become an important topic in computer security.
^Thomas, Cormen (2009), Introduction to Algorithms, MIT Press, p. 253, ISBN 978-0-262-03384-8
^Stapko, Timothy (2008), "Embedded Security", Practical Embedded Security, Elsevier, pp. 83–114, doi:10.1016/b978-075068215-2.50006-9, ISBN 9780750682152, retrieved 2021-12-08
^Schneier, Bruce. "Cryptanalysis of MD5 and SHA: Time for a New Standard". Computerworld. Archived from the original on 2016-03-16. Retrieved 2016-04-20. Much more than encryption algorithms, one-way hash functions are the workhorses of modern cryptography.
computer science, a hashcollision or hash clash is when two distinct pieces of data in a hash table share the same hash value. The hash value in this case...
unique bucket, but most hash table designs employ an imperfect hash function, which might cause hashcollisions where the hash function generates the same...
cryptography, a collision attack on a cryptographic hash tries to find two inputs producing the same hash value, i.e. a hashcollision. This is in contrast...
the given hash value when one message is already known; finding any pair of different messages that yield the same hash value (a collision) is also unfeasible...
first SHA1 collision". Google Security Blog. Without truncation, the full internal state of the hash function is known, regardless of collision resistance...
cryptography, an HMAC (sometimes expanded as either keyed-hash message authentication code or hash-based message authentication code) is a specific type of...
is a widely used hash function producing a 128-bit hash value. MD5 was designed by Ronald Rivest in 1991 to replace an earlier hash function MD4, and...
output. The values returned by a hash function are called hash values, hash codes, hash digests, digests, or simply hashes. The values are usually used to...
science, a perfect hash function h for a set S is a hash function that maps distinct elements in S to a set of m integers, with no collisions. In mathematical...
be compared with a collision resistance, in which it is computationally infeasible to find any two distinct inputs x, x′ that hash to the same output;...
Kazaa hash Used on FastTrack, these hash sums are vulnerable to hashcollision attacks. xt=urn:kzhash:[ Kazaa Hash (Hex) ] BitTorrent info hash (BTIH)...
(pigeonholes). With a birthday attack, it is possible to find a collision of a hash function with 50 % {\textstyle 50\%} chance in 2 n = 2 n / 2 {\textstyle...
Open addressing, or closed hashing, is a method of collision resolution in hash tables. With this method a hashcollision is resolved by probing, or searching...
cryptographic hash function, usually for cracking password hashes. Passwords are typically stored not in plain text form, but as hash values. If such...
password pairs with collisions within each pair. If a supplied password is longer than the block size of the underlying HMAC hash function, the password...
response to a spate of "hash flooding" denial-of-service attacks (HashDoS) in late 2011. SipHash is designed as a non-cryptographic hash function. Although...
In cryptography, collision resistance is a property of cryptographic hash functions: a hash function H is collision-resistant if it is hard to find two...
resistance, second pre-image resistance, collision resistance, and pseudo-randomness. Pre-image resistance: given a hash h {\displaystyle h} it should be hard...
Linear probing is a scheme in computer programming for resolving collisions in hash tables, data structures for maintaining a collection of key–value pairs...
of finding a collision for a hash function, as well as calculating the approximate risk of a hashcollision existing within the hashes of a given size...
published since then. As of 2007, an attack can generate collisions in less than two MD4 hash operations. A theoretical preimage attack also exists. A...