Injective hash function

A hash function is any function that can be used to map data of arbitrary size to data of fixed size. The values returned by a hash function are called hash values, hash codes, digests, or simply hashes. Hashes are normally integers. Hash functions accelerate table or database lookup, minimize storage and transmission bandwidth.
A hash function that is injective—that is, maps each valid input to a different hash value—is said to be perfect.
Following are advantages of hashes:
  1. extremely fast searches or look up
  2. deter eavesdropping on the data being transmitted
  3. deterministic data size (hashes) versus dynamic data sizes (byte streams)
  4. secure storage and transmission
  5. very fast encoded compared to cryptographic (hash) functions
Following are scenarios in which an injective hash function performs the best:
  1. Logon credentials such as username and password, which vary in data size, can be combined then hashed. The hash when transmitted on the wire will deter eavesdropping. Dynamically session generated hash can maximise protection (since hashes are discarded when session closes).
  2. A residential address contains numerous field values. These values when combined then hashed provide extremely small memory footage and cpu resources. These hashes are very useful in a GPS or navigator.
  3. When an online database is splitted into two parts: online (front) and secure (back or real) databases with the online one contains only hashes and the real one contains hashes and sensitive information. With the real database on a local network behind firewall all sensitive information can be protected with ease.
  4. Hashed URLs can accelerate web servers and clients.
  5. Hashed dictionary words provides more secure online conversation.
Some benefits of injective hash function are:
  1. Significant reduction of memory usage in storage and transmission.
  2. Significant reduction of application design, implementation and maintenance.
  3. Significant reduction of time required for pattern such as DNA, finger print matching.
I derived such an injective hash function and I'd like to offer it to anyone interested for a price. The function has been successfully tested against 11 million URLs. All inquiries are welcomed. If you are interested please fill in the form below and I'll get back to you as soon as possible.
Make an offer

Comments