Toeplitz Hash Algorithm

From testwiki
Revision as of 03:43, 6 January 2024 by 97.102.205.224 (talk) (Fix complaint about missing journal= parameter in {{cite journal}}. TODO: Explain connection between Toeplitz hash and (truncated) cyclic redundancy check)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to navigation Jump to search

Template:Infobox cryptographic hash function

The Toeplitz Hash Algorithm describes hash functions that compute hash values through matrix multiplication of the key with a suitable Toeplitz matrix.[1] The Toeplitz Hash Algorithm is used in many network interface controllers for receive side scaling.[2][3]

As an example, with the Toeplitz matrix T the key k results in a hash h as follows:

h=Tk=(110101101011)(1100)=(011)

where the entries are bits and all operations are modulo 2. In implementations the highly redundant matrix is not necessarily explicitly stored.

References

Template:Reflist Template:Compu-prog-stub