Introducing the “Welcome to Xojo” Bundle!

New to Xojo and looking for guidance? We've put together a terrific bundle to welcome you! Xojo Bundle

This bundle includes six back issues of the magazine -- all of year 21 in printed book and digital formats -- plus a one-year subscription (beginning with 22.1) so you'll be learning all about Xojo for the next year. It's the perfect way to get started programming with Xojo. And you save as much as $35 over the non-bundle price!

This offer is only available for a limited time as supplies are limited, so hurry today and order this special bundle before the offer goes away!

Article Preview

Buy Now

Issue 8.4


REALScience: Making Hash

An introduction to hash functions

Issue: 8.4 (May/June 2010)
Author: JC Cruz
Author Bio: JC is a freelance technical writer living in British Columbia. He writes for various publications, pokes around with Cocoa, Python and REALbasic, and spends time with his nephew. He can be reached at: anarakisware@gmail.com
Article Description: No description available.
Article Length (in bytes): 38,276
Starting Page Number: 31
Article Number: 8411
Resource File(s):

Download Icon 8411.zip Updated: 2010-05-03 18:55:45

Related Web Link(s):


Excerpt of article text...

Welcome back to another round of REALScience. Today, we journey into that poorly understood field of hash functions. We begin by understanding what a hash function is and what benefits it brings to our code toolbox. Then we study the parts that make up a basic function. Next, we survey a handful of general-purpose functions and learn how they work. We then subject these functions to a series of standard tests and compare the results against REALbasic's built-in hash. So get yourselves a cup of hot brew and let us commence.

The Theory of Hash

Hash functions are part of a group of algorithms known as one-way functions. Like many functions, they convert data from one form to another. The reverse, however, is either too difficult, if not nigh impossible to do. Examples of other one-way functions include checksum routines, ciphers, and random number generators.

...End of Excerpt. Please purchase the magazine to read the full article.