Hashing

This is also a cryptography-based technique where the original data is converted to an irreversible form. Let's see the mathematical form for this:

Here, unlike in the case of encryption, we cannot use the output to discover what the input is.

Let's see a few examples to understand this better:

Input

Output

Method

10-point

7d862a9dc7b743737e39dd0ea3522e9f

MD5

10th

8d9407b7f819b7f25b9cfab0fe20d5b3

MD5

10-point

c10154e1bdb6ea88e5c424ee63185d2c1541efe1bc3d4656a4c3c99122ba9256

SHA256

10th

5b6e8e1fcd052d6a73f3f0f99ced4bd54b5b22fd4f13892eaa3013ca65f4e2b5

SHA256

 

We can see that depending upon ...

Get Modern Big Data Processing with Hadoop now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.