Title :
Properties of a similarity preserving hash function and their realization in sdhash
Author :
Breitinger, Frank ; Baier, Harald
Author_Institution :
Dept. of Comput. Sci., Hochschule Darmstadt, Darmstadt, Germany
Abstract :
Finding similarities between byte sequences is a complex task and necessary in many areas of computer science, e.g., to identify malicious files or spam. Instead of comparing files against each other, one may apply a similarity preserving compression function (hash function) first and do the comparison for the hashes. Although we have different approaches, there is no clear definition / specification or needed properties of such algorithms available.
Keywords :
cryptography; file organisation; unsolicited e-mail; byte sequences; computer science; hash function; malicious files; malicious spam; sdhash realization; Computer bugs; Computer science; Cryptography; Entropy; Forensics; Hamming distance; Digital forensics; fuzzy hashing; properties of similarity preserving hashing; similarity preserving hashing;
Conference_Titel :
Information Security for South Africa (ISSA), 2012
Conference_Location :
Johannesburg, Gauteng
Print_ISBN :
978-1-4673-2160-0
DOI :
10.1109/ISSA.2012.6320445