• DocumentCode
    3544216
  • Title

    Properties of a similarity preserving hash function and their realization in sdhash

  • Author

    Breitinger, Frank ; Baier, Harald

  • Author_Institution
    Dept. of Comput. Sci., Hochschule Darmstadt, Darmstadt, Germany
  • fYear
    2012
  • fDate
    15-17 Aug. 2012
  • Firstpage
    1
  • Lastpage
    8
  • Abstract
    Finding similarities between byte sequences is a complex task and necessary in many areas of computer science, e.g., to identify malicious files or spam. Instead of comparing files against each other, one may apply a similarity preserving compression function (hash function) first and do the comparison for the hashes. Although we have different approaches, there is no clear definition / specification or needed properties of such algorithms available.
  • Keywords
    cryptography; file organisation; unsolicited e-mail; byte sequences; computer science; hash function; malicious files; malicious spam; sdhash realization; Computer bugs; Computer science; Cryptography; Entropy; Forensics; Hamming distance; Digital forensics; fuzzy hashing; properties of similarity preserving hashing; similarity preserving hashing;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Information Security for South Africa (ISSA), 2012
  • Conference_Location
    Johannesburg, Gauteng
  • Print_ISBN
    978-1-4673-2160-0
  • Type

    conf

  • DOI
    10.1109/ISSA.2012.6320445
  • Filename
    6320445