Jump to content

Toeplitz Hash Algorithm

From Wikipedia, the free encyclopedia

This is an old revision of this page, as edited by OAbot (talk | contribs) at 23:56, 14 April 2020 (Open access bot: doi added to citation with #oabot.). The present address (URL) is a permanent link to this revision, which may differ significantly from the current revision.

Toeplitz Hash
General
Related toReceive Side Scaling

The Toeplitz Hash Algorithm describes hash functions that compute hash values through matrix multiplication of the key with a suitable Toeplitz matrix.[1] The Toeplitz Hash Algorithm is used in many network interface controllers for receive side scaling.[2][3]

As an example, with the Toeplitz matrix the key results in a hash as follows:

where the entries are bits and all operations are modulo 2. In implementations the highly redundant matrix is not necessarily explicitly stored.

References

  1. ^ Krawczyk, Hugo (1995). "New Hash Functions for Message Authentication". 921: 301–310. doi:10.1007/3-540-49264-X_24. ISSN 0302-9743. {{cite journal}}: Cite journal requires |journal= (help)
  2. ^ "Scaling in the Linux Networking Stack". Archived from the original on 22 May 2014. Retrieved 2014-05-22.
  3. ^ "Scalable Networking: Eliminating the Receive Processing Bottleneck—Introducing RSS". Archived from the original on 22 May 2014. Retrieved 2014-05-22.