Hash Collision Probabilities:
Code: Select all
preshing.com/20110504/hash-collision-probabilities/
Here's another interesting link:
Code: Select all
stackoverflow.com/questions/996843/when-is-crc-more-appropriate-to-use-than-md5-sha1
Code: Select all
web.archive.org/web/20120722074858/ h t t p : / /bretm.home.comcast.net/~bretm/hash/8.html
Just registered, so could not post actual links.CRC32 was never intended for hash table use. There is really no good reason to use it for this purpose, and I recommend that you avoid doing so.
If you decide to use CRC32, it's critical that you use the hash bits from the end opposite to that in which the key octets are fed in. Which end this is depends on the specific CRC32 implementation. Do not treat CRC32 as a "black box" hash function, and do not use it as a general purpose hash. Be sure to test each application of it for suitability.