{"version":"1.0","provider_name":"MozDomains Blog","provider_url":"https:\/\/www.mozdomains.com\/blog\/en","author_name":"Momed Jussub","author_url":"https:\/\/www.mozdomains.com\/blog\/en\/author\/momed-jussub\/","title":"Hashing Algorithm - MozDomains Blog","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"xG1SXksFIQ\"><a href=\"https:\/\/www.mozdomains.com\/blog\/en\/website-security\/hashing-algorithm\/\">Hashing Algorithm<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.mozdomains.com\/blog\/en\/website-security\/hashing-algorithm\/embed\/#?secret=xG1SXksFIQ\" width=\"600\" height=\"338\" title=\"&#8220;Hashing Algorithm&#8221; &#8212; MozDomains Blog\" data-secret=\"xG1SXksFIQ\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script>\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/www.mozdomains.com\/blog\/en\/wp-includes\/js\/wp-embed.min.js\n<\/script>\n","thumbnail_url":"https:\/\/www.mozdomains.com\/blog\/en\/wp-content\/uploads\/2019\/03\/N8r3K.png","thumbnail_width":1024,"thumbnail_height":512,"description":"Hashing refers to the transformation of a string of characters into a typically shorter fixed-length value or key that represents the original string. Hashing is apt for indexing and retrieving items in a database as it takes less time to find the item using the shorter hashed key in comparison to the time taken while using the original value. Hashing is also employed in several encryption algorithms. The hashing algorithm is referred to as the hash function: a term probably derived from the concept that the resulting hash value can be assumed as a &#8220;mixed up&#8221; version of the represented\u2026"}