Title : 
Properties of a similarity preserving hash function and their realization in sdhash
         
        
            Author : 
Breitinger, Frank ; Baier, Harald
         
        
            Author_Institution : 
Dept. of Comput. Sci., Hochschule Darmstadt, Darmstadt, Germany
         
        
        
        
        
        
            Abstract : 
Finding similarities between byte sequences is a complex task and necessary in many areas of computer science, e.g., to identify malicious files or spam. Instead of comparing files against each other, one may apply a similarity preserving compression function (hash function) first and do the comparison for the hashes. Although we have different approaches, there is no clear definition / specification or needed properties of such algorithms available.
         
        
            Keywords : 
cryptography; file organisation; unsolicited e-mail; byte sequences; computer science; hash function; malicious files; malicious spam; sdhash realization; Computer bugs; Computer science; Cryptography; Entropy; Forensics; Hamming distance; Digital forensics; fuzzy hashing; properties of similarity preserving hashing; similarity preserving hashing;
         
        
        
        
            Conference_Titel : 
Information Security for South Africa (ISSA), 2012
         
        
            Conference_Location : 
Johannesburg, Gauteng
         
        
            Print_ISBN : 
978-1-4673-2160-0
         
        
        
            DOI : 
10.1109/ISSA.2012.6320445