# Which Hashing Technique Is Best in Data Structure?

//

Scott Campbell

In data structure, hashing is a technique used to map data to a specific index or slot in a hash table. It is widely used in various applications, such as databases, caches, and password storage.

There are different hashing techniques available, each with its own advantages and disadvantages. In this article, we will discuss some of the popular hashing techniques and their suitability for different scenarios.

## 1. Division Method

The division method is one of the simplest hashing techniques.

It involves dividing the key by the table size and using the remainder as the hash value. For example, if we have a table of size 10 and the key is 25, the hash value would be 25 % 10 = 5.

• Simplicity: The division method is easy to implement and understand.
• Uniformity: If the table size is prime and not close to any power of 2, this method can provide a good distribution of keys.

• Clustering: The division method may result in clustering if there are multiple keys with the same remainder when divided by the table size.
• Poor Performance: If the table size is not properly chosen or if there are many collisions, this method can lead to poor performance.

## 2. Multiplication Method

The multiplication method uses multiplication and fractional part extraction to generate hash values. It multiplies the key by a constant between 0 and 1 and extracts a fraction of the product as the hash value.

• Distribution: The multiplication method can provide a more even distribution of keys compared to the division method.
• Flexibility: This method works well with table sizes that are not powers of 2.

• Complexity: The multiplication method requires careful selection of the constant value to ensure a good distribution of keys.
• Performance: Multiplication involves floating-point calculations, which can be slower compared to integer calculations used in other hashing techniques.

## 3. Folding Method

The folding method divides the key into several parts and performs operations on each part before combining them to form the hash value. The key is typically divided into equal-sized parts, which are then added or XORed together.

• Distribution: The folding method can provide a better distribution of keys compared to simple methods like division.
• Versatility: This method can be customized based on the requirements and characteristics of the data being hashed.