Security with data structures
Make a Hash
What do all programs have in common? They store data at some point, usually in arrays – everything from command-line options to the input and output. But how is data actually stored by the program? Kurt explains.
Many data types and structures exist – from simple strings and integers to multi-dimensional arrays. One of the most common and useful types is the simple growable array that can contain an arbitrary number of elements. You can basically put data in, look it up, and remove it as needed; this structure is also referred to as a one-dimensional array. Often, you can also insert an array as a data element into an existing array, giving you a multi-dimensional array that lets you do things like create a "customer" array with a number of elements containing a customer name, phone number, and so forth.
About Arrays
Arrays typically have three major operations: insertion (adding elements), lookups (reading a value), and removing elements. There are a number of ways to structure the data in memory, and various strategies can be used to optimize operations on the array. A simple linked list, for example, makes it easy to add an element to the beginning or end of an array but expensive to insert an item into the middle, because it must search the array for the appropriate location. In general, most programming languages that provide well-formed data array structures, such as Perl, Python, Ruby, and so forth, do a pretty good job.
The most common strategy is to create a key based on the data (essentially a hash value), the array is then ordered by these keys. A significant benefit here is that the keys will (usually) have a random and relatively uniform distribution (e.g., 01, 23, 45, 67, 89). This approach is helpful when using things like binary trees, which benefit from having balanced key distribution. This is also referred to as a hash map.
[...]
Buy this article as PDF
(incl. VAT)
Buy Linux Magazine
Subscribe to our Linux Newsletters
Find Linux and Open Source Jobs
Subscribe to our ADMIN Newsletters
Support Our Work
Linux Magazine content is made possible with support from readers like you. Please consider contributing when you’ve found an article to be beneficial.
News
-
Two New Distros Adopt Enlightenment
MX Moksha and AV Linux 25 join ranks with Bodhi Linux and embrace the Enlightenment desktop.
-
Solus Linux 4.8 Removes Python 2
Solus Linux 4.8 has been released with the latest Linux kernel, updated desktops, and a key removal.
-
Zorin OS 18 Hits over a Million Downloads
If you doubt Linux isn't gaining popularity, you only have to look at Zorin OS's download numbers.
-
TUXEDO Computers Scraps Snapdragon X1E-Based Laptop
Due to issues with a Snapdragon CPU, TUXEDO Computers has cancelled its plans to release a laptop based on this elite hardware.
-
Debian Unleashes Debian Libre Live
Debian Libre Live keeps your machine free of proprietary software.
-
Valve Announces Pending Release of Steam Machine
Shout it to the heavens: Steam Machine, powered by Linux, is set to arrive in 2026.
-
Happy Birthday, ADMIN Magazine!
ADMIN is celebrating its 15th anniversary with issue #90.
-
Another Linux Malware Discovered
Russian hackers use Hyper-V to hide malware within Linux virtual machines.
-
TUXEDO Computers Announces a New InfinityBook
TUXEDO Computers is at it again with a new InfinityBook that will meet your professional and gaming needs.
-
SUSE Dives into the Agentic AI Pool
SUSE becomes the first open source company to adopt agentic AI with SUSE Enterprise Linux 16.

