Which hash functions to use in a Bloom filter

14,274

Solution 1

I asked myself the same question when building a Java Bloom filter library. See the Github readme for a detailed treatment of my analysis of hash functions for Bloom filters.

I looked at the problem from two perspectives:

  • How fast is the computation?
  • How uniform is the output distribution?

Speed can easily be measured by benchmarks on random input. Uniformity is a bit harder and requires some statistics. Using Chi-Square goodness of fit tests I measured how similar the distribution of hash values is to a uniform distribution.

The result is:

  • Use Murmur3 for the best trade-off between speed and uniformity. Do not use Murmur2 as it is not uniform for inputs that change in small increments.
  • Use a cryptographic hash function like SHA-256 for the best uniformity.
  • Apply the Kirsch-Mitzenmacher-Optimization to only compute 2 instead of k hash functions (hash_i = hash1 + i x hash2).

If your implementation is using Java I would recommend using our Bloom filter hash library. It is well documented and thoroughly tested. For the details, including the benchmark results for different hash function and their unformity according to Chi-Square test, see the Github readme of the repo.

Solution 2

Hash Functions should provide you with graphical proof of why FNV would be a bad choice, and why Murmur2 or one of Bob Jenkins' Hashes would be a good choice.

Share:
14,274

Related videos on Youtube

Torsten
Author by

Torsten

Updated on June 06, 2022

Comments

  • Torsten
    Torsten about 2 years

    I've got the following question about choosing hash functions for Bloom filters:

    • Which functions to use?

    In nearly every document/paper you can read that the hash functions used in a Bloom filter should be independent and uniformly distributed.

    I know what is meant by this (independent and uniformly distributed), but I'm having trouble to find a argumentation or a discussion, which hash functions fulfill those requirements and are therefore suitable. In a lot of posts I've read about suggestions for the usage of the FNV or Murmur hash function, but not why (or at least without a proof) they are suitable.

    Thanks in advance!

  • cyber4ron
    cyber4ron about 7 years
    I didn't read Kirsch-Mitzenmacher-Optimization thoroughly but in the paper hash_i = hash1 + i x hash2 % p, where p is a prime, hash1 and hash2 is within range of [0, p-1], and the bitset consists k * p bits.
  • Terence Chow
    Terence Chow over 5 years
    Is the modulus only on the second hash? Also, the Kirsch-Mitzenmacher-Optimization has 2 hashes of equal bits but in this case one is 128 bits and the second is 256 bits. Will that lead to bias?