Awesome
hash4j
hash4j is a Java library by Dynatrace that includes various non-cryptographic hash algorithms and data structures that are based on high-quality hash functions.
Content
- First steps
- Hash algorithms
- Similarity hashing
- Approximate distinct counting
- File hashing
- Consistent hashing
- Benchmark results
- Contribution FAQ
First steps
To add a dependency on hash4j using Maven, use the following:
<dependency>
<groupId>com.dynatrace.hash4j</groupId>
<artifactId>hash4j</artifactId>
<version>0.18.0</version>
</dependency>
To add a dependency using Gradle:
implementation 'com.dynatrace.hash4j:hash4j:0.18.0'
Hash algorithms
hash4j currently implements the following hash algorithms:
- Murmur3
- 32-bit
- 128-bit
- Wyhash
- Komihash
- version 4.3 (compatible with version 4.7)
- version 5.0 (compatible with version 5.10)
- FarmHash
- farmhashna
- farmhashuo
- PolymurHash 2.0
- XXH3
All hash functions are thoroughly tested against the native reference implementations and also other libraries like Guava Hashing, Zero-Allocation Hashing, Apache Commons Codec, or crypto (see CrossCheckTest.java).
Usage
The interface allows direct hashing of Java objects in a streaming fashion without first mapping them to byte arrays. This minimizes memory allocations and keeps the memory footprint of the hash algorithm constant regardless of the object size.
class TestClass {
int a = 42;
long b = 1234567890L;
String c = "Hello world!";
}
TestClass obj = new TestClass(); // create an instance of some test class
Hasher64 hasher = Hashing.komihash5_0(); // create a hasher instance
// variant 1: hash object by passing data into a hash stream
long hash1 = hasher.hashStream().putInt(obj.a).putLong(obj.b).putString(obj.c).getAsLong(); // gives 0x89a90f343c3d4862L
// variant 2: hash object by defining a funnel
HashFunnel<TestClass> funnel = (o, sink) -> sink.putInt(o.a).putLong(o.b).putString(o.c);
long hash2 = hasher.hashToLong(obj, funnel); // gives 0x90553fd9c675dfb2L
More examples can be found in HashingDemo.java.
Similarity hashing
Similarity hashing algorithms are able to compute hash signature of sets that allow estimation of set similarity without using the original sets. Following algorithms are currently available:
- MinHash
- SuperMinHash
- SimHash
- FastSimHash: A fast implementation of SimHash using a bit hack (see this blog post)
Usage
ToLongFunction<String> stringHashFunc = s -> Hashing.komihash5_0().hashCharsToLong(s);
Set<String> setA = IntStream.range(0, 90000).mapToObj(Integer::toString).collect(toSet());
Set<String> setB = IntStream.range(10000, 100000).mapToObj(Integer::toString).collect(toSet());
// intersection size = 80000, union size = 100000
// => exact Jaccard similarity of sets A and B is J = 80000 / 100000 = 0.8
int numberOfComponents = 1024;
int bitsPerComponent = 1;
// => each signature will take 1 * 1024 bits = 128 bytes
SimilarityHashPolicy policy =
SimilarityHashing.superMinHash(numberOfComponents, bitsPerComponent);
SimilarityHasher simHasher = policy.createHasher();
byte[] signatureA = simHasher.compute(ElementHashProvider.ofCollection(setA, stringHashFunc));
byte[] signatuerB = simHasher.compute(ElementHashProvider.ofCollection(setB, stringHashFunc));
double fractionOfEqualComponents = policy.getFractionOfEqualComponents(signatureA, signatuerB);
// this formula estimates the Jaccard similarity from the fraction of equal components
double estimatedJaccardSimilarity =
(fractionOfEqualComponents - Math.pow(2., -bitsPerComponent))
/ (1. - Math.pow(2., -bitsPerComponent)); // gives a value close to 0.8
See also SimilarityHashingDemo.java.
Approximate distinct counting
Counting the number of distinct elements exactly requires space that must increase linearly with the count. However, there are algorithms that require much less space by counting just approximately. The space-efficiency of those algorithms can be compared by means of the storage factor which is defined as the state size in bits multiplied by the squared relative standard error of the estimator
$\text{storage factor} := (\text{relative standard error})^2 \times (\text{state size})$.
This library implements two algorithms for approximate distinct counting:
- HyperLogLog: This implementation uses 6-bit registers. The default estimator, which is an improved version of the original estimator, leads to an asymptotic storage factor of $18 \ln 2 - 6 = 6.477$. Using the definition of the storage factor, the corresponding relative standard error is roughly $\sqrt{\frac{6.477}{6 m}} = \frac{1.039}{\sqrt{m}}$. The state size is $6m = 6\cdot 2^p$ bits, where the precision parameter $p$ also defines the number of registers as $m = 2^p$. Alternatively, the maximum-likelihood estimator can be used, which achieves a slightly smaller asymptotic storage factor of $6\ln(2)/(\frac{\pi^2}{6}-1)\approx 6.449$ corresponding to a relative error of $\frac{1.037}{\sqrt{m}}$, but has a worse worst-case runtime performance. In case of non-distributed data streams, the martingale estimator can be used, which gives slightly better estimation results as the asymptotic storage factor is $6\ln 2 = 4.159$. This gives a relative standard error of $\sqrt{\frac{6\ln 2}{6m}} = \frac{0.833}{\sqrt{m}}$. The theoretically predicted estimation errors have been empirically confirmed by simulation results.
- UltraLogLog: This algorithm is described in detail in this paper. Like for HyperLogLog, a precision parameter $p$ defines the number of registers $m = 2^p$. However, since UltraLogLog uses 8-bit registers to enable fast random accesses and updates of the registers, $m$ is also the state size in bytes. The default estimator leads to an asymptotic storage factor of 4.895, which corresponds to a 24% reduction compared to HyperLogLog and a relative standard error of $\frac{0.782}{\sqrt{m}}$. Alternatively, if performance is not an issue, the slower maximum-likelihood estimator can be used to obtain a storage factor of $8\ln(2)/\zeta(2,\frac{5}{4}) \approx 4.631$ corresponding to a 28% reduction and a relative error of $\frac{0.761}{\sqrt{m}}$. If the martingale estimator can be used, the storage factor will be just $5 \ln 2 = 3.466$ yielding an asymptotic relative standard error of $\frac{0.658}{\sqrt{m}}$. These theoretical formulas again agree well with the simulation results.
Both algorithms share the following properties:
- Constant-time add-operations
- Allocation-free updates
- Idempotency, adding items already inserted before will never change the internal state
- Mergeability, even for data structures initialized with different precision parameters
- Final state is independent of order of add- and merge-operations
- Fast estimation algorithm that is fully backed by theory and does not rely on magic constants
Usage
Hasher64 hasher = Hashing.komihash5_0(); // create a hasher instance
UltraLogLog sketch = UltraLogLog.create(12); // corresponds to a standard error of 1.2% and requires 4kB
sketch.add(hasher.hashCharsToLong("foo"));
sketch.add(hasher.hashCharsToLong("bar"));
sketch.add(hasher.hashCharsToLong("foo"));
double distinctCountEstimate = sketch.getDistinctCountEstimate(); // gives a value close to 2
See also UltraLogLogDemo.java and HyperLogLogDemo.java.
Compatibility
HyperLogLog and UltraLogLog sketches can be reduced to corresponding sketches with smaller precision parameter p
using sketch.downsize(p)
. UltraLogLog sketches can be also transformed into HyperLogLog sketches with same precision parameter using HyperLogLog hyperLogLog = HyperLogLog.create(ultraLogLog);
as demonstrated in ConversionDemo.java.
HyperLogLog can be made compatible with implementations of other libraries which also use a single 64-bit hash value as input. The implementations usually differ only in which bits of the hash value are used for the register index and which bits are used to determine the number of leading (or trailing) zeros.
Therefore, if the bits of the hash value are permuted accordingly, compatibility can be achieved.
File hashing
This library contains an implementation of Imohash that allows fast hashing of files. It is based on the idea of hashing only the beginning, a middle part and the end, of large files, which is usually sufficient to distinguish files. Unlike cryptographic hashing algorithms, this method is not suitable for verifying the integrity of files. However, this algorithm can be useful for file indexes, for example, to find identical files.
Usage
// create some file in the given path
File file = path.resolve("test.txt").toFile();
try (FileWriter fileWriter = new FileWriter(file, StandardCharsets.UTF_8)) {
fileWriter.write("this is the file content");
}
// use ImoHash to hash that file
HashValue128 hash = FileHashing.imohash1_0_2().hashFileTo128Bits(file);
// returns 0xd317f2dad6ea7ae56ff7fdb517e33918
See also FileHashingDemo.java.
Consistent hashing
This library contains various algorithms for the distributed agreement on the assignment of hash values to a given number of buckets.
In the naive approach, the hash values are assigned to the buckets with the modulo operation according to
bucketIdx = abs(hash) % numBuckets
.
If the number of buckets is changed, the bucket index will change for most hash values.
With a consistent hash algorithm, the above expression can be replaced by
bucketIdx = consistentBucketHasher.getBucket(hash, numBuckets)
to minimize the number of reassignments while still ensuring a fair distribution across all buckets.
The following consistent hashing algorithms are available:
- JumpHash: This algorithm has a calculation time that scales logarithmically with the number of buckets
- Improved Consistent Weighted Sampling: This algorithm is based on improved consistent weighted sampling with a constant computation time independent of the number of buckets. This algorithm is faster than JumpHash for a large number of buckets.
- JumpBackHash: In contrast to JumpHash, which traverses "active indices" (see here for a definition) in ascending order, JumpBackHash does this in the opposite direction. In this way, floating-point operations can be completely avoided. Further optimizations minimize the number of random values that need to be generated to reach the largest "active index" within the given bucket range in amortized constant time. The largest "active index", defines the bucket assignment of the given hash value. In the worst case, this algorithm consumes an average of 5/3 = 1.667 64-bit random values.
Usage
// create a consistent bucket hasher
ConsistentBucketHasher consistentBucketHasher =
ConsistentHashing.jumpBackHash(PseudoRandomGeneratorProvider.splitMix64_V1());
long[] hashValues = {9184114998275508886L, 7090183756869893925L, -8795772374088297157L};
// determine assignment of hash values to 2 buckets
Map<Integer, List<Long>> assignment2Buckets =
LongStream.of(hashValues)
.boxed()
.collect(groupingBy(hash -> consistentBucketHasher.getBucket(hash, 2)));
// gives {0=[7090183756869893925, -8795772374088297157], 1=[9184114998275508886]}
// determine assignment of hash values to 3 buckets
Map<Integer, List<Long>> assignment3Buckets =
LongStream.of(hashValues)
.boxed()
.collect(groupingBy(hash -> consistentBucketHasher.getBucket(hash, 3)));
// gives {0=[7090183756869893925], 1=[9184114998275508886], 2=[-8795772374088297157]}
// hash value -8795772374088297157 got reassigned from bucket 0 to bucket 2
// probability of reassignment is equal to 1/3
See also ConsistentHashingDemo.java.
Benchmark results
Benchmark results for different revisions can be found here.
Contribution FAQ
Coding style
To ensure that your contribution adheres to our coding style, run the spotlessApply
Gradle task.
Python
This project contains python code. We recommend using a python virtual environment in a .venv
directory. If you are new, please follow the steps outlined
in the official Python documentation for creation and activation.
To install the required dependencies including black, please execute pip install -r requirements.txt
.
Reference implementations
Reference implementations of hash algorithms are included as git submodules within the reference-implementations
directory and can be fetched using
git submodule update --init --recursive
.