Previous Table of Contents Next


17.6 Object Identity, Binding, and Life Cycle

    The interworking model illustrated in Figure 17-2 on page 17-5 and Figure 17-3 on page 17-7 maps a View in one object system to a reference in the other system. This relationship raises questions:

   5. MD5 was chosen as the hash algorithm because of its uniformity of distribution of bits in the hash value and its popularity for creating unique keys for input text. The algorithm is designed such that on average, half of the output bits change for each bit change in the input. The original algorithm provides a key with uniform distribution in 128 bits. The modification used in this specification selects 118 bits. With a uniform distribution, the probability of

   drawing k distinct keys (using k distinct inputs) is n!/((n-k)!*nk), where n is the number of

   distinct key values (i.e., n=2118). If a million (i.e., k=106) distinct interface repository IDs are passed through the algorithm, the probability of a collision in any of the keys is less than 1 in 1023.