Theory in Computer Scienceâ€”as in any other fieldâ€”is based on models. These models make many hidden assumptions. This is one of the fundamental reason why pure theory is wasteful. We must constantly revisit our old assumptions and run experiments to determine whether our models are useful.

Hash tables are a fundamental data structure. They are part of every elementary introduction to Computer Science. From a programmer’s point of view, they associate keys with values. Hash tables go back to the beginnings of Computer Science even though new variations keep being invented (e.g., Cuckoo hashing). Incredibly, hash tables were just recently integrated in the C++ language, but less conservative languages like Java, Python, Ruby, Perl, PHP, all have hash tables built-in.

The secret sauce is that the key is first transformed (or hashed) to a number between 1 and *m* corresponding to a cell in an array. As long as this number of generated with sufficient randomness, hash tables are almost equivalent to looking up values in an arrayâ€”except for the overhead of hashing the key.

Thus, *everyone knows* that hash table queries run in amortized constant time. That is, as the number of keys increases, the average time necessary to recover a key-value pair does not increase.

But wait! How do we compute hash values? Consider the standard universal hashing technique described in Corman et al. Introduction to Algorithms. We pick any prime number *m*. Pick randomly a number a in [0,m). Then *h*(*x*)= *x* *a* modulo *m *is a universal hash function. Multiplications of numbers in [0,*m*) can almost be done in time *O*(log *m*). For the purposes of hash tables, the number *m* must be close to the number of different keys *n*. Thusâ€”formallyâ€”hash tables often run in time *O*(log *n*).

Am I being pedantic? Does the time required to multiply integers on modern machine depend on the size of the integers? It certainly does if you are using **vectorization**. And vectorization is used in commercial databases!

And what if your key is a string? As you have more keys, you are more likely to encounter longer strings which take longer to hash.

**Thus, it is possible for hash tables to run in time ****O****(****log ****n****) in practice, despite what the textbooks say.**

What other hidden assumptions are you making right now?

**Note 1**: Fortunately, universal hashing can be computed in linear time with respect to the number of bits, by avoiding multiplications.

**Note 2:** The problems that result from picking the wrong model of computation are well known and addressed by most textbooks. I have not discovered anything new.

**Note 3:** In a recent paper on fast string hashing, we show that, in practice, you can hash strings for a fraction of a CPU cycles per byte.

**Update:** See my more recent post Sensible hashing of variable-length strings is impossible.