ChallengeGenerate matching shard id–answer

time to read 2 min | 371 words

I posed a potential problem for a job interview. Given the following function, generate another key that has the same shard:

In other words, give “users/71” and a prefix of “orders/654”, generate a key that would be placed on the same shard as “users/71”. The answer in this case can be: “orders/654-vaueaa”.

In order to answer the question, we need to understand what is going on here. The function above is a fancy way to extract 16 bits of information from the key using a cryptographically hash function. MD5 is no longer considered secured, but given the fact that I’m needing just 16 bits, that is not an issue. The code above is slightly more complex than needed, I could simplify it to this and have the same effect (but not the same result, mind):

The need to generate a matching shard id is another way to say that we need a hash collision. Given that the key space is 2^16, and that we can assume that any mutation to the key will result effectively random changes to the result, we can simply generate different keys and try to see if they match. Here is a simple way to do so:

We are effectively throwing a dice and seeing if this match. So it is a probability game to wait until we have a collision. The actual implementation isn’t that important, what is interesting is to talk about the implications here:

  • Are there better ways to go about doing something like this? Not really, given that MD5 isn’t that broken.
  • How much time will it take to generate a shard id match? The answer, usually around 64K tries. But why is interesting. The birthday attack issues don’t play here, because we don’t need to match to multiple items, just one. So we role the dice and see if we match on the value.
  • Can we speed this up? Using a different hash function would probably help, yes.
  • What other ways do we have to handle this? Different shard id generation would allow much better alternative.

The last question is where we get into more interesting details about system design, ergonomics of the choices we make and get to see how the candidate actually thinks.

More posts in "Challenge" series:

  1. (03 Feb 2025) Giving file system developer ulcer
  2. (20 Jan 2025) What does this code do?
  3. (01 Jul 2024) Efficient snapshotable state
  4. (13 Oct 2023) Fastest node selection metastable error state–answer
  5. (12 Oct 2023) Fastest node selection metastable error state
  6. (19 Sep 2023) Spot the bug
  7. (04 Jan 2023) what does this code print?
  8. (14 Dec 2022) What does this code print?
  9. (01 Jul 2022) Find the stack smash bug… – answer
  10. (30 Jun 2022) Find the stack smash bug…
  11. (03 Jun 2022) Spot the data corruption
  12. (06 May 2022) Spot the optimization–solution
  13. (05 May 2022) Spot the optimization
  14. (06 Apr 2022) Why is this code broken?
  15. (16 Dec 2021) Find the slow down–answer
  16. (15 Dec 2021) Find the slow down
  17. (03 Nov 2021) The code review bug that gives me nightmares–The fix
  18. (02 Nov 2021) The code review bug that gives me nightmares–the issue
  19. (01 Nov 2021) The code review bug that gives me nightmares
  20. (16 Jun 2021) Detecting livelihood in a distributed cluster
  21. (21 Apr 2020) Generate matching shard id–answer
  22. (20 Apr 2020) Generate matching shard id
  23. (02 Jan 2020) Spot the bug in the stream
  24. (28 Sep 2018) The loop that leaks–Answer
  25. (27 Sep 2018) The loop that leaks
  26. (03 Apr 2018) The invisible concurrency bug–Answer
  27. (02 Apr 2018) The invisible concurrency bug
  28. (31 Jan 2018) Find the bug in the fix–answer
  29. (30 Jan 2018) Find the bug in the fix
  30. (19 Jan 2017) What does this code do?
  31. (26 Jul 2016) The race condition in the TCP stack, answer
  32. (25 Jul 2016) The race condition in the TCP stack
  33. (28 Apr 2015) What is the meaning of this change?
  34. (26 Sep 2013) Spot the bug
  35. (27 May 2013) The problem of locking down tasks…
  36. (17 Oct 2011) Minimum number of round trips
  37. (23 Aug 2011) Recent Comments with Future Posts
  38. (02 Aug 2011) Modifying execution approaches
  39. (29 Apr 2011) Stop the leaks
  40. (23 Dec 2010) This code should never hit production
  41. (17 Dec 2010) Your own ThreadLocal
  42. (03 Dec 2010) Querying relative information with RavenDB
  43. (29 Jun 2010) Find the bug
  44. (23 Jun 2010) Dynamically dynamic
  45. (28 Apr 2010) What killed the application?
  46. (19 Mar 2010) What does this code do?
  47. (04 Mar 2010) Robust enumeration over external code
  48. (16 Feb 2010) Premature optimization, and all of that…
  49. (12 Feb 2010) Efficient querying
  50. (10 Feb 2010) Find the resource leak
  51. (21 Oct 2009) Can you spot the bug?
  52. (18 Oct 2009) Why is this wrong?
  53. (17 Oct 2009) Write the check in comment
  54. (15 Sep 2009) NH Prof Exporting Reports
  55. (02 Sep 2009) The lazy loaded inheritance many to one association OR/M conundrum
  56. (01 Sep 2009) Why isn’t select broken?
  57. (06 Aug 2009) Find the bug fixes
  58. (26 May 2009) Find the bug
  59. (14 May 2009) multi threaded test failure
  60. (11 May 2009) The regex that doesn’t match
  61. (24 Mar 2009) probability based selection
  62. (13 Mar 2009) C# Rewriting
  63. (18 Feb 2009) write a self extracting program
  64. (04 Sep 2008) Don't stop with the first DSL abstraction
  65. (02 Aug 2008) What is the problem?
  66. (28 Jul 2008) What does this code do?
  67. (26 Jul 2008) Find the bug fix
  68. (05 Jul 2008) Find the deadlock
  69. (03 Jul 2008) Find the bug
  70. (02 Jul 2008) What is wrong with this code
  71. (05 Jun 2008) why did the tests fail?
  72. (27 May 2008) Striving for better syntax
  73. (13 Apr 2008) calling generics without the generic type
  74. (12 Apr 2008) The directory tree
  75. (24 Mar 2008) Find the version
  76. (21 Jan 2008) Strongly typing weakly typed code
  77. (28 Jun 2007) Windsor Null Object Dependency Facility