Universal Unique Identifier (UUID)

Universal Unique Identifier (UUID)

Generates and validates various types of UUIDs

GENERATE UUID

VALIDATE UUID

Introduction

UUIDs, or Universally Unique Identifiers, are crucial tools in computer science for creating unique identifiers. They are used in a wide range of applications, from database management to cybersecurity. In this guide, we will explore the different versions of UUIDs, including versions 1, 3, 4, and 5, and see how each of them is used and generated.

What is an UUID?

An UUID is a 36-character alphanumeric string (32 hexadecimal digits separated by 4 hyphens) that represents a unique identifier. These identifiers are widely used to avoid naming or identification conflicts in distributed systems and global applications. UUIDs are generated in such a way that duplicates are highly improbable even in very large systems and at different times.

UUID Version 1

UUID version 1 is known as "time-based UUID" and is often used in scenarios where having a temporal component in the identifier is important. This version combines a timestamp based on the current time and the Media Access Control (MAC) address of the generating computer or node. This way, UUIDs v1 are unique within a single node and are ordered temporally.

UUID Version 3

UUID version 3 is generated using a hash function. It requires a name and a namespace as input and produces a deterministic UUID based on these values. This means that if the same name and namespace are used, the same UUID version 3 will always be generated. It is useful in applications where ensuring that the same name always generates the same UUID is necessary.

UUID Version 4

UUID version 4 is known as "random UUID" and is generated completely randomly. This makes UUIDs v4 suitable for a wide range of applications where a temporal or deterministic component is not required. UUIDs v4 are often used to generate secure access tokens, session identifiers, and much more.

UUID Version 5

UUID Version 5 is similar to UUID Version 3 but uses a different hashing function. It also requires a name and a namespace as input and generates a deterministic UUID based on these values. Like UUID Version 3, it is useful when it is necessary to ensure that the same name always generates the same UUID, but it uses a different hash function for generation.

When to Use Each Version

  • UUID Version 1: Use when it is important to have a temporal component in the UUID, such as sorting events based on time.

  • UUID Version 3: Use when it is necessary to generate deterministic UUIDs based on specific names and namespaces. It is useful to ensure that the same name always generates the same UUID.

  • UUID Version 4: Use when a random UUID is needed and there is no need for a temporal or deterministic component. It is often used for generic purposes and for generating security tokens.

  • UUID Version 5: Use when a deterministic UUID based on specific names and namespaces is needed, but a different hash function than UUID Version 3 is desired.

Conclusions

UUIDs are fundamental tools in computer science for creating unique identifiers. The different versions of UUIDs offer different features and are suitable for different purposes. It is important to select the correct version based on the application's needs. Whether it is sorting events, generating security tokens, or ensuring determinism in generation, there is a suitable type of UUID for every scenario.

uuid
generate
verify
Scroll top toggle