Data privacy regulations—coupled with the desire to pro­tect sensitive data—impose requirements on organizations to protect production data. Since many organizations rely on pro­duction data as a ...
Alternatively accept that you use a good 16 bit hash function (perhaps using two independent variables on the odd/even elements) and then combine them at the end masking the high bit if required, I ...