Online Courses
Blockchain Security
Online Courses
Blockchain Security
  • Blockchain Security
  • Fundamentals of Blockchain Security
    • Introduction to blockchain
    • The promises of blockchain
    • Inside the blockchain hype
    • Blockchain structures
    • What is public-key cryptography?
      • How does public-key cryptography work?
      • Public-key cryptography in the blockchain
    • Security assumptions of public-key cryptography
      • Quantum computing
    • Hash function in blockchain
      • Properties of hash functions
      • Hash functions in the blockchain
      • Blockchain security hash key functions
    • Quiz
  • Consensus Algorithm Security
    • Introduction
      • The Byzantine generals problem
      • Security via scarcity
      • Common blockchain consensus algorithms
      • The longest chain rule
    • Proof of work
      • Inside PoW mining
    • Attacking proof of work
      • The 51% attack
      • Denial of service: Artificial difficulty increases
    • Proof of stake
      • Choosing the block creator
    • Attacking PoS consensus
      • XX% attack and the PoS "timebomb"
      • Fake stake attacks
      • Long-range attack
      • Nothing at stake problem
      • Sour milk attack
    • Quiz
  • Blockchain in Action
    • Nodes and network
      • Inside the node
      • How blocks are created
    • Attacking block creation
      • Denial-of-service
      • Frontrunning
      • Selfish mining
      • SPV mining
    • Attacking blockchain nodes
      • Blockchain software misconfiguration
      • Denial of service
      • Malicious transactions
    • Attacking the blockchain network
      • Eclipse attack
      • Routing attack
      • Sybil attack
    • Quiz
  • Smart Contract Security
    • What are smart contracts?
      • Smart contracts
    • General programming vulnerabilities
      • Arithmetic vulnerabilities
      • Right-to-left control character
    • Blockchain vulnerabilities
    • Ethereum vulnerabilities
    • Quiz
  • Beyond the Basics
    • Alternative distributed ledger architectures
      • Introduction to DAGs
      • Introduction to block lattices
      • Introduction to sidechains
    • Second-level blockchain protocols
      • How a state channel works
    • Advanced cryptography in blockchain
      • Multisignatures
      • Zero-knowledge proofs
      • Stealth addresses
      • Ring signatures
      • Commitment schemes
    • Quiz
  • Cumulative Quiz
Powered by GitBook
On this page
  1. Fundamentals of Blockchain Security

Hash function in blockchain

What is a hash function?

A hash function is like a special machine that takes in any kind of information, like a message or a file, and gives you a fixed-size output. It's called a "one-way" function because once you put something into a hash function, you can't easily figure out what the original input was.

Hash functions are really useful in blockchain technology for a few reasons. First, they help ensure the integrity of data. If you have a file and you want to make sure it hasn't been changed, you can use a hash function to create a unique "fingerprint" of that file. If someone else downloads the file and creates the same fingerprint using the hash function, you can be pretty sure that the file hasn't been tampered with.

Second, hash functions are often used to store passwords securely. Instead of storing passwords in plain text, which can be risky if someone gets access to them, we can store the hash value of the password. When a user enters their password, we can hash it and compare it to the stored hash value. If they match, we know the password is correct without actually storing the password itself.

Lastly, hash functions are used to create unique identifiers. Because the chances of two different pieces of data producing the same hash value are very low, we can use hash values as unique identifiers for files, objects, or any other kind of data.

So, hash functions are like special machines that create fixed-size outputs from any kind of input. They help ensure data integrity, store passwords securely, and create unique identifiers.

PreviousQuantum computingNextProperties of hash functions

Last updated 5 months ago