Online Courses
Blockchain Security
Online Courses
Blockchain Security
  • Blockchain Security
  • Fundamentals of Blockchain Security
    • Introduction to blockchain
    • The promises of blockchain
    • Inside the blockchain hype
    • Blockchain structures
    • What is public-key cryptography?
      • How does public-key cryptography work?
      • Public-key cryptography in the blockchain
    • Security assumptions of public-key cryptography
      • Quantum computing
    • Hash function in blockchain
      • Properties of hash functions
      • Hash functions in the blockchain
      • Blockchain security hash key functions
    • Quiz
  • Consensus Algorithm Security
    • Introduction
      • The Byzantine generals problem
      • Security via scarcity
      • Common blockchain consensus algorithms
      • The longest chain rule
    • Proof of work
      • Inside PoW mining
    • Attacking proof of work
      • The 51% attack
      • Denial of service: Artificial difficulty increases
    • Proof of stake
      • Choosing the block creator
    • Attacking PoS consensus
      • XX% attack and the PoS "timebomb"
      • Fake stake attacks
      • Long-range attack
      • Nothing at stake problem
      • Sour milk attack
    • Quiz
  • Blockchain in Action
    • Nodes and network
      • Inside the node
      • How blocks are created
    • Attacking block creation
      • Denial-of-service
      • Frontrunning
      • Selfish mining
      • SPV mining
    • Attacking blockchain nodes
      • Blockchain software misconfiguration
      • Denial of service
      • Malicious transactions
    • Attacking the blockchain network
      • Eclipse attack
      • Routing attack
      • Sybil attack
    • Quiz
  • Smart Contract Security
    • What are smart contracts?
      • Smart contracts
    • General programming vulnerabilities
      • Arithmetic vulnerabilities
      • Right-to-left control character
    • Blockchain vulnerabilities
    • Ethereum vulnerabilities
    • Quiz
  • Beyond the Basics
    • Alternative distributed ledger architectures
      • Introduction to DAGs
      • Introduction to block lattices
      • Introduction to sidechains
    • Second-level blockchain protocols
      • How a state channel works
    • Advanced cryptography in blockchain
      • Multisignatures
      • Zero-knowledge proofs
      • Stealth addresses
      • Ring signatures
      • Commitment schemes
    • Quiz
  • Cumulative Quiz
Powered by GitBook
On this page
  1. Fundamentals of Blockchain Security
  2. Hash function in blockchain

Blockchain security hash key functions

Security assumptions of hash functions

There are three main security assumptions for hash functions:

  1. Preimage resistance: This means that you can't figure out the original input of a hash function just by knowing its output. It's like trying to guess a secret code without any clues. Even if you find a different input that produces the same output, there are countless other possible inputs, so you can't be sure if you found the right one.

  2. Collision resistance: This ensures that you can't find two different inputs that produce the same output. If this were possible, someone could create a fake block or transaction that looks legitimate but actually changes the information in the blockchain.

  3. Quantum resistance: Just like with public key cryptography, hash functions need to be resistant to attacks from quantum computers. While there is no algorithm that completely breaks hash functions on a quantum computer, there is one that can reduce their security. However, as long as the reduction in security doesn't make the hash function vulnerable, it remains secure.

It's important to note that while most currently used hash functions are considered secure, there have been cases in the past where vulnerabilities were found and the algorithms had to be replaced. But for now, the main concerns are preimage resistance and collision resistance.

PreviousHash functions in the blockchainNextQuiz

Last updated 9 months ago