Learning About Bitcoin Basics With Hash Functions

2022-8-16 15:41

Hash functions are a one-way mathematical problem. If a person has the resulting hash, it is impossible to convert it back to the original data.

Watch This Episode On YouTube Or Rumble

Listen To The Episode Here:

AppleSpotifyGoogleLibsyn

In this episode of “Bitcoin, Explained,” hosts Aaron van Wirdum and Sjors Provoost go back to Bitcoin basics. They explain one of the most fundamental building blocks in all of Bitcoin: hash functions.

To start the episode off, van Wirdum and Provoost explain that hash functions are a type of mathematical one-way function. That means that they can easily convert one piece of data into another piece of data — a hash — but it is impossible for anyone who knows only this hash to convert it back to the original data. Additionally, a hash is supposed to be unique: no two (different) pieces of data should result in the same hash. If either of these things is no longer true, a hash function is considered to be broken.

Then, van Wirdum and Provoost go on to explain how hash functions actually work in a little bit more detail. They discuss some aspects of the history and evolution of different hash functions, mention some hash functions that have indeed been broken over time and pinpoint which hash functions are used in Bitcoin.

Finally, van Wirdum and Provoost explain exactly how hash functions are used in Bitcoin. They point out that this includes almost every aspect of the Bitcoin system, ranging from transactions (in multiple ways) and blocks to addresses and the proof-of-work mechanism, as well as in relatively new upgrades like Taproot. Hash functions are even used to create some randomness needed to establish connections on the peer-to-peer network.

Listen to the whole episode to learn more about hash functions.

Similar to Notcoin - Blum - Airdrops In 2024

origin »

Giga Hash (GHS) на Currencies.ru

$ 0.0023182 (+0.32%)
Объем 24H $112
Изменеия 24h: 1.85 %, 7d: -6.50 %
Cегодня L: $0.0023182 - H: $0.0023182
Капитализация $298.854k Rank 99999
Доступно / Всего 128.916m GHS

hash functions original resulting data impossible back

hash functions → Результатов: 10


STARKs, Part I: Proofs with Polynomials

Special thanks to Eli Ben-Sasson for ongoing help, explanations and review, coming up with some of the examples used in this post, and most crucially of all inventing a lot of this stuff; thanks to Hsiao-wei Wang for reviewing Hopefully many people by now have heard of ZK-SNARKs, the general-purpose succinct zero knowledge proof technology that can be used for all sorts of usecases ranging from verifiable computation to privacy-preserving cryptocurrency.

2018-7-21 23:03


Фото:

How Digital Signatures and Hashing Protect Your Transactions

Digital Signatures and Hashing Digital signatures and cryptographic hash functions comprise the secret sauce that makes cryptocurrency work.  They put the crypto into currency, so to speak. Your digital signature proves you have the private key that claims ownership of… The post How Digital Signatures and Hashing Protect Your Transactions appeared first on CoinCentral.

2018-7-12 14:47