Close Menu
Crypto Chain Post
    Trending

    ANIME Fights Market Vows With 23% Rise | Meme Coins To Watch Today

    June 4, 2025

    DePIN to reach $3.5T by 2028 on crypto, AI convergence: WEF

    June 4, 2025

    Blackrock’s Tokenized Money Market Fund BUIDL Tops $10M in May Dividends

    June 4, 2025

    GameStop, Strike Among Growing List of Firms Adding Bitcoin to Treasuries

    June 4, 2025

    John Deaton Says XRP ETFs Are Coming

    June 4, 2025
    Facebook X (Twitter) Instagram TikTok Telegram
    • Privacy Policy
    • Terms of use
    • Advertise
    • Contact
    Wednesday, June 4
    Crypto Chain Post
    Price Index Newsletter
    • Home
    • News
      • Bitcoin
      • Ethereum
      • Altcoin
    • Blockchain
    • Markets
    • NFTs
    • DeFi
    • Web3
    • Analysis
    • Metaverse
    • Resources
      • Price Index
      • Crypto Heatmap
      • Glossary
      • Exchange
      • Economic Calendar
    • More
      • GameFi
      • ICO
      • Legal
      • Security
    Crypto Chain Post
    Home » Cryptographic Hash Function

    Cryptographic Hash Function

    News RoomBy News RoomDecember 30, 2022No Comments2 Mins Read

    Cryptographic hash functions produce a fixed-size hash value from a variable-size transaction input.

    What Is a Cryptographic Hash Function?

    A cryptographic hash function is an algorithm, i.e. a repeatable sequence of specific actions, that can be used to transform an arbitrary data string of a variable length into one of a fixed length and format, called the hash.

    One of the simplest examples of a hash function is adding up the digits in a number until one is left with a single-digit output. If the input is 49, for example, then adding 4 and 9 yields 13, whose digits 1 and 3 are then summed up again to give the output of 4. Regardless of the length of the input number, the output will always be a single digit.

    That is not a good algorithm, however, because, in order to perform its functions well, a hash function needs to possess several characteristics:

    • It should be easy to compute an output for any given input, but nearly impossible to reverse the process and calculate the input of a known output;
    • Determinism — feeding a specific input into the algorithm should always produce the same output;
    • Collision resistance — two different inputs should be very unlikely to produce the same output;
    • Avalanche effect — changing even a single bit of data in the input should result in a wildly different output.

    Hash functions are applied in many use cases, for example, as checksums to verify the integrity of computer files after their transmission of prolonged storage, or in randomizing functions.

    They are also a key component in the mining of proof-of-work cryptocurrencies, such as Bitcoin (BTC), which uses the SHA-256 hash function. In order to add a new block to the blockchain and claim their reward of newly-mined Bitcoin, miners first need to produce a hash value that is below a certain threshold, called the target.

    The fact that hashes are pseudorandom and it is impossible to predict an output of any input before actually running it through the hash function ensures that miners cannot print new Bitcoins out of thin air and need to prove the work they have performed.

    Back to Glossary Index Page

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Add A Comment
    Leave A Reply Cancel Reply

    Top News

    DePIN to reach $3.5T by 2028 on crypto, AI convergence: WEF

    June 4, 2025

    Blackrock’s Tokenized Money Market Fund BUIDL Tops $10M in May Dividends

    June 4, 2025

    GameStop, Strike Among Growing List of Firms Adding Bitcoin to Treasuries

    June 4, 2025
    Advertisement
    Demo
    Crypto Chain Post
    • Home
    • Privacy Policy
    • Terms of use
    • Advertise
    • Contact
    © 2025 Crypto Chain Post. All Rights Reserved.

    71-75 Shelton Street, Covent Garden, London United Kingdom, WC2H 9JQ

    Type above and press Enter to search. Press Esc to cancel.