HASHING
PRACTICAL USE IN BLOCKCHAIN
DETERMINISTIC, PSEUDORANDOM, or COLLISION RESISTANCES
HOW THEY WORK
CRYPTOGRAPHY & IMMUTABILITY
100

This unique form of a hash function has properties that make it ideal for the security needs of a blockchain.

CRYPTOGRAPHIC HASHING

100

Calling and executing the function needs to be lightening fast or it will slow the entire platform down to an inefficient level

Quick & Easy

100

What is it called when two different inputs produce the same output.

hash collision

100

Cryptographic hash functions combine the capability of normal hash functions to take variable length input and convert it to__________. 

fixed length

100

What does it mean to be deterministic?

That a hash function produces identical outputs for identical inputs 



200

A hash function that returns a unique hash number is called a

universal hash function

200

The same input will always produce the same output

Deterministic

200

When the hash function yields identical hash values for identical input data, regardless of any factor such as how much time has passed.

DETERMINISTIC

200

Cryptographic hash functions combine the capability of normal hash functions to take variable length input and convert it to fixed length along with additional

security properties

200

What is the importance of a hash function being pseudorandom?

  Making it unpredictable makes it more secure

300

A hash function that generates very different hash values for similar strings.

GOOD HASH FUNCTIONS

300

Small changes in input

Large changes in the hash

300

The digital equivalent to having two people with identical fingerprints

COLLISION RESISTANCES

300

Cryptographic hash values can have leading zeros in order to meet the requirement for a fixed-length out, e.g. 32 characters.This attribute is often used in areas such as determining the difficulty (i.e. puzzle) that needs to be solved when ________ a Bitcoin.

mining

300

What demands are made by blockchain’s need to distribute its data to a large number of peer nodes?

It demands a trustless environment 



400

__________is the process of taking an input string of any length and producing an output string of a fixed length using a mathematical function. 

Hashing

400

Infeasible to determine input from output

One-way function

400

The hash value returned by a hash function changes unpredictably when the input data are changed.

PSEUDORANDOM

400

How is a cryptographic hash value like a fingerprint?

 It is unique

400

The resulting ___________ is what allows blockchain to operate in a trustless environment and to not be concerned about the trustworthiness or number of peer nodes in the system.

immutability

500

How does the length of the cryptographic hash value change with respect to the length of the input string?

  Inputs of any length are output to a fixed length

500

No two different inputs would produce the same hash output


Collision Resistant

500

It should not be possible to predict the hash value based on the input data.

PSEUDORANDOM

500

What is the difference between infeasible and impossible?

Infeasible means highly unlikely but not impossible

 

500

The ____________ applied by blockchain and the immutability of the data store go hand in hand.

cryptography

M
e
n
u