This unique form of a hash function has properties that make it ideal for the security needs of a blockchain.
CRYPTOGRAPHIC HASHING
Calling and executing the function needs to be lightening fast or it will slow the entire platform down to an inefficient level
Quick & Easy
What is it called when two different inputs produce the same output.
hash collision
Cryptographic hash functions combine the capability of normal hash functions to take variable length input and convert it to__________.
fixed length
What does it mean to be deterministic?
That a hash function produces identical outputs for identical inputs
A hash function that returns a unique hash number is called a
universal hash function
The same input will always produce the same output
Deterministic
When the hash function yields identical hash values for identical input data, regardless of any factor such as how much time has passed.
DETERMINISTIC
Cryptographic hash functions combine the capability of normal hash functions to take variable length input and convert it to fixed length along with additional
security properties
What is the importance of a hash function being pseudorandom?
Making it unpredictable makes it more secure
A hash function that generates very different hash values for similar strings.
GOOD HASH FUNCTIONS
Small changes in input
Large changes in the hash
The digital equivalent to having two people with identical fingerprints
COLLISION RESISTANCES
Cryptographic hash values can have leading zeros in order to meet the requirement for a fixed-length out, e.g. 32 characters.This attribute is often used in areas such as determining the difficulty (i.e. puzzle) that needs to be solved when ________ a Bitcoin.
mining
What demands are made by blockchain’s need to distribute its data to a large number of peer nodes?
It demands a trustless environment
__________is the process of taking an input string of any length and producing an output string of a fixed length using a mathematical function.
Hashing
Infeasible to determine input from output
One-way function
The hash value returned by a hash function changes unpredictably when the input data are changed.
PSEUDORANDOM
How is a cryptographic hash value like a fingerprint?
It is unique
The resulting ___________ is what allows blockchain to operate in a trustless environment and to not be concerned about the trustworthiness or number of peer nodes in the system.
immutability
How does the length of the cryptographic hash value change with respect to the length of the input string?
Inputs of any length are output to a fixed length
No two different inputs would produce the same hash output
Collision Resistant
It should not be possible to predict the hash value based on the input data.
PSEUDORANDOM
What is the difference between infeasible and impossible?
Infeasible means highly unlikely but not impossible
The ____________ applied by blockchain and the immutability of the data store go hand in hand.
cryptography