πŸ” 5 Essential Features of a Secure Cryptographic Hash Function

Discover the five key requirements that make a cryptographic hash function secure and reliable in blockchain technology, all explained in just one minute!

πŸ” 5 Essential Features of a Secure Cryptographic Hash Function
The Blockchain Blog
90 views β€’ Jan 8, 2020
πŸ” 5 Essential Features of a Secure Cryptographic Hash Function

About this video

In this video of our #OneMinuteBlockchain series, we take a look at the five key requirements of a good cryptographic hash function.


Hash Cryptography is an essential pillar of blockchains. Every block in a blockchain is linked to the previous block with by storing the hash of the previous block in its block data.


Different blockchains use different cryptographic hash functions. For example, the Bitcoin Blockchain uses the SHA-256 cryptographic hash function and the Ethereum Blockchain uses the Ethash/keccak function.


Instagram: www.instagram.com/theblockchainblog
Telegram: t.me/theblockchainblog

Tags and Topics

Browse our collection to discover more content in these categories.

Video Information

Views

90

Likes

7

Duration

1:05

Published

Jan 8, 2020

Related Trending Topics

LIVE TRENDS

Related trending topics. Click any trend to explore more videos.