π 5 Essential Features of a Secure Cryptographic Hash Function
Discover the five key requirements that make a cryptographic hash function secure and reliable in blockchain technology, all explained in just one minute!

The Blockchain Blog
90 views β’ Jan 8, 2020

About this video
In this video of our #OneMinuteBlockchain series, we take a look at the five key requirements of a good cryptographic hash function.
Hash Cryptography is an essential pillar of blockchains. Every block in a blockchain is linked to the previous block with by storing the hash of the previous block in its block data.
Different blockchains use different cryptographic hash functions. For example, the Bitcoin Blockchain uses the SHA-256 cryptographic hash function and the Ethereum Blockchain uses the Ethash/keccak function.
Instagram: www.instagram.com/theblockchainblog
Telegram: t.me/theblockchainblog
Hash Cryptography is an essential pillar of blockchains. Every block in a blockchain is linked to the previous block with by storing the hash of the previous block in its block data.
Different blockchains use different cryptographic hash functions. For example, the Bitcoin Blockchain uses the SHA-256 cryptographic hash function and the Ethereum Blockchain uses the Ethash/keccak function.
Instagram: www.instagram.com/theblockchainblog
Telegram: t.me/theblockchainblog
Tags and Topics
Browse our collection to discover more content in these categories.
Video Information
Views
90
Likes
7
Duration
1:05
Published
Jan 8, 2020