Skip to main content

Hashing Data

Identifying data from their digital fingerprint

  • Chapter
  • First Online:
Blockchain Basics
  • 15k Accesses

Abstract

This step explains one of the most important base technologies of the blockchain: hash values. It discusses important properties of cryptographic hash functions and introduces patterns of applying hash functions to data.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Notes

  1. 1.

    Weisstein, Eric W. Hash function. From MathWorld: http://mathworld.wolfram.com/HashFunction.html.

  2. 2.

    Rogaway, Phillip, and Thomas Shrimpton. Cryptographic hash-function basics: definitions, implications, and separations for preimage resistance, second-preimage resistance, and collision resistance. In B. Roy and W. Meier (eds.), Fast software encryption. FSE 2004. Lecture Notes in Computer Science, vol. 3017. International Workshop on Fast Software Encryption. Berlin Heidelberg: Springer, 2004.

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Daniel Drescher

About this chapter

Cite this chapter

Drescher, D. (2017). Hashing Data. In: Blockchain Basics. Apress, Berkeley, CA. https://doi.org/10.1007/978-1-4842-2604-9_10

Download citation

Publish with us

Policies and ethics