By Matt Hussey
5 min read
One of the main pillars of cryptocurrencies the world over is that they are trustless systems. What does that mean? It means you don't have to rely on a third party, like a bank, or government, to prove who you or someone else is. How does it do that?
A hash function, a clever bit of cryptography that allows people to be identified, without, well, being identified. We explore this more below.
A hash function is a technique whereby any piece of data is converted into a long jumble of letters and numbers in order to conceal the original piece of data. A hash function is special because it will always produce the same jumble of letters for a set piece of data, but if you change any tiny thing in the original source, the jumble will be completely different.
This means hash functions can be used to determine who owns a piece of data without them revealing what the data is. Clever, huh? Think of it as a digital key.
Hashing turns a piece of data into binary code, essentially a bunch of 0s and 1s. Once it's done that, it breaks up the numbers into sections and applies the secret jumbling, also known as a computation function. The end result is typically a 64-digit string of numbers and letters. This 64-digit string is then used in a whole bunch of different ways, which we explore below.
But before that, the 64 digit string is almost impossible to hack. Because the conversion is done by an algorithm, the formula it uses isn't known. To try and hack that would be like trying to navigate a path through a kaleidoscope. However, for pieces of software to read the hash function and check whether it has come from the right place, it's almost instant.
Nothing in computing is unhackable but hashing helps make things fiendishly difficult. Right now, with current computing power, it would take millions of years to hack a hash function. But in future, things like quantum computing could shorten the time it would take significantly. But blockchain builders are aware of what lies on the horizon and are actively building quantum resistant algorithms. But for now, hashing, as it exists today, is here to stay.
Decrypt-a-cookie
This website or its third-party tools use cookies. Cookie policy By clicking the accept button, you agree to the use of cookies.