This story on HackerNoon has a decentralized backup on Sia.
Transaction ID: hJ6S-qJdDJFC5zc2616g_-yYz77MF26EacWrQM5OcSo
Cover

Introduction to Cryptographic Hash Functions

Written by @balapriya | Published on 2022/4/4

TL;DR
Cryptographic Hash Functions are a class of hash functions that are cryptographically secure. From password authentication and integrity verification to blockchain—these functions are used in a multitude of applications. In this tutorial, we'll start by reviewing the basics of blockchain, and the relevance of cryptographic hash functions in making a blockchain secure. We'll then go over what cryptographic hash functions are, and their properties. Additionally, we'll also see how to write code to obtain hashes, in both Python and Bash.

[story continues]


Written by
@balapriya
A developer and writer from India | Enjoys reading, writing, coding, and coffee ☕

Topics and
tags
decentralized-internet|quicknode|sha-256|blockchain-technology|cryptography|cryptographic-hash-function|blogging-fellowship|hackernoon-top-story
This story on HackerNoon has a decentralized backup on Sia.
Transaction ID: hJ6S-qJdDJFC5zc2616g_-yYz77MF26EacWrQM5OcSo