TL;DR —
Cryptographic Hash Functions are a class of hash functions that are cryptographically secure. From password authentication and integrity verification to blockchain—these functions are used in a multitude of applications.
In this tutorial, we'll start by reviewing the basics of blockchain, and the relevance of cryptographic hash functions in making a blockchain secure. We'll then go over what cryptographic hash functions are, and their properties.
Additionally, we'll also see how to write code to obtain hashes, in both Python and Bash.
[story continues]
Written by
@balapriya
A developer and writer from India | Enjoys reading, writing, coding, and coffee ☕
Topics and
tags
tags
decentralized-internet|quicknode|sha-256|blockchain-technology|cryptography|cryptographic-hash-function|blogging-fellowship|hackernoon-top-story
This story on HackerNoon has a decentralized backup on Sia.
Transaction ID: hJ6S-qJdDJFC5zc2616g_-yYz77MF26EacWrQM5OcSo
