Abstract
Step 10 introduced cryptographic hash functions and discussed different patterns of applying hash functions to data. Step 10 may have appeared to be a dry intellectual exercise, but it is actually of highly practical relevance. Hence, this step focuses on the application of hash functions and hash values in the real world. It considers major use cases of hash functions in real life and explains the idea behind them. This step also sketches why these use cases work out as intended. Finally, this step points out where the blockchain uses hash values.
This is a preview of subscription content, log in via an institution.
Notes
- 1.
Tsudik, Gene. Message authentication with one-way hash functions. ACM SIGCOMM Computer Communication Review 22.5 (1992): 29–38.
- 2.
Cormen, Thomas H. Introduction to algorithms (3rd ed.). Cambridge: MIT Press, 2009.
- 3.
Merkle, Ralph C. Protocols for Public Key Cryptosystems. IEEE Symposium on Security and Privacy 122 (1980).
- 4.
Back, Adam. Hashcash—a denial of service counter-measure. 2002. http://www.hashcash.org/papers/hashcash.pdf.
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2017 Daniel Drescher
About this chapter
Cite this chapter
Drescher, D. (2017). Hashing in the Real World. In: Blockchain Basics. Apress, Berkeley, CA. https://doi.org/10.1007/978-1-4842-2604-9_11
Download citation
DOI: https://doi.org/10.1007/978-1-4842-2604-9_11
Published:
Publisher Name: Apress, Berkeley, CA
Print ISBN: 978-1-4842-2603-2
Online ISBN: 978-1-4842-2604-9
eBook Packages: Professional and Applied ComputingApress Access BooksProfessional and Applied Computing (R0)