1:02 A blockchain utilizes hash functions. What we pointed out previously, with our two-letter names, is a simplified model of the way this works. Hashing is what prevents blocks from disintegrating. It involves applying a mathematical algorithm to any amount of data to produce a result (called a “hash“) that is always the same length.
They ensure that the data stored on the network is accurate. Hash functions are mathematical algorithms that accept data as input and return a fixed-length string, or “hash,” which can be used to accurately identify the data.
This is important to blockchain technology because it ensures that any changes to the data are discovered in the quickest possible way. Without hash functions, Blockchain could not provide the protection and reliability for which it is renowned. Similar to our identifiers, if we trade even a small portion of our raw data, we will obtain a few distinct variables.
Let’s use SHA256 as an example, which is a common way to secure Bitcoin. As you can see, changing the capital letters is all that is required to ruin the result.
Input data | SHA256 output |
P4 Provider | 886c5fd21b403a139d24f2ea1554ff5c0df42d5f873a56d04dc480808c155af3 |
P4 Provider | 4733a0602ade574551bf6d977d94e091d571dc2fcfd8e39767d38301d2c459a7 |
P4 Provider | a780cd8a625deb767e999c6bec34bc86e883acc3cf8b7971138f5b25682ab181 |
When it comes to blockchains, the reality that there are no known SHA256 collisions (two different sources that give us the same result) is highly beneficial. If someone attempts to extradite an elder block, it will be immediately apparent.The only block earlier than it is imprinted on each block.
