Swipe to navigate through the chapters of this book
Step 10 introduced cryptographic hash functions and discussed different patterns of applying hash functions to data. Step 10 may have appeared to be a dry intellectual exercise, but it is actually of highly practical relevance. Hence, this step focuses on the application of hash functions and hash values in the real world. It considers major use cases of hash functions in real life and explains the idea behind them. This step also sketches why these use cases work out as intended. Finally, this step points out where the blockchain uses hash values.
Please log in to get access to this content
To get access to this content you need the following product:
Tsudik, Gene. Message authentication with one-way hash functions. ACM SIGCOMM Computer Communication Review 22.5 (1992): 29–38.
Cormen, Thomas H. Introduction to algorithms (3rd ed.). Cambridge: MIT Press, 2009.
Merkle, Ralph C. Protocols for Public Key Cryptosystems. IEEE Symposium on Security and Privacy 122 (1980).
Back, Adam. Hashcash—a denial of service counter-measure. 2002. http://www.hashcash.org/papers/hashcash.pdf .
- Hashing in the Real World
- Sequence number
- Chapter number
- Step 11