Cryptographic Hash 101

A cryptographic hash function is a hash function that satisfies the properties of pre-image resistance, second pre-image resistance and collision resistance. Here, a hash function is a mathematical algorithm that maps data of an arbitrary size (or “message”) to a bit array of a fixed size (the “hash value”, “hash”, or “message digest”), that is, a function that takes a string of any size as input and produces a fixed length value.

Pre-image resistance
Given a hash value h, it should be difficult to find any message m such that

h = hash(m)

Second pre-image resistance (weak collision resistance)
Given an input m1, it should be difficult to find a different input m2 such that

hash(m1) = hash(m2)

Collision resistance (strong collision resistance)
It should be difficult to find two different messages m1 and m2 such that

hash(m1) = hash(m2)

A pair of messages that has the same hash value is called a cryptographic hash collision.

Similar Posts

  • WebDAV 101

    WebDAV (Web Distributed Authoring and Versioning) is an extension of the HTTP/1.1 protocol, which enables users to create, modify, and delete files on remote web servers. This protocol provides a standardized way for users to collaboratively edit and manage files on the web, much like a remote file system. WebDAV Features WebDAV introduces several features…

  • 51% Attack 101

    One of the most significant threats to public blockchain networks is a 51% attack, where a single entity gains control over the majority of the network’s mining power. In this blog post, we will discuss the concept of a 51% attack, its potential consequences, and measures to prevent it. What is a 51% Attack? A…

  • Blockchain 101

    What is blockchain? Blockchain is a specific type of database with special data organization and properties. Blockchains store data in blocks that are then cryptographically chained together in the chronological order one by one, with the block chained onto the previous block. Data commonly stored in blockchains are transactions for Distributed Ledgers. The transactions are…

  • Sybil Attack 101

    Distributed systems, such as peer-to-peer networks, , and other decentralized platforms, have become increasingly popular due to their potential to offer more robust, scalable, and secure solutions. However, these systems face unique challenges and vulnerabilities, one of which is the Sybil attack. Named after the psychiatric case study “Sybil,” in which a person exhibits multiple…

  • NFT 101

    What is NFT? Non-Fungible Token (NFT) is a kind of blockchains. What distinguishes NFTs from fungible , and ownership of the NFT is often associated with a license to use the underlying asset. There are standards or convensions for NFTs on blockchain. For example, ERC-721 is a standard for representing non-fungible digital assets on the…

  • Decentralization 101

    Decentralization is a concept about control and management. It refers to that the control and decision-making in a distributed network are transferred away from a centralized entity (individual, organization, or group thereof). The resources in a decentralized network are owned and shared by network members. This concept is particularly significant in the world of blockchain…

Leave a Reply

Your email address will not be published. Required fields are marked *