{"id":310,"date":"2022-07-08T12:00:00","date_gmt":"2022-07-08T12:00:00","guid":{"rendered":"http:\/\/netchunk.com\/en\/blog\/?p=310"},"modified":"2022-06-16T08:41:59","modified_gmt":"2022-06-16T08:41:59","slug":"what-is-hash-function","status":"publish","type":"post","link":"https:\/\/netchunk.com\/en\/blog\/blockchain\/what-is-hash-function\/","title":{"rendered":"What is Hash function?"},"content":{"rendered":"\n<figure class=\"wp-block-image is-resized\"><img fetchpriority=\"high\" decoding=\"async\" src=\"https:\/\/lh3.googleusercontent.com\/WfQGQ5TItIAVwTToHz6HkW7iXqdt4WyFKDZd3dMH4_pAIFIyHssJw8lxqd6KsFxklH4JGU9ww9hLdp2AIyuOYPRzyM8uZ067w3kGwQlf-X8DEtPigYUWQzIE97kCN94uv-fCbpLA\" alt=\"\" width=\"546\" height=\"363\" \/><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Hash function<\/strong><br><\/h3>\n\n\n\n<p>Put in simple words, the hash function is part of cryptocurrencies that make Bitcoin possible. A cryptographic hash function is used for Bitcoin mining. It is also known as \u201cKeccak\u201d and is a part of the Ethereum Proof of Work algorithm \u201cEthash\u201d.&nbsp;<br><\/p>\n\n\n\n<h3 class=\"wp-block-heading\">How it all started and how it works<br><\/h3>\n\n\n\n<p>Hash functions are used to secure communication through the internet. The hash function hacks up information and then puts it in a different form. The product that is represented by the hash function is called a \u201chash\u201d.\u00a0<br><\/p>\n\n\n\n<p>It works like that &#8211; the hash function checks whether the information, that you received from someone, is complete and if the order is correct.\u00a0<br><\/p>\n\n\n\n<figure class=\"wp-block-image is-resized\"><img decoding=\"async\" src=\"https:\/\/lh5.googleusercontent.com\/cW9ddjOD1wMU-S7dPfJmnTBmcwiEEdYtISyf0HgWhvU3SaDh8A1zIq8WvWEygAip52uO_j1VVB9nmOjSpPcu_qbeD4JkSU5bLRdIdJhSz2M0lKf_K3UGLEXRXHeE0SzSUwcihOat\" alt=\"\" width=\"505\" height=\"297\" \/><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Secure Hash<\/strong><br><\/h3>\n\n\n\n<p>The Secure Hash Algorithm or in other words \u201cSHA\u201d is one of the secure hash algorithms in the world. SHA-256 was developed as part of the SHA-2 algorithm by NSA in 2001.\u00a0<br><\/p>\n\n\n\n<p>SHA-2 algorithm of NSA has no back doors in the algorithm, that is because it is uncovered and anyone who would like could examine it. If there were a back door, it would be impossible that thousands of cryptographers did not notice them.&nbsp;<br><\/p>\n\n\n\n<p>A lot of people have critical glances at algorithms, but that is normal because crackers of codes have a high reputation because they test the security of algorithms to the limit.&nbsp;<br><\/p>\n\n\n\n<figure class=\"wp-block-image is-resized\"><img decoding=\"async\" src=\"https:\/\/lh5.googleusercontent.com\/EACCx1nCkflhjPInAQW7_8GDu6A2NJ-pVktocWorr7dwyPt-XLZiQZM9Itilkz_CZNI8fd5Pvi-Js0MNZP1uJkLV7MCHs2FEGjlzPtq1E_dyZbaG-SE7sMoKerjxGxpQS_yyumhu\" alt=\"\" width=\"554\" height=\"277\" \/><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>What does SHA-256 do?<\/strong><br><\/h3>\n\n\n\n<p>If you put any text file into SHA-256 you get an output of letters and numbers in a total of 64 digits. When you put the same text file in SHA-256 it will always end up the same, same numbers, same letters, and in the same sequence.\u00a0<br><\/p>\n\n\n\n<p>Even long files can be hashed. You can use the whole book to hash it, and it still will end up with 64 digits. It doesn\u2019t matter how long your chosen file is because SHA-256 will hash it into only 64 digits.&nbsp;<br><\/p>\n\n\n\n<p>Each file is structured differently and has a different sequence of zeros and ones unless they are real copies. You can use SHA to test if the file is a copy and give the file a unique hash value. The hash value is also called the \u201cfingerprint\u201d of a file.\u00a0<br><\/p>\n\n\n\n<p>No two files may produce the same hash value, in order for files to be unique. If some poets&#8217; work would be hashed, the same hash value must not be used. Identification would not be unique and the hash function would be unusable.\u00a0<br><\/p>\n\n\n\n<figure class=\"wp-block-image is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/lh3.googleusercontent.com\/uhTc70kO_yFEwfir1mQ6nR4THigXLeQYHmvCsOo1SRGIAKmMHvC9-ZmFhkQWs9zCfMmF6Bi041vZfjCs8IMxVcd38g99mhTAIVOXen9OiFs1VmtAkh7kSaJjafaj3fSifogIzRU0\" alt=\"\" width=\"509\" height=\"338\" \/><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Security<\/strong><br><\/h3>\n\n\n\n<p>If you enter three letters and get 64 digit hash number when you enter the same three letters, but this time you add one more, the hash value would not be even similar.&nbsp;<br><\/p>\n\n\n\n<p>When someone wants to check if their file has arrived completely, they need to compare the hash value of the sent file with the hash value of the original file.&nbsp;<br><\/p>\n\n\n\n<p>It is possible to calculate hash values from keys, but it is not possible to calculate keys from hash values. A good hash function, not to be able to deduce the origin or the \u201coriginal image\u201d from a hash value, is called \u201coriginal image resistance.\u201d&nbsp;<br><\/p>\n\n\n\n<p>It is impossible to try other keys to generate the same hash values. Passwords that are used on the internet are stored as hash values in databases, not in their original form. To gain access to the website, the site checks whether the hash value of the password entered matches the hash value in the database.&nbsp;<br><\/p>\n\n\n\n<p>The attacker could simply take the hash value from the database and will try to find the right key that generates the exact hash value. To do that attackers have to try two of 256 possible combinations, which is humanly impossible even with modern computers it would take a lifespan of our solar system.\u00a0<br><\/p>\n\n\n\n<p>The avalanche effect describes the property that the similarity between input values is no longer present at the output values. There are no conclusions that can be drawn about the original data and even top-secret hashes can be sent around safely.&nbsp;<br><\/p>\n\n\n\n<p>The Hash function is a very secure way how to protect your data from attackers. If it is impossible to find the right combination of hash values then it is a simply great creation to use for protecting a sensitive file or content that you don\u2019t want others to see.<br><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Hash function Put in simple words, the hash function is part of cryptocurrencies that make Bitcoin possible. A cryptographic hash function is used for Bitcoin mining. It is also known as \u201cKeccak\u201d and is a part of the Ethereum Proof of Work algorithm \u201cEthash\u201d.&nbsp; How it all started and how it works Hash functions are [&hellip;]<\/p>\n","protected":false},"author":7,"featured_media":408,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[5],"tags":[],"class_list":["post-310","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blockchain"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v21.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>What is Hash function? - NetChunk Blog<\/title>\n<meta name=\"description\" content=\"In this article, we will get to know all the necessary information about the hash function and everything concerned about it.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/netchunk.com\/en\/blog\/blockchain\/what-is-hash-function\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What is Hash function? - NetChunk Blog\" \/>\n<meta property=\"og:description\" content=\"In this article, we will get to know all the necessary information about the hash function and everything concerned about it.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/netchunk.com\/en\/blog\/blockchain\/what-is-hash-function\/\" \/>\n<meta property=\"og:site_name\" content=\"NetChunk Blog\" \/>\n<meta property=\"article:published_time\" content=\"2022-07-08T12:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-06-16T08:41:59+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/netchunk.com\/en\/blog\/wp-content\/uploads\/2019\/08\/iStock_57660856_SMALL.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"940\" \/>\n\t<meta property=\"og:image:height\" content=\"626\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Georges A\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Georges A\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/netchunk.com\/en\/blog\/blockchain\/what-is-hash-function\/\",\"url\":\"https:\/\/netchunk.com\/en\/blog\/blockchain\/what-is-hash-function\/\",\"name\":\"What is Hash function? - NetChunk Blog\",\"isPartOf\":{\"@id\":\"https:\/\/netchunk.com\/en\/blog\/#website\"},\"datePublished\":\"2022-07-08T12:00:00+00:00\",\"dateModified\":\"2022-06-16T08:41:59+00:00\",\"author\":{\"@id\":\"https:\/\/netchunk.com\/en\/blog\/#\/schema\/person\/3f5d9b8869f47d66c9f4cbbe05715e9d\"},\"description\":\"In this article, we will get to know all the necessary information about the hash function and everything concerned about it.\",\"breadcrumb\":{\"@id\":\"https:\/\/netchunk.com\/en\/blog\/blockchain\/what-is-hash-function\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/netchunk.com\/en\/blog\/blockchain\/what-is-hash-function\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/netchunk.com\/en\/blog\/blockchain\/what-is-hash-function\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/netchunk.com\/en\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What is Hash function?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/netchunk.com\/en\/blog\/#website\",\"url\":\"https:\/\/netchunk.com\/en\/blog\/\",\"name\":\"NetChunk Blog\",\"description\":\"Best quality content\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/netchunk.com\/en\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/netchunk.com\/en\/blog\/#\/schema\/person\/3f5d9b8869f47d66c9f4cbbe05715e9d\",\"name\":\"Georges A\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/netchunk.com\/en\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/989be782b1b496f571903f97a6395225f77fddf99e7a11c2f77078a66b73e787?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/989be782b1b496f571903f97a6395225f77fddf99e7a11c2f77078a66b73e787?s=96&d=mm&r=g\",\"caption\":\"Georges A\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What is Hash function? - NetChunk Blog","description":"In this article, we will get to know all the necessary information about the hash function and everything concerned about it.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/netchunk.com\/en\/blog\/blockchain\/what-is-hash-function\/","og_locale":"en_US","og_type":"article","og_title":"What is Hash function? - NetChunk Blog","og_description":"In this article, we will get to know all the necessary information about the hash function and everything concerned about it.","og_url":"https:\/\/netchunk.com\/en\/blog\/blockchain\/what-is-hash-function\/","og_site_name":"NetChunk Blog","article_published_time":"2022-07-08T12:00:00+00:00","article_modified_time":"2022-06-16T08:41:59+00:00","og_image":[{"width":940,"height":626,"url":"https:\/\/netchunk.com\/en\/blog\/wp-content\/uploads\/2019\/08\/iStock_57660856_SMALL.jpg","type":"image\/jpeg"}],"author":"Georges A","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Georges A","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/netchunk.com\/en\/blog\/blockchain\/what-is-hash-function\/","url":"https:\/\/netchunk.com\/en\/blog\/blockchain\/what-is-hash-function\/","name":"What is Hash function? - NetChunk Blog","isPartOf":{"@id":"https:\/\/netchunk.com\/en\/blog\/#website"},"datePublished":"2022-07-08T12:00:00+00:00","dateModified":"2022-06-16T08:41:59+00:00","author":{"@id":"https:\/\/netchunk.com\/en\/blog\/#\/schema\/person\/3f5d9b8869f47d66c9f4cbbe05715e9d"},"description":"In this article, we will get to know all the necessary information about the hash function and everything concerned about it.","breadcrumb":{"@id":"https:\/\/netchunk.com\/en\/blog\/blockchain\/what-is-hash-function\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/netchunk.com\/en\/blog\/blockchain\/what-is-hash-function\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/netchunk.com\/en\/blog\/blockchain\/what-is-hash-function\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/netchunk.com\/en\/blog\/"},{"@type":"ListItem","position":2,"name":"What is Hash function?"}]},{"@type":"WebSite","@id":"https:\/\/netchunk.com\/en\/blog\/#website","url":"https:\/\/netchunk.com\/en\/blog\/","name":"NetChunk Blog","description":"Best quality content","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/netchunk.com\/en\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/netchunk.com\/en\/blog\/#\/schema\/person\/3f5d9b8869f47d66c9f4cbbe05715e9d","name":"Georges A","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/netchunk.com\/en\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/989be782b1b496f571903f97a6395225f77fddf99e7a11c2f77078a66b73e787?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/989be782b1b496f571903f97a6395225f77fddf99e7a11c2f77078a66b73e787?s=96&d=mm&r=g","caption":"Georges A"}}]}},"_links":{"self":[{"href":"https:\/\/netchunk.com\/en\/blog\/wp-json\/wp\/v2\/posts\/310","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/netchunk.com\/en\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/netchunk.com\/en\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/netchunk.com\/en\/blog\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/netchunk.com\/en\/blog\/wp-json\/wp\/v2\/comments?post=310"}],"version-history":[{"count":6,"href":"https:\/\/netchunk.com\/en\/blog\/wp-json\/wp\/v2\/posts\/310\/revisions"}],"predecessor-version":[{"id":624,"href":"https:\/\/netchunk.com\/en\/blog\/wp-json\/wp\/v2\/posts\/310\/revisions\/624"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/netchunk.com\/en\/blog\/wp-json\/wp\/v2\/media\/408"}],"wp:attachment":[{"href":"https:\/\/netchunk.com\/en\/blog\/wp-json\/wp\/v2\/media?parent=310"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/netchunk.com\/en\/blog\/wp-json\/wp\/v2\/categories?post=310"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/netchunk.com\/en\/blog\/wp-json\/wp\/v2\/tags?post=310"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}