<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/">
    <channel>
        <title>theCrypt</title>
        <link>https://paragraph.com/@xavierscript</link>
        <description>undefined</description>
        <lastBuildDate>Sun, 12 Apr 2026 08:34:54 GMT</lastBuildDate>
        <docs>https://validator.w3.org/feed/docs/rss2.html</docs>
        <generator>https://github.com/jpmonette/feed</generator>
        <language>en</language>
        <copyright>All rights reserved</copyright>
        <item>
            <title><![CDATA[Your Digital Fingerprint: How Blockchain Uses Hashing for Ultimate Security]]></title>
            <link>https://paragraph.com/@xavierscript/your-digital-fingerprint-how-blockchain-uses-hashing-for-ultimate-security</link>
            <guid>w6bgieP8hk9r5UbldBP4</guid>
            <pubDate>Fri, 03 Jan 2025 06:34:03 GMT</pubDate>
            <description><![CDATA[The Blockchain is a system that is widely known for its robust security. While much of this security is centered on its decentralized nature, other aspects, such as cryptographic techniques like hashing, cannot be overlooked. In this article, we'll be briefly looking at what hashing entails and how it works. I have also included a link for you to check out this computing concept yourself, so stay with me until the end. Also, you wouldn't want to miss a fun fact about hashing! What is hashing?...]]></description>
            <content:encoded><![CDATA[<p>The Blockchain is a system that is widely known for its robust security. While much of this security is centered on its decentralized nature, other aspects, such as cryptographic techniques like hashing, cannot be overlooked.</p><p>In this article, we'll be briefly looking at what hashing entails and how it works. I have also included a link for you to check out this computing concept yourself, so stay with me until the end. Also, you wouldn't want to miss a fun fact about hashing!</p><p><strong>What is hashing?</strong></p><p>Hashing is simply the process of taking input data, passing it through a mechanism called a hash function, and then getting an output known as a hash value.</p><p>In a distributed peer-to-peer system like the Blockchain, you'll be working with a lot of transaction data, and because of this, you'll need a way to uniquely identify that data.</p><p>Think of it like this—there are approximately 8 billion people in the world today, and no two people have the same fingerprint. Because of this, fingerprints are unique to each individual and can be used to identify them.</p><p>In a similar way, hash values can be thought of as digital fingerprints for data. Just as fingerprints are unique to a person, hash values are unique to specific data and can be used to identify it.</p><p><strong>How Hashing works</strong></p><p>Let's say we want to hash some form of input data, like the word "computer". Now, we send this word through a hash function, which is a special mathematical formula or process. This function takes the input and performs several calculations to transform it into a fixed-size output, often a string of numbers and letters called the hash value.</p><p>This hash value is a unique representation of the input, and even a small change in the input will result in a completely different hash.</p><p>There are different types of hash functions and the differences between them come from the length of the hash values each function produces. A type of hash function used in a blockchain system is a <em>cryptographic hash function</em>, which can create digital fingerprints for any kind of data.</p><p>But why cryptographic hash functions? what makes it unique? Let's look at some of its properties:</p><p><strong>Deterministic</strong> — This simply means that the same input always produces the same hash value. This makes sense, as every person in the world is uniquely mapped to a specific fingerprint. If there are any discrepancies in the hash value (output), they should be solely caused by discrepancies in the input data, not by the hash function.</p><p><strong>Collision-resistant</strong> — No two persons have the same fingerprint and so, a cryptographic hash function minimizes the chances of two different inputs producing the same hash value.</p><p><strong>Pseudorandom</strong> — Being Pseudorandom means that even a small change in the input leads to an unpredictable, completely different hash value. In other words, the resulting hash value should always be surprising and impossible to predict.</p><p><strong>One way function</strong> — Using our fingerprint analogy once again, you can’t trace it back to the person who made it by simply looking at it. Similarly, a one-way function means you can’t reverse the hash value to find the original input data—it basically reveals nothing about the input.</p><p><strong>Fast Computation</strong> — A hash function works quickly and can handle all kinds of data without errors. This ensures it delivers results efficiently without wasting time or producing useless outputs.</p><p><strong>Testing it out yourself</strong></p><p>Alright! It's time to see all of this in action.</p><p>Head over to <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://www.browserling.com/tools/all-hashes">browserling</a>, where you will see a hash generator that takes in an input and provides hash values based on different algorithms. Notice how even a small change, like capitalizing a single letter, completely alters the resulting hash value.</p><p><strong>Conclusion</strong></p><p>So there you have it guys! Hashing isn’t just a techy term; it’s a crucial concept for ensuring the security of data, especially in systems like the Blockchain. Just like a fingerprint uniquely identifies a person, a hash value uniquely identifies data.</p><p>Now, for that fun fact I promised you — Did you know that your passwords for online accounts are typically stored as hashes? This ensures that they can’t be viewed even if the database is hacked. When you log in, the system hashes your password and compares it to the stored hash. If they match, you gain access!</p><p>While we've covered the basics here, there's a lot more to explore. If you're curious to dive deeper into hashing and its applications, feel free to consult other resources for a more in-depth understanding. Stay curious and keep learning!</p><p></p>]]></content:encoded>
            <author>xavierscript@newsletter.paragraph.com (theCrypt)</author>
        </item>
    </channel>
</rss>