What Is a Hash?

8 minutes
Share the link to this page
Copied
  Completed
You need to have access to the item to view this lesson.
One-time Fee
$99.99
List Price:  $139.99
You save:  $40
€92.74
List Price:  €129.84
You save:  €37.10
£79.77
List Price:  £111.69
You save:  £31.91
CA$136.76
List Price:  CA$191.47
You save:  CA$54.71
A$151.27
List Price:  A$211.78
You save:  A$60.51
S$135.35
List Price:  S$189.49
You save:  S$54.14
HK$781.10
List Price:  HK$1,093.57
You save:  HK$312.47
CHF 90.67
List Price:  CHF 126.95
You save:  CHF 36.27
NOK kr1,084.13
List Price:  NOK kr1,517.83
You save:  NOK kr433.69
DKK kr691.91
List Price:  DKK kr968.71
You save:  DKK kr276.79
NZ$166.35
List Price:  NZ$232.89
You save:  NZ$66.54
د.إ367.25
List Price:  د.إ514.17
You save:  د.إ146.91
৳11,703.53
List Price:  ৳16,385.41
You save:  ৳4,681.88
₹8,350.71
List Price:  ₹11,691.33
You save:  ₹3,340.61
RM473.15
List Price:  RM662.43
You save:  RM189.28
₦145,270.47
List Price:  ₦203,384.47
You save:  ₦58,114
₨27,813.52
List Price:  ₨38,940.04
You save:  ₨11,126.52
฿3,678.63
List Price:  ฿5,150.23
You save:  ฿1,471.60
₺3,220.61
List Price:  ₺4,508.98
You save:  ₺1,288.37
B$515.53
List Price:  B$721.77
You save:  B$206.23
R1,837.17
List Price:  R2,572.12
You save:  R734.94
Лв181.36
List Price:  Лв253.91
You save:  Лв72.55
₩136,766.67
List Price:  ₩191,478.81
You save:  ₩54,712.13
₪373.34
List Price:  ₪522.70
You save:  ₪149.35
₱5,782.52
List Price:  ₱8,095.76
You save:  ₱2,313.24
¥15,586.34
List Price:  ¥21,821.50
You save:  ¥6,235.16
MX$1,673.70
List Price:  MX$2,343.24
You save:  MX$669.54
QR365.03
List Price:  QR511.06
You save:  QR146.03
P1,359.12
List Price:  P1,902.82
You save:  P543.70
KSh13,098.69
List Price:  KSh18,338.69
You save:  KSh5,240
E£4,704.33
List Price:  E£6,586.26
You save:  E£1,881.92
ብር5,743.75
List Price:  ብር8,041.48
You save:  ብር2,297.73
Kz83,397.65
List Price:  Kz116,760.05
You save:  Kz33,362.40
CLP$92,625.73
List Price:  CLP$129,679.73
You save:  CLP$37,054
CN¥723.39
List Price:  CN¥1,012.78
You save:  CN¥289.38
RD$5,820.67
List Price:  RD$8,149.18
You save:  RD$2,328.50
DA13,427.73
List Price:  DA18,799.36
You save:  DA5,371.63
FJ$227.04
List Price:  FJ$317.87
You save:  FJ$90.82
Q777.21
List Price:  Q1,088.13
You save:  Q310.91
GY$20,928.27
List Price:  GY$29,300.41
You save:  GY$8,372.14
ISK kr13,938.60
List Price:  ISK kr19,514.60
You save:  ISK kr5,576
DH1,002.76
List Price:  DH1,403.91
You save:  DH401.14
L1,775.52
List Price:  L2,485.81
You save:  L710.28
ден5,709.54
List Price:  ден7,993.58
You save:  ден2,284.04
MOP$805.07
List Price:  MOP$1,127.13
You save:  MOP$322.06
N$1,839.87
List Price:  N$2,575.89
You save:  N$736.02
C$3,682.46
List Price:  C$5,155.60
You save:  C$1,473.13
रु13,364.54
List Price:  रु18,710.89
You save:  रु5,346.35
S/369.18
List Price:  S/516.87
You save:  S/147.68
K388.19
List Price:  K543.49
You save:  K155.29
SAR375.02
List Price:  SAR525.04
You save:  SAR150.02
ZK2,738.27
List Price:  ZK3,833.70
You save:  ZK1,095.42
L461.50
List Price:  L646.12
You save:  L184.62
Kč2,300.33
List Price:  Kč3,220.56
You save:  Kč920.22
Ft35,879.15
List Price:  Ft50,232.25
You save:  Ft14,353.09
SEK kr1,086.05
List Price:  SEK kr1,520.51
You save:  SEK kr434.46
ARS$88,290.35
List Price:  ARS$123,610.02
You save:  ARS$35,319.67
Bs691.20
List Price:  Bs967.71
You save:  Bs276.50
COP$388,864.37
List Price:  COP$544,425.68
You save:  COP$155,561.30
₡51,265.04
List Price:  ₡71,773.10
You save:  ₡20,508.06
L2,472.30
List Price:  L3,461.32
You save:  L989.02
₲749,772.03
List Price:  ₲1,049,710.83
You save:  ₲299,938.80
$U3,850.11
List Price:  $U5,390.30
You save:  $U1,540.19
zł397.28
List Price:  zł556.21
You save:  zł158.93
Already have an account? Log In

Transcript

Hello, and welcome to this lesson on what is a hash? We mentioned hashing algorithms before and they are a fundamental part of blockchain and cryptography in general. But why is the hash a hash is essentially a one way function where its aim is to take some data as input. So imagine this is data. And what it does is it I put something totally different that does not resemble its original form. And it is not reversible.

It is not reversible. So, if you have this output, you can't just get that and reverse reverse it into its original form, or digital content, web That is sort of image, or a video file, or even a text document is literally just ones and zeros and a hash function. A hash function, there are plenty of them out there, we'll cover some of them in a moment. A hash function takes any digital content, literally anything on your computer, any file anything, is a piece of digital content and produces a unique or I shouldn't exactly say unique, it's unique enough and I again, I explain what that means in a moment as well. hash value that can be used to determine almost at the validity of that file on the original source. And it's always going to be the same for that particular file.

A very, very common format for hashes is hex decimal, it could be something else, it doesn't have to be EXA decimal, but that is a very, very common format. any modifications done to that file, so imagine if we have a bunch of strings. Right, so more. So we have this text file that has these numbers in there essentially strings. If this produces one result, if we were to go and change just one of these values, so let's just change this to a free the output will now be totally different. It will be totally different.

So any small or large modification will result in a hash value that is absolutely different and that's one of the core parts of hashing algorithms, most of the time the output is significantly smaller than the input file. And the algorithm is designed to ensure the input data cannot be retrieved or calculated like I said, from the output data, hence the term one way function and to wrap up hashing algorithms have free main requirements. And the free requirements are it needs to be reasonably fast to generate the hash rate morphing in reasonably fast wouldn't Faster, the better be great. And no, because if it's too quick, it's concerned for security reason, because when people and computers are trying to hack information that have been hashed using one way system, one of the things they will do is actually use the original hashing algorithm and just put a whole bunch of information and just random text random files through the algorithm.

And if it's too fast, they will easily be able to get to what that original hash is, and there'll be a compare and say, Okay, this was the fall so nice to be reasonably fast, but not too fast. And another main thing, if you change one bit, the entire hash must change. So even one bit change should result and an entire lead different different hash value. And finally, it must be unique enough to prevent hash collision so must be unique enough to prevent hash collisions Because ultimately, if you have let's say a hashing algorithm which has a length of 128 bits, there are only so many different unique values that this hashing algorithm can pump out. And with the tremendous amount of other documents alone that are out there, there's bound to be some hash collisions. But as long as the hash collisions can be prevented from actually occurring with, let's say, people and individuals that are most likely to have data that are common, and they're going to be sort of compared with each other, it's okay.

So the last thing I'm going to cover is the hashing algorithms that are out there. Some of them there's one called MD five. This is no longer used for a long time. This was used for passwords. This is so easy to crack now. If you were to get a MD five value printer Google and just do a search, Google will most likely to give you the result.

There's just so many websites out there that have a catalogue of most of the results of envy five is this terrible after that Sha one was developed that was very secure. That's it looking like it's probably cracked. Now, there's a number one called Sha two. And a new standard has been designed for often you get the name Shaw free. And that was just published in 2015. And what you're seeing a lot of time is hashing algorithm like Sha 256 show 128.

And this is essentially the number of bits that the actual algorithm pumps out. So the higher the number of bits, the more uniqueness that it can take. But on the flip side, the more complexity in terms of the pros. Simple computers are getting faster so we can handle more complex hashing algorithms. So that's it for hashing algorithms. If you have any questions, feel free to ask them to me, and I look forward to seeing you in the next video.

Sign Up

Share

Share with friends, get 20% off
Invite your friends to LearnDesk learning marketplace. For each purchase they make, you get 20% off (upto $10) on your next purchase.