SHA-256 hash function
🔐 Last time we figured out what is hash-function and why it serves as the basis for the whole blockchain operating principle.
♻️Due to the hash-function, when one block is changed, all the others need to be reconstructed by the brute-force method.
None of the existing computing powers would be able to accomplish such method,.
🔠В DecimalChain используется хэш-функция
SHA-256 hash function is being used in DecimalChain blockchain, and this very hash function is applied in the blockchain of Bitcoin.
SHA means “secure hashing algorithm”, and 256 number stands for the hash volume in bits.
SHA-256 hash function operation resembles the process of making fingerprints. In order to identify a person, you don’t have to collect all the information about him — all you need is his fingerprint.
SHA-256 identifies such “fingerprint” in texts, pictures, music and other information sources.
The algorithm may be described as follows:
1. A message — a file size of up to 2 million terabytes get to the entrance.
2. Mathematical calculations are being made.
3. At the output we get the hash — a 64-digit number.
❗️Note that I’m case of slight corrections to the message hash is changed so much that it has no resemblance with the previous one.
❕Due to this, SHA-256 has function guarantees the impossibility of changing a message as any changes affect the hash.
⛓ Blockchain wouldn’t survive without the hash function as the thing that makes blockchain unique is that it guarantees the immutability and anonymity of the data it stores due to encryption algorithms.
🔎 Any information is verified before entering to the blockchain but no one can see it.
🏦 The same happens when a banker verifies banknotes stored in a close safe
♻️When updating the transaction details, any system is prone to attacks. Banks reduce these risks with the help of centralized architecture and strict one-side control over the access rights of users.
🤝Blockchain doesn’t have a centralized control body — it is replaced by cryptographic hash-functions