Block Chain Hash Functions
Block Chain Hash Functions
3. BLAKE2
4. BLAKE3
5. Whirlpool
• RIPEMD-128
• RIPEMD-160
• RIPEMD-256
• RIPEMD-320
• Out of these RIPEMD-160 is the most common.
• The original RIPEMD-128 is based on the design principles used
in MD4.
• The RIPEMD-256 and 320 have fewer chances of the accidental
collision but do not have higher levels of security as compared to
RIPEMD-128 and RIPEMD-160.
• It is a sub-block of the RIPEMD-160 hash algorithm. The message
is processed by compression function in blocks of 512 bits and
passed through two streams of this sub-block by using 5 different
versions in which the value of constant ‘k’ is also different.
Message Digest is used to ensure the integrity of a message
transmitted over an insecure channel (where the content of the
message can be changed). The message is passed through a
Cryptographic hash function. This function creates a compressed
image of the message called Digest.
• This message and digest pair is equivalent to a physical document
and fingerprint of a person on that document. Unlike the physical
document and the fingerprint, the message and the digest can be
sent separately.
• Most importantly, the digest should be unchanged during the
transmission.
• The cryptographic hash function is a one way function, that is, a
function which is practically infeasible to invert. This
cryptographic hash function takes a message of variable length as
input and creates a digest / hash / fingerprint of fixed length,
which is used to verify the integrity of the message.
• Message digest ensures the integrity of the document. To provide
authenticity of the message, digest is encrypted with sender’s
private key. Now this digest is called digital signature, which can
be only decrypted by the receiver who has sender’s public key.
Now the receiver can authenticate the sender and also verify the
integrity of the sent message.
• This family comprises hash functions MD2, MD4, MD5, and
MD6.
• MD5 is the most widely used cryptographic hash function.
• It is used to generate a 128-bit digest from a 512-bit string broken
down into 16 words composed of 32 bits each.
• Ronald Rivest designed this algorithm in 1991 to use for digital signature
verification.
• These are no longer considered cryptographically secure methods and
should not be used for cryptographic authentication.
• Crypto currencies are digital currencies that work just like their
traditional counterparts: People use them to make purchases or to
receive funds from sales of goods or services.
4. Proof of Elapsed Time. The reward goes to the miner who has
spent the longest time verifying transactions.
Prepare the Nodes : Once you’ve selected a blockchain, the nodes
that work in the blockchain must be created.
Nodes are, usually, fast computers that connect to a blockchain
network to verify and process transactions. Nodes keep the currency
running while recording and sharing the data that eventually gets
added to the digital ledger.
There are four key considerations when setting up nodes: