Kryptographische Hashfunktion
Ein Algorithmus, der Daten in einen eindeutigen digitalen Fingerabdruck fester Länge umwandelt.
In blockchain, hash functions link blocks together (the hash of the previous block is included in the current block), creating an immutable chain. They also protect passwords, verify file integrity, and enable digital signatures.
graph LR
Center["Kryptographische Hashfunktion"]:::main
Pre_cryptography["cryptography"]:::pre --> Center
click Pre_cryptography "/terms/cryptography"
Pre_computer_science["computer-science"]:::pre --> Center
click Pre_computer_science "/terms/computer-science"
Pre_algorithm["algorithm"]:::pre --> Center
click Pre_algorithm "/terms/algorithm"
Rel_bitcoin["bitcoin"]:::related -.-> Center
click Rel_bitcoin "/terms/bitcoin"
Rel_blockchain["blockchain"]:::related -.-> Center
click Rel_blockchain "/terms/blockchain"
Rel_proof_of_work["proof-of-work"]:::related -.-> Center
click Rel_proof_of_work "/terms/proof-of-work"
classDef main fill:#7c3aed,stroke:#8b5cf6,stroke-width:2px,color:white,font-weight:bold,rx:5,ry:5;
classDef pre fill:#0f172a,stroke:#3b82f6,color:#94a3b8,rx:5,ry:5;
classDef child fill:#0f172a,stroke:#10b981,color:#94a3b8,rx:5,ry:5;
classDef related fill:#0f172a,stroke:#8b5cf6,stroke-dasharray: 5 5,color:#94a3b8,rx:5,ry:5;
linkStyle default stroke:#4b5563,stroke-width:2px;
🧒 Erkläre es wie einem 5-Jährigen
🕵️♂️ Stell dir eine Maschine vor, die aus jedem Buch einen eindeutigen Barcode macht. Wenn du auch nur ein Wort im Buch änderst, bekommst du einen völlig anderen Barcode. Man kann das Buch nicht aus dem Barcode zurückgewinnen, aber man kann beweisen, dass das Buch original ist.
🤓 Expert Deep Dive
Cryptographic hash functions like SHA-256 and Keccak-256 are the workhorses of blockchain. They underpin Proof of Work (finding a hash below a target), Merkle Trees (efficient data verification), and Address Generation (deriving public keys). Security depends on Pre-image Resistance (difficult to find input from output) and Collision Resistance (difficult to find two inputs with same output). As quantum computing advances, older standards like MD5 and SHA-1 have been deprecated due to collision vulnerabilities, driving the move towards SHA-3 and quantum-safe algorithms.