Función Hash Criptográfica
Un algoritmo que convierte datos en una huella digital única de longitud fija.
In blockchain, hash functions link blocks together (the hash of the previous block is included in the current block), creating an immutable chain. They also protect passwords, verify file integrity, and enable digital signatures.
graph LR
Center["Función Hash Criptográfica"]:::main
Pre_cryptography["cryptography"]:::pre --> Center
click Pre_cryptography "/terms/cryptography"
Pre_computer_science["computer-science"]:::pre --> Center
click Pre_computer_science "/terms/computer-science"
Pre_algorithm["algorithm"]:::pre --> Center
click Pre_algorithm "/terms/algorithm"
Rel_bitcoin["bitcoin"]:::related -.-> Center
click Rel_bitcoin "/terms/bitcoin"
Rel_blockchain["blockchain"]:::related -.-> Center
click Rel_blockchain "/terms/blockchain"
Rel_proof_of_work["proof-of-work"]:::related -.-> Center
click Rel_proof_of_work "/terms/proof-of-work"
classDef main fill:#7c3aed,stroke:#8b5cf6,stroke-width:2px,color:white,font-weight:bold,rx:5,ry:5;
classDef pre fill:#0f172a,stroke:#3b82f6,color:#94a3b8,rx:5,ry:5;
classDef child fill:#0f172a,stroke:#10b981,color:#94a3b8,rx:5,ry:5;
classDef related fill:#0f172a,stroke:#8b5cf6,stroke-dasharray: 5 5,color:#94a3b8,rx:5,ry:5;
linkStyle default stroke:#4b5563,stroke-width:2px;
🧒 Explícalo como si tuviera 5 años
🕵️♂️ Imagina una máquina que escanea un libro y crea un código único. Si cambias una sola letra del libro, el código cambia totalmente. Sirve para probar que el libro es el original.
🤓 Expert Deep Dive
Cryptographic hash functions like SHA-256 and Keccak-256 are the workhorses of blockchain. They underpin Proof of Work (finding a hash below a target), Merkle Trees (efficient data verification), and Address Generation (deriving public keys). Security depends on Pre-image Resistance (difficult to find input from output) and Collision Resistance (difficult to find two inputs with same output). As quantum computing advances, older standards like MD5 and SHA-1 have been deprecated due to collision vulnerabilities, driving the move towards SHA-3 and quantum-safe algorithms.