Kriptografik Özet Fonksiyonu (Hash)
Veriyi sabit uzunlukta benzersiz bir karakter dizisine dönüştüren algoritma.
In blockchain, hash functions link blocks together (the hash of the previous block is included in the current block), creating an immutable chain. They also protect passwords, verify file integrity, and enable digital signatures.
graph LR
Center["Kriptografik Özet Fonksiyonu (Hash)"]:::main
Pre_cryptography["cryptography"]:::pre --> Center
click Pre_cryptography "/terms/cryptography"
Pre_computer_science["computer-science"]:::pre --> Center
click Pre_computer_science "/terms/computer-science"
Pre_algorithm["algorithm"]:::pre --> Center
click Pre_algorithm "/terms/algorithm"
Rel_bitcoin["bitcoin"]:::related -.-> Center
click Rel_bitcoin "/terms/bitcoin"
Rel_blockchain["blockchain"]:::related -.-> Center
click Rel_blockchain "/terms/blockchain"
Rel_proof_of_work["proof-of-work"]:::related -.-> Center
click Rel_proof_of_work "/terms/proof-of-work"
classDef main fill:#7c3aed,stroke:#8b5cf6,stroke-width:2px,color:white,font-weight:bold,rx:5,ry:5;
classDef pre fill:#0f172a,stroke:#3b82f6,color:#94a3b8,rx:5,ry:5;
classDef child fill:#0f172a,stroke:#10b981,color:#94a3b8,rx:5,ry:5;
classDef related fill:#0f172a,stroke:#8b5cf6,stroke-dasharray: 5 5,color:#94a3b8,rx:5,ry:5;
linkStyle default stroke:#4b5563,stroke-width:2px;
🧒 5 yaşındaki gibi açıkla
Herhangi bir kitabı veya dosyayı benzersiz, kısa bir kimliğe dönüştüren bir makine gibidir. Kitaptaki tek bir harf bile değişse, kimlik tamamen farklı olur.
🤓 Expert Deep Dive
Cryptographic hash functions like SHA-256 and Keccak-256 are the workhorses of blockchain. They underpin Proof of Work (finding a hash below a target), Merkle Trees (efficient data verification), and Address Generation (deriving public keys). Security depends on Pre-image Resistance (difficult to find input from output) and Collision Resistance (difficult to find two inputs with same output). As quantum computing advances, older standards like MD5 and SHA-1 have been deprecated due to collision vulnerabilities, driving the move towards SHA-3 and quantum-safe algorithms.