fbpx

The Blog

Distributive Data & The Secure Hash Algorithm

Share on linkedin
LinkedIn
Share on twitter
Twitter
Share on facebook
Facebook

Share this post.

In this blog post, Sollensys Corp describes the Secure Hash Algorithm - the technology used to index and verify the integrity of Distributive Data.

The Integrity of Distributive Data

In our last article, we discussed how Blockchain drives Distributive Data by recording and encrypting data using Public Key Cryptography across a vast network of computers.  Now, let’s take a deep dive into the technology that binds the chain by creating digital fingerprints to index and verify the data – the Secure Hash Algorithm.

The Secure Hash Algorithm is the other major technology underlying Blockchain. One of the most popular forms of this technology is the 256-bit Secure Hash Algorithm (SHA-256).  Although not technically encryption, the Secure Hash Algorithm is a one-way mathematical operation that takes data of any length and converts it into a 64-character code called a hash.

Hashing is a very useful tool when you want to verify that you possess a piece of information without showing or storing the information in its raw format. This is actually how most websites store your password— they don’t. Rather, they store the 64-character hash of your password matched to your username from when you signed up.  When you log-in, whatever you type in the password field is hashed and checked against that record. Hashing is much more secure since raw password data isn’t stored, just 64 characters of mush.

What is the Secure Hash Algorithm

Sollensys_Chart_Hash-Algorithm

Since even the slightest change in the input will lead to a totally different hash, these algorithms are used as a means to create digital fingerprints in order to verify authenticity, ensure data haven’t been corrupted, and as a means to index and address.

Blockchain Technology Summary

Public-key cryptography converts data along with an attached public key into random looking numbers that can only be decrypted with the paired private key.

Hashing algorithms convert any amount of data into a unique 64-character mush pile and is used for creating digital fingerprints for verifying and addressing.

Don’t miss the next edition of Think With Sollensys when we put it all together to explain the Distributive Data Ledger.

JOIN THE DISTRIBUTIVE DATA REVOLUTION

Cybersecurity is a growing threat ☠️ & Ransomware Attacks are impacting businesses worldwide… Learn how the Sollensys Blockchain Archive Server™ (BAS) eliminates ransomware disruptions and improves business continuity.

About Sollensys:

Sollensys Corp™ is a Distributive Data company, specializing in Blockchain solutions that help organizations recover quickly from Ransomware attacks.

Talk to a Specialist

We're ready to help.

Sollensys_Website-Logo

© Copyright 2020 – Sollensys Corp.