Security’s Greatest Innovation: Cryptographic Hash Functions

  1. Hash the input. This is just putting the input into a function, like the SHA-256 hash function (also known as Bitcoin’s hash function).
  2. Generate a nonce. This is a completely random string, with no logic/thought process behind it.
  3. Concatenate the nonce with the hash.
  4. Hash the new string.

--

--

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store