category-banner

Hash Functions In Blockchain Technology Training Ppt

Rating:
90%

You must be logged in to download this presentation.

Favourites
Loading...

PowerPoint presentation slides

Presenting Hash Functions in Blockchain Technology. These slides are 100 percent made in PowerPoint and are compatible with all screen types and monitors. They also support Google Slides. Premium Customer Support is available. Suitable for use by managers, employees, and organizations. These slides are easily customizable. You can edit the color, text, icon, and font size to suit your requirements.

People who downloaded this PowerPoint presentation also viewed the following :

Content of this Powerpoint Presentation

Slide 1

This slide provides information regarding the concept of hashing in blockchain technology. It also includes details regarding the hash value and an example to illustrate it.

Slide 2

The purpose of this slide is to highlight the multiple properties of cryptographic hash functions ,which are deterministic, quick computation, pre-image resistance, different hashes for different input (randomized), and collision-resistant.

Instructor’s Notes:

The key characteristics of cryptographic hash functions are as follows:

  • Deterministic: A hash function will always give the same output for the same input. It is a vital characteristic because if a hash function gives a different value each time for the same input, it will be impossible to keep track of inputs
  • Quick Computation: A hash function must return the hash value for input quickly to ensure the high efficiency of the blockchain system
  • Pre-Image Resistance: A hash function is hard to invert so that it becomes infeasible to determine the original input from a hash value
  • Hash Value Changes with Minute Change in Input: Even a minute input drastically alters the hash value
  • Collision Resistant: Two different inputs will never have the same unique hash value

Slide 3

This slide visually presents the hashing's avalanche effect, showcasing how minor input value change drastically alters output value.

Slide 4

The slide includes an example to highlight the avalanche concept in the blockchain.

Slide 5

This slide highlights the major classes of cryptographic hash functions such as secure hashing algorithm (SHA-2 and SHA-3), RACE integrity primitives evaluation message digest (RIPEMD), message digest algorithm 5 (MD5), and BLAKE2.

Instructor’s Notes:

  • Each hash function category has multiple algorithms
    • For example, SHA-2 hash functions types include SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, and SHA-512/256
    • Although all of these hash functions are similar, they differ slightly in the way the algorithm creates output for the input in terms of fixed length
  • SHA-256 is perhaps the most famous of all cryptographic hash functions because it’s used extensively in blockchain technology. Also, Satoshi Nakamoto used it in the original bitcoin protocol

Slide 6

This slide tabulates the comparison of multiple cryptographic hash functions used in the blockchain on multiple parameters such as output size (bits), internal state size, block size, length size, word size, and rounds.

Ratings and Reviews

90% of 100
Write a review
Most Relevant Reviews

2 Item(s)

per page:
  1. 100%

    by Derek Mills

    Nice and innovative design.
  2. 80%

    by Dewayne Nichols

    SlideTeam is the way to go when you are in a time crunch. Their templates have saved me many times in the past three months.

2 Item(s)

per page: