New: Introducing the world's first secure touchscreen hardware wallets

Shop Now

Up your Web3 game

Ledger Academy Quests

  • Test your knowledge
  • Earn POK NFTs
Play now See all quests

Hash

Jun 6, 2023 | Updated Mar 18, 2024
A hash is a unique string of text created by mapping a piece of data through a mathematical function to encrypt and secure the data against alteration or unauthorized access.

What is Hashing in Crypto?

Hashing is the process of transforming any type of data into a unique string of fixed-length text, usually composed of a combination of hexadecimal characters (0 – 9 and a – f). Data is hashed by passing a plaintext through an algorithmic function. The output value, called the hash value, is unique and deterministic (the same input will always produce the same output). Any slight change in the input will produce a completely different output.

Cryptographic hash functions (CHF) are designed to enable users to verify whether the input has been tampered with by comparing the hash values of the original plaintext with the transformed data. CHF are irreversible, which makes it impossible to derive the original plaintext from the hash value. This makes them ideal for securing sensitive information, such as private keys and passwords, so that even when the hash value is compromised, the original data remains protected.

In practice, this function play a major role in cybersecurity mechanisms and cryptocurrencies. They are fundamental in blockchain computations to allow faster and more secure data processing.

Hash Function in Blockchain

Hashing is used to improve the processing of blockchain transactions while upholding their integrity. Each block in the chain contains a hash value representing the data in that block, as well as the hash value of the previous block. 

For instance, the transactions on Bitcoin are processed via SHA-256, a cryptographic algorithm that generates a unique 256-bit or 32-byte value from the original data regardless of its size. Each block in Bitcoin contains a unique hash value that represents the transactions in that block and the preceding one. 

Through a proof-of-work consensus mechanism, miners engage in a computationally intensive task that involves solving a complex mathematical puzzle to find a value that produces the next block. These functions in Bitcoin allow it to record transactions at a higher rate and ensure it is secure against malicious actors.

Decentralized Application

A decentralized application is a software program operating on a peer-to-peer network. It runs independently on the internet using smart contracts, outside the control of a single entity or authority.

Full definition

Circulating Supply

A crypto’s circulating supply is that specific cryptocurrency’s amount of tokens or coins that are in circulation at a particular time and are available to the public to buy or sell.

Full definition

Hardware Wallet

A hardware wallet is an external, physical device designed to securely store a user’s private keys offline.

Full definition