Haym Salomon Profile picture
Sep 7 8 tweets 2 min read
(1/7) Computer Science 101: Hash Functions

What is a hash function? What are the characteristics of a good hash function? Where do hash functions appear and why do I hear about them all the time?

If you want to understand the fundamental tool of crypto, this guide is for you!
(2/7) The purpose of a hash function is to transform any amount of data into a compact, uniform value. The input can be of arbitrary length but the output is always the same length.

The length is decided by the hash function; it can be as small or large as desired.
(3/7) Hash functions have many different uses, but all uses rely on the same fundamental properties:

- quick and efficient to compute
- outputs should be randomly distributed between all possible outputs
- difficult (if not impossible) to reverse engineer an input from an output
(4/7) If your hashing function has an output with 3 characters and you feed it 1MM pieces of data, much of it will result in the same output.

However, if the output is long enough, a good hash function will have no collisions (two inputs resulting in the same output).
(5/7) With a strong hashing function, we have the ability to take any data and compress it into a verifiable signature.

If the data is public, then anyone can recreate the signature and verify that the data matches its label.
(6/7) If the data is private, it can form the basis of identity.

Any private information fed into a (good) hash function will instantly become lost but form the basis of a unique, un-replicable signature.
(7/7) From here, we can go further: signatures created by two private identities can create a 3rd shared secret - the basis of encryption.

Encryption, cryptography, cryptocurrency When it comes down to it... hash functions are the foundation of crypto!

tutorialspoint.com/cryptography/c…
Like what you read? Help me spread the word by retweeting the thread (linked below).

Follow me for more explainers and as much alpha as I can possibly serve.

• • •

Missing some Tweet in this thread? You can try to force a refresh
 

Keep Current with Haym Salomon

Haym Salomon Profile picture

Stay in touch and get notified when new unrolls are available from this author!

Read all threads

This Thread may be Removed Anytime!

PDF

Twitter may remove this content at anytime! Save it as PDF for later use!

Try unrolling a thread yourself!

how to unroll video
  1. Follow @ThreadReaderApp to mention us!

  2. From a Twitter thread mention us with a keyword "unroll"
@threadreaderapp unroll

Practice here first or read more on our help page!

More from @SalomonCrypto

Sep 9
(1/18) @ethereum Fundamentals: Transactions

Sent $ETH? LP'ed into an AMM? Deployed a new contract? Everything you do on the World Computer leaves an on-chain record. Ever wonder what's inside your transactions?

A field-by-field guide to the atomic unit of Ethereum computing Image
(2/18) @ethereum is the World Computer: a globally shared utility that exists between a network of 1000s of computers

Users interact with Ethereum through a wallet (like @MetaMask), which creates and sends txns to the network. Once accepted, the txns are written into a block.
(3/18) Perquisite - hashing, (applying a hash function)

Hash function: a piece of code used to transform any amount of data into a compact, uniform value. The input can be of arbitrary length but the output is always the same length.

(Good) hash functions are non-reversible.
Read 19 tweets
Sep 7
(1/13) Computer Science 201: Merkle Trees and Merkle Proofs

If you want to understand @Bitcoin, @ethereum and blockchain technology, you need to learn:

- How a Merkle trees expresses a large dataset
- How a Merkle proof works
- Why a Markle tree is so efficient Image
(2/13) Hashing - applying a hash function - takes data (of arbitrary contents and size) and reduces it to a unique, compact string.

Every input produces a unique output, even if two inputs are nearly identical.
(3/13) A Merkle Tree uses hashing to build a data structure that allows for quick, efficient, verifiable proof that a transaction was included in a much larger data set.

Also called a hash tree, they are named after Ralph Merkle (who proposed them in 1987).
Read 14 tweets
Sep 4
(1/12) On August 24th it became official: ERC-3475 is the latest @ethereum token standard!

Pioneered by @DebondProtocol, ERC-3475 Bond Tokens will usher in the next wave of De-Fi innovation.

Programmable money is coming alive right before our eyes!
(2/12) @ethereum is the World Computer, an internet-native public utility with built-in property rights.

Any developer can deploy (nearly) anything on-chain. Arbitrary applications are very difficult to integrate, and so the community has developed a set of token standards.
(3/12) Each token standard was created to allow @ethereum applications (and therefore assets) to express more and different properties.

From ERC-20 (basic accounting and transfer) to ERC-4246 (deposit and accrue value), each successive standard builds upon the previous.
Read 13 tweets
Sep 3
(1/21) @ethereum: The Big Picture

From 1492 to 2022, the context, technology and vision of the World Computer. The complete, top-to-bottom case for $ETH.

An (unprecedented) mega-thread.
(2/21) @ethereum is... complicated. This guide (attempts to) build the macro case for Ethereum by combining layers of topic-specific Twitter threads, allowing each concept to be further explored.

Table of Contents (with links): bit.ly/ETHBigPicture
(3/21) ~500k years ago a few apes climbed down out of the trees and humanity was born. This made many people very angry and has been widely regarded as a bad move.

Nevertheless, from that day forward humans got to work.
Read 22 tweets
Sep 2
(1/20) Printing Press. Radio. Television. Internet.

How mass communication technology changes people, how people change society, and how these transitions happen throughout history.

The world is changing right now, anon. Do you understand what's happening?
(2/20) In 1994, Jim Clark and @pmarca founded Mosaic Communications and released Netscape, introducing the general public to the internet.

By now, in 2022, the internet has touched every aspect of human life. In less than 30 years global society has completely changed.
(3/20) Many of the consequences are obvious (you're reading this on Twitter right now) while other more subtle (the fact that Facebook posts can reshape families).

Living in the present, it's near impossible to understand how the holistic consequences.
Read 21 tweets
Sep 1
(1/14) How Mass Communication Reformed Europe

How did the printing press change Medieval European society? How did one unknown professor use it to become the most famous man in Europe? What horrors did it unleash?

What does it imply for the world's next mass comms platform?
(2/14) Before 1440, mass communication did not exist. Few people could read or write, and while written works did exist, the process and materials were outrageously expensive.

The most effective way to spread a message was to spread it yourself. Or maybe rely on a few apostles.
(3/14) In (approx) 1440, German Johannes Gutenberg created a machine that drastically reduced the cost of printing books and other documents.

Those of us in 2022 know that this invention would go on to shape the world, up until and including today.

en.wikipedia.org/wiki/Printing_…
Read 15 tweets

Did Thread Reader help you today?

Support us! We are indie developers!


This site is made by just two indie developers on a laptop doing marketing, support and development! Read more about the story.

Become a Premium Member ($3/month or $30/year) and get exclusive features!

Become Premium

Don't want to be a Premium member but still want to support us?

Make a small donation by buying us coffee ($5) or help with server cost ($10)

Donate via Paypal

Or Donate anonymously using crypto!

Ethereum

0xfe58350B80634f60Fa6Dc149a72b4DFbc17D341E copy

Bitcoin

3ATGMxNzCUFzxpMCHL5sWSt4DVtS8UqXpi copy

Thank you for your support!

Follow Us on Twitter!

:(