top of page
Yanda logo


A hash is a fixed-length string of characters that is generated by a cryptographic function and used to verify the integrity of data.

A hash is a fixed-length string of characters that is generated by applying a cryptographic function to a block of data. The resulting hash is unique to the data that was hashed, and any change to the data will result in a different hash.

Hashes are commonly used in cryptography and computer security to verify the integrity of data. For example, a hash can be used to ensure that a file has not been tampered with or corrupted during transmission. The recipient of the file can generate a hash of the file and compare it to the original hash to verify that the file has not been altered.

Hashes are also used in blockchain technology to create a secure and tamper-proof ledger of transactions. Each block in a blockchain contains a hash of the previous block, which ensures that the blocks are linked together in a specific order and cannot be altered or tampered with without being detected.

Hashes are designed to be one-way functions, meaning that it is extremely difficult to reverse-engineer the original data from the hash. This makes hashes useful for protecting sensitive information such as passwords or credit card numbers, which can be stored as hashes instead of plaintext.

There are many different cryptographic hash functions, including SHA-256, which is used in the Bitcoin blockchain, and Scrypt, which is used in the Litecoin blockchain. These hash functions are designed to be computationally intensive, which makes it difficult for attackers to generate fake hashes or tamper with the data being hashed.

bottom of page