
13 | Neha Narula on Blockchain, Cryptocurrency, and the Future of the Internet
Sean Carroll's Mindscape: Science, Society, Philosophy, Culture, Arts, and Ideas
00:00
Is There a Finger Print in Cryptography?
Hash functions are used to uniquely identify big chunks of data. By a finger print, we don't mean a set of swirls on a piece of paper. We mean aneteof chunka data. So you take a big chunk o data, like a p d f or an e male picture. And, um, you feed it through this hash function and what comes out the other end is a short string that is sort of very uniquely tied to that piece of data you put inside. It's shorter than the original, much, much shorter. Or can be the same size as the original, and so um. Its itsa.
Transcript
Play full episode