6/11/2023 0 Comments Checksum vs hashWithout a short, unique identifier like a cryptographic hash, content addressing wouldn't be possible. A computer running IPFS can ask all the peers it's connected to whether they have a file with a particular hash and, if one of them does, they send back the whole file. That's critical for a distributed system like IPFS, where we want to be able to store and retrieve data from many places. A hash is a fixed length, so the SHA-256 hash of a one-gigabyte video file is still only 32 bytes. These features also mean we can use a cryptographic hash to identify any piece of data: the hash is unique to the data we calculated it from and it's not too long so sending it around the network doesn't take up a lot of resource.
0 Comments
Leave a Reply. |