Practical Guides

Learn cryptographic hash functions through academically-grounded guides that combine theory with practical applications. From file verification to blockchain analysis, these guides help you understand and use hash functions effectively.

Filter by category:
Filter by difficulty:
Beginner Security

How to Verify File Integrity with SHA-256

Learn cryptographic file verification to detect tampering and corruption in downloads.

Intermediate Theory

Understanding the Avalanche Effect

Discover why small input changes create dramatically different hash outputs.

Beginner Security

Why You Should Never Use MD5

Understand the cryptographic vulnerabilities that make MD5 unsafe for security.

Intermediate Practical

Comparing Hash Algorithms

Choose the right algorithm for your use case: speed, security, and compatibility.

Beginner Theory

How One Bit Change Affects the Hash

Visual demonstration of cryptographic sensitivity and the avalanche effect.

Advanced Blockchain

How to Verify a Bitcoin Transaction

Step-by-step guide to verifying Bitcoin transactions using hash functions.

Advanced Blockchain

Bitcoin Address Generation Explained

Learn how public keys become Bitcoin addresses through multiple hash operations.

Advanced Blockchain

Reading Bitcoin Block Headers

Understand the structure and hash-based security of Bitcoin blocks.

Beginner Practical

Hash Functions in the Real World

Explore practical applications from password storage to distributed systems.

Intermediate Security

Common Hashing Mistakes to Avoid

Security pitfalls and best practices for implementing hash-based systems.

Intermediate Security

Using HMAC for Message Authentication

Learn how to use HMAC for API request signing and webhook verification.

Beginner Practical

Detecting File Corruption with Checksums

Practical guide to using checksums for backup verification and corruption detection.

Intermediate Practical

Understanding Git's Use of SHA-1

Explore how Git uses SHA-1 for content-addressable storage and version control.

Beginner Security

Password Hashing: What NOT to Do

Common security mistakes in password hashing and how to avoid them.

Advanced Blockchain

Merkle Trees: Efficient Data Verification

Learn how Merkle trees enable O(log n) verification in Bitcoin and distributed systems.