Reserved IP Address°C
04-18-2025
BSV
$28.48
Vol 17.85m
1.77%
BTC
$84687
Vol 17974.67m
0.08%
BCH
$329.77
Vol 129.71m
-0.72%
LTC
$75.62
Vol 273.21m
0.41%
DOGE
$0.15
Vol 556.33m
-0.55%
Getting your Trinity Audio player ready...

In a recent post on Medium, Dr. Craig Wright addresses double hashes and why they were used when creating Bitcoin. As with a number of Bitcoin’s characteristics, the true story behind double hashes has been chopped up and put into a blender until a result was achieved that had nothing to do with the original design. Wright continues to publish bits and pieces to provide the real story and help to finally set the record straight on what Bitcoin is and what it isn’t.

Wright explains, “We can say that if we iterate a hash n times, it makes it n times as likely that a collision will occur. I am taking some liberty here, and the [math] involved in what I’ve explained is not completely accurate, but it is true that for each time we rehash a function using the same hash function, we lose collision security for the function. In fact, if we look at how addresses in Bitcoin are created, we see that the double-hashing function increases the effect even further. In other words, the hash of the hash in the scenario is more likely to lead to a collision than a single hash or even the hash of the same hash function (a double hash).”

He goes onto explain that the Wiki on Bitcoin Core (BTC) is completely wrong in its description of double-hashing. It isn’t used to increase security, as indicated, although, in addressing, if one hash function is determined to be vulnerable, the other hash function will stay secure longer.

One reason for the inclusion of the double-hash function in Bitcoin is to keep individual verification functions intact as Bitcoin Scales. Asserts Wright, “[A] value [can be] sent to a miner in a way that doesn’t allow them to broadcast a block without individual transactions. In a Merkle tree structure, we could have all of the block sent and solved apart from a single transaction. Doing so would allow us to construct an ASIC mining facility that does not host the data in blocks. The miner is now a distributed function.”

The function also allows for the creation of a system that is able to be distributed and validated in accordance with laws. They can act in conjunction with local jurisdictions and “allows us to have immutable data storage that can be filtered with the hash being validated and a subsequent prune of illicit material being allowed in certain jurisdictions.”

Recommended for you

Apple’s encryption backdoor: A wake-up call for innovation
Apple disabling its e2e encryption highlights a vulnerability—centralized systems are susceptible to pressures that may compel them to compromise privacy.
April 18, 2025
How AI reshapes programming, building applications
Integrating AI probabilistic thinking with blockchain technology transforms coding practices and sparks a major cultural shift.
April 3, 2025
Advertisement
Advertisement
Advertisement