Data Security and Encryption
*This is sample solution to be tested*
Merkle Tree Hashing for Data Verification
A Merkle Tree provides efficient data integrity checks, requiring minimal computation to verify a data segment against a root hash. This allows for rapid verification while keeping data accessible.
SHA3 Hashing for Security
The SHA3 cryptographic hash function generates a unique identifier for each transaction, ensuring data uniqueness and security. SHA3 produces a fixed-size output that’s highly sensitive to input changes—any alteration in the data drastically changes the hash, making tampering detectable.
Mathematical Basis: SHA3 produces a fixed-size output:
H(M)=SHA3(M)
For a message M. Minor changes in M create distinct hash outputs, maintaining the integrity of each transaction.
Last updated