2.3. ExercisesΒΆ

These questions are for you to go over what you learned in this chapter.

Using the online SHA-256 hash generator, calculate the SHA-256 hash of the following messages:

  • 42

  • 43

  • Hello World

  • Hello World!

What pattern do you notice?




State the three properties of good hash functions


What are two implementations of PPC and what are their respective advantages/disadvantages?


Briefly explain how we can generate a merkle tree


Why is randomness important in cryptography?


How does Blockchain primarily use cryptography?


Bill says he can use ECDSA to securely exchange messages with you. Is Bill correct? Why or why not?


Are most blockchain project anonymous? If not then what are they?


Briefly explain how Proof-of-Work utilizes hashing.


How is the valid chain determined in PoW?