\n No issue detected\n
\n\n A cryptographic hash function is like a secret code machine that takes any piece of information, no matter how long or short, and transforms it into a unique, fixed-length code. This code is also known as a \"hash\" or \"digest.\" Think of it as a way to ensure the trustworthiness of information shared between different parties.\n For example: Imagine you have a big stack of documents, and each document has its own secret code (hash). When someone downloads the documents, they can quickly compute their own secret codes. If their codes match the ones you provided, they know the documents are intact. Even a tiny change in the documents would result in completely different secret codes.\n
\n Show more\n\n In the world of blockchain, similar to how cryptocurrencies like Bitcoin and Ethereum work, we create a \"block\" for every transaction that happens. Each time we add a transaction to the blockchain, a bunch of secret codes (hashes) are created. These secret codes not only represent the new transaction but also include secret codes for all the previous transactions. It's like building a digital tree of trust, and we use a special structure called a \"Merkle Tree\" to do this efficiently.\n
\n\n With AWS Quantum Ledger Database (QLDB), you can follow any transaction's secret codes all the way to the final one. At each step, the database provides additional secret codes, which are like puzzle pieces that fit together. These extra secret codes are combined with the main secret code as part of the Merkle Tree calculation. This way, all transactions in the ledger end up with the same final secret code. It's a bit like putting together a jigsaw puzzle—when all the pieces match perfectly, you know your data is safe and unchanged.\n
\n\n On this page, you'll find a list of the latest ledger transactions. When you click on a transaction, you'll get a detailed view. This includes the complete data content of the transaction, alongside a diagram that breaks down the step-by-step calculations of the main and complementary hashes. This offers a thorough and transparent view of each transaction's details and data integrity.\n
\n Hide more\n\n You can see the hash details by clicking on the dots.\n
\n\n