CNI: Coalition for Networked Information

  • About CNI
    • Membership
    • CNI Collaborations
    • Staff
    • Steering Committee
    • CNI Awards
    • History
    • CNI News
  • Program Plan
    • Current Program Plan
    • Program Plan Archive
  • Topics
  • Events & Projects
    • Membership Meetings
    • Workshops & Projects
    • Other Events
    • Event Calendar
  • Resources
    • Publications by CNI Staff
    • Program Plan
    • Pre-Recorded Project Briefing Series
    • Videos & Podcasts
    • Follow CNI
    • Historical Resources
  • Contact Us

Data Integrity for Librarians, Archivists, and Criminals: What We Can Steal from Bitcoin, BitTorrent, and Usenet

Home / Project Briefing Pages / CNI Spring 2017 Project Briefings / Data Integrity for Librarians, Archivists, and Criminals: What We Can Steal from Bitcoin, BitTorrent, and Usenet

March 29, 2017

Jeffrey Spies
Chief Technology Officer
Center for Open Science

Data integrity is important in distributed systems. The same characteristics that make these systems robust (e.g., fault tolerance) make maintaining data integrity challenging. For this reason, hash functions play a central role in the algorithms and technologies that power Usenet, BitTorrent, and Bitcoin and its blockchain. A hash function is a function that maps arbitrarily sized data to some ideally smaller, unique, and non-invertable data of fixed size (the importance of these attributes will be explained). The MD5 hash of the title of this presentation is 23c1d6085d85ae07378da9861e792c34; if the Oxford commas were removed, the hash would change to 6eed93a3b7dc829f38065518b346ee72. If you were given both the title and its hash, then you could compute the hash of the title you received yourself and compare it to that of the hash you received. If they differed, you would know that there was an error in transmission or that an intermediate editor rejects clarity and civility. This presentation will introduce hashes and their variants, these distributed and sometimes dubious systems, and what can be learned and practically applied in today’s digital repositories for purposes of auditing, identifying, recovering, and sharing data.

Presentation

Share this:

  • Click to share on Facebook (Opens in new window)
  • Click to share on Twitter (Opens in new window)
  • Click to share on LinkedIn (Opens in new window)

Filed Under: CNI Spring 2017 Project Briefings, Digital Curation, Emerging Technologies, Information Access & Retrieval, Project Briefing Pages
Tagged With: cni2017spring, Project Briefings & Plenary Sessions, Videos

Last updated:  Tuesday, October 29th, 2019

 

Contact Us

21 Dupont Circle
Suite 800
Washington, DC, 20036
202.296.5098

Contact us
Copyright © 2023 CNI

  • Copyright Policy
  • Privacy Policy
  • Site map

Keeping up with CNI

CNI-ANNOUNCE is a low-volume electronic forum used for information about the activities and programs of CNI, and events and documents of interest to the CNI community.
Sign up

Follow CNI

  • View cni.org’s profile on Facebook
  • View cni_org’s profile on Twitter
  • LinkedIn
  • YouTube
  • Vimeo

A joint project