What Is Hashgraph Technology?

Hashgraph Technology

Blockchain is becoming increasingly popular in today’s world. It is considered to be one of the greatest technological revolutions in history and has gained exciting popularity due to numerous successful and profitable use cases. This can be explained by the fact that people seem to be finding new ways to provide solutions to real-world problems.

Blockchain technology allows using algorithms like proof of work (PoW), proof of stake (PoS), however, both of these face many challenges. Voting seems to be the best method, as all information is accessible to each participant in the block that provides total security to the network.

Technology continues to develop constantly. The tech space never stops coming up with even more exciting developments as companies try to outdo each other in order to attract the attention of users.

It’s time to welcome a new revolutionary technology, and its name is Hashgraph.

What Is Hashgraph Technology?

Hashgraph technology is a relatively new participant in the world of distributed ledger systems, but it appears to be a highly effective tool, as it includes an algorithm with a new platform for distributed consensus.

Hashgraph was invented in 2016 by Leemon Baird, co-founder of Swirlds, a software platform for the development of distributed applications.

Hashgraph technologyIt uses two techniques to ensure fast, fair, secure consensus:

Gossip about Gossip

The famous concept “gossip about gossip” is a familiar mechanism in real life that is successfully being implemented in networking and business.

Everyone is aware of its principle: Sarah tells Robin that she has bought a nice dress on sale in one shop and that there are a lot of clothes for a nice price. Later, Robin calls Eva to invite her on a shopping trip. Eva encourages Kate, Kate tells Molly, and so on. The next day, this shop will have at least 4 potential buyers.

In Hashgraph, the function is the same. A piece of “gossip” contains a snippet of information that is provided to the hashes the last two participants talked to. Each node has the ability to randomly share transactions, events, or any other kind of signed information with others.

Then, the node that has received the message converts it into a new one and sends it to other random nodes, which repeat the action until all of them get the information. In this way, all nodes receive and remain aware of the constantly updated information.

Hashgraph technology

Virtual Voting

One can easily calculate all votes if they are divided into rounds. This is exactly what virtual voting ensures, as it is conducted in several rounds. It is quite easy to find out which node will vote because if new information is provided, all nodes immediately know who the initiator is. This can be used as input to the voting algorithm to find out which transaction has reached consensus.

With virtual voting, it is possible to define which transactions are valid and which are not. If a transaction has two-thirds of the node in the network as witnesses, it is valid. They have to confirm that they are connected to these nodes.

Also, we should remember that Hashgraph was created to be Byzantine Fault Tolerant, providing the opportunity for the system to work even if it turns Byzantine by a third of the nodes.

Virtual votingAsynchronous Byzantine Fault Tolerance (ABFT)

BFT can be either partially or totally asynchronous Byzantine (aBFT), and both of these are assumed at the beginning. Each of them is mathematically guaranteed; however, they differ in the level of personal assumptions about the environment. If we say that there are no botnets in the world, that means that we have a deal with partially Asynchronous BFT, because botnets do exist in the real world. On the other hand, if we try to prove mathematically the absence of botnets in the world, this means you’re living in a fantasy world.

Hashgraph is a totally asynchronous Byzantine. aBFT assumes that evil actors really exist in every community. It guarantees to reach consensus and is secure as long as less than one-third of participants are malicious.

Hashgraph technologySecurity in Hashgraph comes from Asynchronous Byzantine Fault Tolerance (ABFT). With this protocol, CEO Mance Harmon claims to have achieved the gold standard of security. Let’s find out how this consensus method works in Hashgraph.

Imagine that there are four separate divisions of the Byzantine army, and each of them has its own commander. They have to create a plan of action, but communication between them is possible only by messenger.

Asynchronous Byzantine Fault Tolerance (ABFT)The following scenarios might happen:

  1. Somebody might bribe a messenger.
  2. A general might bribe a messenger to act according to his plan.
  3. A messenger might be killed.

The generals have to develop a reasonable algorithm to decide which tactic to choose, and when to attack the city. They have to act together: simultaneously, in a coordinated manner, with consensus, and in the absence of misunderstanding to avoid defeat.

They won’t succeed if two generals tell their army to attack, and the other two two command retreat.

Consensus is an important solution to distributed ledger technology. Blockchain uses a consensus protocol called proof of work. However, this type takes a lot of time to accomplish. A transaction is carried out several times more slowly, and transaction fees are a reason for concern among many investors.

In a contrast, Hashgraph provides Byzantine Fault Tolerance(ABFT), which offers a consensus algorithm at the highest level of security. With ABFT, consensus can be reached with a probability of 1 if less than ⅓ of the nodes are controlled by attackers, and it can be predicted that messages from an honest node will be transferred, but it is not known how fast the messages would be sent.

An attacker has to govern less than ⅓ of the stake in a proof-of-stake consensus protocol, or less than ⅓ of the nodes if this concept is not used. The hacker can delete messages and control their sending. In any case, there is a limitation if an honest node tries to send messages to another honest node so that one can get through.

ABFT is able to withstand hacker attacks, DDoS attacks, botnets, and firewalls of the communication network and network nodes if any.

Advantages and Disadvantages of Hashgraph Technology

Hashgraph technology has been gathering a lot of admirers all over the world who think that it can overcome all existing problems of the blockchain nature. On the other hand, many passionate blockchain supporters contend that comparing the blockchain with Hashgraph is like comparing tomatoes and cucumbers, as each has its own unique taste.

Let’s compare them to discover their differences.

Hashgraph provides the first-generation tech with severe constraints in terms of speed, fairness, cost, and security. The key indicator of this technology is performance, which shows the quantity and the number of developed applications and whether they can run on a database that can conduct 5 transactions per second.

Hashgraph and BlockchainHere are the 3 key features of Hashgraph technology that can solve the scalability issue faced by  blockchain-based projects today:

Speed: 250,000+ Transactions Per Second
Reliability:Consensus Time Stamping is mathematically proven
Security: The highest degree of security through Asynchronous Byzantine Fault Tolerant (ABFT)

Let’s give a wider explanation of each:

Speed

Sending messages to all nodes is optimized by the gossip protocol, which reduces communication overhead. It is fast, as it works in a permission setting. Hashgraph can function in private networks that require permission, and this has a great impact on the throughput of the consensus solution.

We can divide consensus technologies into three categories, which you can learn about in this article.

1. Public networks (for example, Bitcoin and Ethereum)

In a public network, every node can be a participant in the network, or stop its participation whenever they want. A public platform offers the ability to read and make records to every participant. Users can work on the platform, access the records, and gain permission to make changes to the records.

However, such networks are expensive and have some limitations deriving from the proof-of-work system. This decreases the number of applications where such technologies can be implemented.

Also, such consensuses can help to determine fraud cases; for example, Sybil attacks, in which a user can generate several entities that affect the consensus process and overall throughput.

2.Private (leader-based consensus algorithms)

Private networks have some restrictions to their use, so all participants are known beforehand. Only the owner has the exclusive right to make changes to the records. Permission to read may be opened or limited; it’s up to the organization.

This provides a high level of protection against Sybil attacks, and consensus can be reached quickly. As a result, the throughput is much higher than in public blockchains.

This also explains the lower cost in contrast to public networks. Performance is much better, making it possible to conduct more than 1,000 transactions per second.

This type of network is suitable for financial institutions and large companies because they are able to build large systems and reduce costs while improving efficiency.

Hashgraph is a private distributed ledger, so its throughput is more advantageous than blockchain, which is an open distributed ledger providing 10 transactions per second. Hashgraph is 50,000 times faster, offering 250,000+ transactions per second.

  • Hybrid networks  (the so-called blockchain consortium)

A hybrid network combines the key features and opportunities presented in both public and private networks. For example, a particular community or a group of determined people or nodes has the right to read and change records. In this way, permission to the database is restricted. This means that each participant works on his/her decision, and supports intellectual property rights within the community.

Public, hybrid and private networks

  1. Reliability

Hashgraph uses consensus timestamping, which defines a transaction as a first if it reaches ⅔ of the network. On one hand, it is very fair, as it excludes the possibility of cheating on major nodes. On the other hand, nodes can be Byzantine or malicious in the gossip protocol if choosing neighbors randomly. Successors can prevent nodes from receiving a message.

By the way, if two-thirds of the network does not reach the transaction, this can cause an inappropriate result for the node-initiator. This is one of the main challenges users of Hashgraph might face because this scenario will be difficult to implement during the release of a public distributed ledger.

  1. Security

Hashgraph is based on ABFT consensus, which means that it is a non-deterministic asynchronous protocol with the ability to choose the neighbor node randomly. The consensus protocol will stop its operation, but it is impossible to know when this will occur. All information received by nodes is continually reconciled/updated so they all have the same value, even after numerous rounds of gossip about gossip protocol, and become unanimous.
Hashgraph Sybil AttackHowever, a serious problem arises if Byzantine nodes begin to manipulate and govern all events that the network is spreading.

Let’s review the challenges faced by Hashgraph technology:

  1. Hashgraph is a private ledger, so the founders decide who can use this platform by themselves. This is extremely useful for MESH networks.
  2. The community is still skeptical about Hashgraph’s patent. Moreover, a few experts believe that it neglects the very idea of a decentralized system. They predict that in the future, it will become centralized, as it uses the gossip protocol and is open-source.
  3. In Hashgraph, no one has an impact on transaction order. In contrast, blockchain miners can change the order of transactions according to the value of transaction fees.
  4. As private enterprise businesses are the main source of Hashgraph funding, they can use it for centralized applications.
  5. Hashgraph design does not require nodes with computational power sufficient to establish a virtual machine, excluding the possibility of introducing Turing-complete smart contracts and the logic of balances without compromising security and scalability.

A more extended list of the problems Hashgraph is facing is provided in this article.

For a profound understanding of Hashgraph technology, read the article on Hashgraph ICO review.

The Hedera Hashgraph Platform is another creation besides Swirlds, Baird, and Harmon, which were designed to develop a distributed public ledger using the Hashgraph algorithm to provide reliable and transparent sets of codes on a higher level. The Hedera platform combines three services (i.g., cryptocurrency), allowing for microtransactions, micro-storage on the distributed ledger, and smart contracts offering a new kind of consensus algorithm that supports them. It is capable of running all kinds of DApps.

The platform also provides robust API support, making the creation of applications an accessible option for developers.

Summary

Undoubtedly, Hashgraph is a fast, reliable, secure technology that solves the scalability issue and works within the permission-setting system. In the process of changing settings into public, however, it will face a lot of the same challenges any public distributed ledgers do. Moreover, it is still questionable if it would still be able to operate in the same way if things go differently.

Each network, public or private, has its own advantages and disadvantages, but remember that there is no silver bullet for solving all painful problems.

Let’s discover the new innovations the current world is presenting to us. Hashgraph is definitely worth paying attention to.

In any case, we should remember that Hashgraph is still developing, and no one knows how it will work and what problems it will have in the future.

No Comments

1 Star2 Stars3 Stars4 Stars5 Stars (8 votes, average: 5.00 out of 5)
Loading...
Post A Comment