Merkle Tree

From CryptoWiki

Basics

"A merkle tree is a tree-like data structure that has data on the leaves and creates hashes all the way up til you get a root hash. It is an efficient data structure to prove inclusion in a set of participants without having to provide every single piece of data."

A Merkle tree is a binary tree like structure to condense all the transactions to be hashed into a block.

The way it works is like a traditional binary tree. Merkle Trees are used in many cryptographic functions to provide efficient data storage and reduce the level of data needed to prove something exists.

All of the transactions that the miner has picked are ordered in a row – with the generation or coinbase transaction first (the transaction that generates the Bitcoins for the miner who found the solution to the previous block) – if the number of transactions is odd then the last transaction is added twice to make the number even – the number of levels of the tree depends on how many transactions.

The first transaction is hashed via SHA-256, then the second and the third, and so forth. The next step is to hash the hashes of the first and the second, then the third and the fourth and then the fifth and the sixth. After this step the hash of the hashes of the first and the second with the hashes of the third and fourth transactions. This continues up until the top of the tree.

Remember that the SHA-256 hashing algorithm produces a 32 byte string, so when you concatenate a 32byte string with a 32 byte string you create a 64 byte string. This is then hashed by sha-256 to produce a 32 byte string right up the merkle tree until all the transactions have been joined up.

The corresponding answer after the merkle tree has been calculated is the merkle root – again a 32 byte number. For each miner the Merkle root is generally different as the way each miner orders the transactions is different and so the hashes are different.

This means that all the miners aren’t running through the same set of calculations when they are applying their ASIC’s through brute force to solve the proof of work."