# The Poseidon Hash

Used for the different purposes
The Poseidon is a hash function designed for zero-knowledge proof systems like zkSNARKs. It operates over the
$GF(p)$
prime field. The main advantage of the Poseidon hash is simplification in circuits building.
The Poseidon contains a series of rounds each based on input permutations (add constants, exponentiation and mixing). An S-box routine is just an exponentiation number in the
$GF(p)$
field (the power of 5).
The round constants and S-box operations count depend on the parameter set. The Poseidon parameters are a tuple
$(t, f, p, c, m)$
, where
• $t$
is a number of S-box routines in one round. It also specifies an input dimension: hash function supports up to
$t$
input numbers.
• $f$
is a full rounds count (
$t$
S-box routines)
• $p$
is a partial rounds count (single S-box routine)
• $c$
is a round constants array (
$(f+p) \times t$
dimension)
• $m$
is a square array used for a mixing function (
$t \times t$
dimension)
The Poseidon routine produces a resulting hash (over prime field) after
$(f+p)$
rounds.
As mentioned previously there are different parameter sets used for hashes in the Merkle tree. These hash types are explained in the table below. The parameter set is presented in the reduced form (just a tuple
$(t, f, p)$
):
Label
Parameters
Hash purpose
Inputs
$Hash$
2, 8, 56
Key derivation (
$\eta$
and
$P_d$
)
Transaction verifier key
$A$
or diversifier
$d$
$Hash_{merkle}$
/
$Hash_{nullifier}$
3, 8, 56
Merkle tree's node; Nullifier
two child nodes or leafs; Account hash and intermediate nullifier hash (details)
$Hash_{eddsa}$
/
$Hash_{inh}$
4, 8, 56
EDDSA sign and verify; Intermediate nullifier hash (inh)
$R.x, A.x, H$
​ (details)
$Hash(acc)$
,
$\eta$
,
$path$
(details)
$Hash_{note}$
5, 8, 56
Note hash
$d, P_d, b, t$
(details)
$Hash_{account}$
/
$Hash_{sponge}$
6, 8, 57
Account hash;
Transaction hash
$d, P_d, i, b$
(details)​;
account and notes hashes with transaction commitment (details)
Poseidon specification
This page provides just a simple description of the Poseidon hash function. For additional details please refer to the original publication. It contains exhaustive materials, security investigations, implementation details, proof system applications and so on.