The Business & Technology Network
Helping Business Interpret and Use Technology
«  
  »
S M T W T F S
 
 
1
 
2
 
3
 
4
 
5
 
6
 
7
 
8
 
9
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Proof of History (PoH)

DATE POSTED:August 4, 2025
What is Proof of History (PoH)?

In one line , PoH is Solana’s “secret sauce.”

  • Its Function: The simplest way to think of PoH is as a special, high-speed, cryptographic clock. Its primary job is to create a verifiable, trustworthy record of the passage of time and the order of events.
  • The Diagram: The visual at the top shows this perfectly. It’s a continuous chain of hashes, where each new “tick” of the clock builds upon the last, creating an unbreakable and sequential record of time.
  • A Crucial Distinction: It is critical to understand that PoH is NOT a consensus algorithm like Proof of Work (mining) or Proof of Stake (voting). PoH doesn’t decide if a transaction is valid. Instead, it’s a tool that provides a globally agreed-upon order of events, which makes reaching consensus incredibly fast and simple for the validators.
The Problem PoH Solves

In most distributed systems, getting all the computers to agree on the time is a surprisingly difficult and slow problem. They typically have to constantly communicate back and forth to agree on the order of events. This communication creates a massive bottleneck.

PoH solves this by replacing slow node-to-node communication with fast local computation.

Every validator runs its own PoH clock generator. Since the “ticking” of this clock is cryptographically secure and verifiable by anyone, a validator can receive a transaction that has been timestamped with a PoH hash and instantly trust its age and order relative to other events, without having to waste time asking other validators for their opinion.

The Technology Powering the Clock: SHA256

The entire PoH system is made possible by the unique properties of a cryptographic hashing algorithm called SHA256 (the same algorithm that secures Bitcoin). A hash function takes any input data and turns it into a unique, fixed-size string of characters (a “hash”).

SHA256 has several properties that are essential for PoH:

  1. Deterministic: The same input will always produce the exact same output hash. It’s perfectly predictable.
  2. Preimage Resistance (One-Way): It’s easy to compute an output hash from an input, but practically impossible to work backward and figure out the original input just by looking at the hash.
  3. Avalanche Effect (Tamper-Proof): Changing even a single character in the input will cause the output hash to change completely and unpredictably. This makes the history impossible to tamper with.
  4. Collision Resistance: It is computationally infeasible to find two different inputs that produce the same output hash, guaranteeing uniqueness.
  5. Efficient: The computation is very fast for modern computers.

This is the foundational theory. We know PoH is a verifiable clock built using the one-way, deterministic properties of the SHA256 hash function, designed to solve the problem of time in a distributed network.

The Engine of Time: A Verifiable Delay Function

Inside every validator client, a dedicated Proof of History service is constantly running a high-frequency loop: it takes the most recent hash and uses it as the input to generate the next hash.

New Hash = SHA256(Previous Hash)

This simple, sequential process, where the output of one step becomes the required input for the next, creates what is technically known as a Verifiable Delay Function (VDF). You are forced to perform the computation in sequence, which proves that a real, measurable amount of time has passed. You cannot predict a future hash without first computing all the hashes in between.

“Difficult to Produce, Easy to Verify”

This sequential nature leads to a powerful asymmetry:

  • Difficult to Produce: Because the hashes must be generated one after another, producing a long chain takes a known amount of computational effort and time. The slide aptly calls each step a “micro proof of work.”
  • Easy to Verify: However, once a Leader produces a long chain of hashes, other validators can verify its correctness very quickly. A validator with multiple CPU cores can check different sections of the hash chain in parallel to confirm its integrity at a much faster rate than it took to create.
Weaving Transactions into the Timeline

This is the core function of PoH in block production. When the Leader’s Banking Stage has processed a batch of transactions (an “entry”), it sends that entry to the PoH service. The service then performs a crucial step:

  1. It takes the current PoH hash (the latest “tick” of the clock).
  2. It takes a hash of the transaction entry.
  3. It combines them and hashes this new, combined data to produce the next PoH hash in the sequence.

This new hash now serves as a unique and immutable timestamp. It cryptographically embeds the entry into the chain, proving not only the passage of time but also that this specific group of transactions was processed at that exact moment.

The Final Ledger: Hashes and “Ticks”

This process happens at an incredible scale. A single Solana block can contain on the order of 800,000 of these PoH hashes.

Not every “tick” of the PoH clock will contain a transaction entry. When the PoH generator simply hashes its previous output without mixing in an entry, it creates what is known as a “tick.” These ticks are still vital as they continuously mark the passage of time and signal to the rest of the network that the Leader is online and functioning correctly, even during moments of low transaction volume.

This provides a clear mechanical understanding of how the PoH VDF is generated and how it creates a verifiable, timestamped ledger by incorporating transaction entries.

This provides a visual diagram and text that explain three key things:

  1. The exact process of adding a transaction entry to the PoH chain.
  2. The precise timing of the network’s “clock.”
  3. The ultimate security guarantee that this system provides.
1. How a Transaction is Woven into Time (The Diagram)

The diagram at the top gives us a close-up look at the moment a batch of transactions (an “entry”) is permanently recorded. Think of it as a cryptographic notarization process:

  • Step 1: The Leader takes a New entry from its queue of processed transactions.
  • Step 2: It hashes this entry to create a unique digital fingerprint (Hash 0xdead...).
  • Step 3: It then combines this new fingerprint with the previous hash from the main PoH chain (Input 0xd...).
  • Step 4: This combined data is hashed one last time to produce the brand new hash (Hash 0xbadc...) in the PoH sequence.

The result is a new link in the chain that is inextricably bound to both the entry’s content and the exact moment in time it was processed. You cannot change the transaction data without breaking the entire historical record that follows.

2. The Rhythm of the Network (The Ticks)

The bottom of the diagram and the text clarify the precise timing of this PoH clock:

  • A “tick” is a standard unit of time on the PoH clock. Each tick is composed of 12,500 sequential hashes, a process that takes 6.25 milliseconds.
  • A “block” (also known as a slot) is defined as containing exactly 64 ticks.

This gives us the fundamental calculation for Solana’s block time: 64 ticks per block × 6.25 milliseconds per tick = 400 milliseconds per block.

This shows how the steady, high-frequency rhythm of the PoH generator directly dictates the network’s 400ms block time.

3. The Ultimate Purpose: Enforcing the Rules

The text at the bottom explains the most important security guarantee that comes from this system:

  • Enforcing the Leader Schedule: Because creating the chain of hashes takes real, physical time, a validator cannot fake the clock or skip ahead. They cannot produce a block for a future slot because they cannot predict what the PoH hash will be at that future time. This mathematically forces every validator to adhere strictly to the predetermined leader schedule.
  • Preventing “Delinquent” Validators: This system prevents a validator from being “delinquent” — a state where they might try to produce blocks when it’s not their assigned turn. PoH makes this impossible.
  • Synchronization: Finally, it’s crucial that all validators run this PoH clock constantly, even when they are not the Leader. This is how the entire distributed network stays in perfect sync on the passage of time without needing to constantly communicate.

Disclaimer:
This blog is inspired by and simplified from the
“Solana: How it Works” executive overview by Helius and Turbine. I’ve restructured and expanded the concepts with additional analogies and breakdowns to help beginners understand Solana’s architecture more easily.

Proof of History (PoH) was originally published in Coinmonks on Medium, where people are continuing the conversation by highlighting and responding to this story.