In one line , PoH is Solana’s “secret sauce.”
In most distributed systems, getting all the computers to agree on the time is a surprisingly difficult and slow problem. They typically have to constantly communicate back and forth to agree on the order of events. This communication creates a massive bottleneck.
PoH solves this by replacing slow node-to-node communication with fast local computation.
Every validator runs its own PoH clock generator. Since the “ticking” of this clock is cryptographically secure and verifiable by anyone, a validator can receive a transaction that has been timestamped with a PoH hash and instantly trust its age and order relative to other events, without having to waste time asking other validators for their opinion.
The Technology Powering the Clock: SHA256The entire PoH system is made possible by the unique properties of a cryptographic hashing algorithm called SHA256 (the same algorithm that secures Bitcoin). A hash function takes any input data and turns it into a unique, fixed-size string of characters (a “hash”).
SHA256 has several properties that are essential for PoH:
This is the foundational theory. We know PoH is a verifiable clock built using the one-way, deterministic properties of the SHA256 hash function, designed to solve the problem of time in a distributed network.
The Engine of Time: A Verifiable Delay FunctionInside every validator client, a dedicated Proof of History service is constantly running a high-frequency loop: it takes the most recent hash and uses it as the input to generate the next hash.
New Hash = SHA256(Previous Hash)
This simple, sequential process, where the output of one step becomes the required input for the next, creates what is technically known as a Verifiable Delay Function (VDF). You are forced to perform the computation in sequence, which proves that a real, measurable amount of time has passed. You cannot predict a future hash without first computing all the hashes in between.
“Difficult to Produce, Easy to Verify”This sequential nature leads to a powerful asymmetry:
This is the core function of PoH in block production. When the Leader’s Banking Stage has processed a batch of transactions (an “entry”), it sends that entry to the PoH service. The service then performs a crucial step:
This new hash now serves as a unique and immutable timestamp. It cryptographically embeds the entry into the chain, proving not only the passage of time but also that this specific group of transactions was processed at that exact moment.
The Final Ledger: Hashes and “Ticks”This process happens at an incredible scale. A single Solana block can contain on the order of 800,000 of these PoH hashes.
Not every “tick” of the PoH clock will contain a transaction entry. When the PoH generator simply hashes its previous output without mixing in an entry, it creates what is known as a “tick.” These ticks are still vital as they continuously mark the passage of time and signal to the rest of the network that the Leader is online and functioning correctly, even during moments of low transaction volume.
This provides a clear mechanical understanding of how the PoH VDF is generated and how it creates a verifiable, timestamped ledger by incorporating transaction entries.
This provides a visual diagram and text that explain three key things:
The diagram at the top gives us a close-up look at the moment a batch of transactions (an “entry”) is permanently recorded. Think of it as a cryptographic notarization process:
The result is a new link in the chain that is inextricably bound to both the entry’s content and the exact moment in time it was processed. You cannot change the transaction data without breaking the entire historical record that follows.
2. The Rhythm of the Network (The Ticks)The bottom of the diagram and the text clarify the precise timing of this PoH clock:
This gives us the fundamental calculation for Solana’s block time: 64 ticks per block × 6.25 milliseconds per tick = 400 milliseconds per block.
This shows how the steady, high-frequency rhythm of the PoH generator directly dictates the network’s 400ms block time.
3. The Ultimate Purpose: Enforcing the RulesThe text at the bottom explains the most important security guarantee that comes from this system:
✅ Disclaimer:
This blog is inspired by and simplified from the “Solana: How it Works” executive overview by Helius and Turbine. I’ve restructured and expanded the concepts with additional analogies and breakdowns to help beginners understand Solana’s architecture more easily.
Proof of History (PoH) was originally published in Coinmonks on Medium, where people are continuing the conversation by highlighting and responding to this story.