Computing Cryptographic Hashes for Cyclic Dependencies
Implementation of cryptographic hashes is theoretically not that hard, given a good cryptographic library. However, things get trickier when we want to allow dependency cycles. At that point, we get a bit of a chicken-and-egg problem. We need resource A’s hash to compute resource B’s hash, but that in turn depends on B’s hash again! Let's study the problem and solve it.