CCTVRADIO
  • INICIO
    • NOTICIAS >
      • Sub sedes CCTVRADIO
      • TRANSPARENCIA
      • Artistas >
        • LOS CAMPESINOS
        • Derek Warfield |-| Damaris Woods
        • Banda MABEL
        • Banda SNOPSIS
  • SOMOS
    • Nuestros Afiliados >
      • MAS.TIENDA
    • Novedades >
      • Investigación y Desarrollo
      • Diccionario de acronimos y frases sobre Bitcoin
      • Glosario de Bitcoin y blockchains
      • TORNEO WARROBOTS
      • BTC-Bitcoin
      • CCI - Central Corp. Inteligence
      • Gaston Acurio
    • Proyectos Creados >
      • Proyectos que Participamos
    • Galería Fotográfica
    • Productos
    • Juegos >
      • Achilles
      • El Rescate del Tesoro INKA
  • CCTVRADIO EDU
    • La Perspectiva Educación del Siglo XXI
    • Que es un código ISIC o CIIU
    • Símbolos de Nuestra Institución
    • Educación Continua
    • Servicios a Escuelas
    • Haz tu Donación
  • CCI-HACK
  • SERVICIOS
    • COPYWRITER
    • TELEFONÍA PRIVADA
    • Envío Publicitario SMS - S/. 0.01
    • Dominio, Hosting & Diseño
    • SE UN VPS DE VENTA DE HOSTING
    • Creación de Servidores de Radio Virtual (R2R-2IP)
    • Creación de Servidores de TV-Virtual (RTMP-TV)
    • Creación de Sistemas de Seguridad
    • Creación de Aplicaciones Móviles App´s
    • SEMINARIOS >
      • Cursos, Carreras Empresariales y Venta de todo
      • Venta de Libros
      • Cursos Libres
    • Forma de Pago
  • Tarjetas

What is the SHA-256 algorithm used for the Bitcoin protocol?

24/5/2019

Comments

 
ImagenBitcoin protocol is SHA-256
​One of recurring cryptographic algorithms when studying the Bitcoin protocol is SHA-256. In this article, we will explain the origin of the family of SHA algorithms (Secure Hash Algorithm) and the applications that SHA-256 has in the Bitcoin protocol.

A traditional encryption algorithm (or encryption) is a function that transforms a message into an apparently random illegible series, using an encryption key that can be reverted (ie, obtain the original message) only by those who know the key. Through encryption, private information can be sent publicly over the Internet without any risk of others having access to it.

SHA is one of the many hash functions. A hash function is like a signature for a text or file. SHA-256 is a hash of 64 hexadecimal digits (a summary, for example bd4526534df7b33772c2f1ee26d97c39ff11379c8848e4e19d74ad849ef66423) almost single of a fixed size of 256 bits (32 bytes). A hash is only calculated in one direction and can not be decoded back.

Wikipedia: The SHA family (Secure Hash Algorithm, Secure Hash Algorithm) is a system of related cryptographic hash functions of the National Security Agency of the United States (NSA) and published by the National Institute of Standards and Technology (NIST). The first member of the family was published in 1993 is officially called SHA. However, today, it is not officially called SHA-0 to avoid confusion with its successors. Two years later the first successor of SHA was published under the name of SHA-1. There are four more variants that have been published since then whose differences are based on a somewhat modified design and increased output ranges: SHA-224, SHA-256, SHA-384, and SHA-512 (calling SHA-2 to all of them) "

In 1998, an attack on SHA-0 was found but it was not confirmed for SHA-1, it is unknown if it was the NSA who discovered it, but it increased the safety of SHA-1.

SHA-1 has been examined very closely by the cryptographic community and no effective attack has been found. However, in 2004, a number of significant attacks were reported on cryptographic hash functions with a structure similar to SHA-1, which has raised questions about the long-term safety of SHA-1.

SHA-0 and SHA-1 produce a 160-bit summary output (20 bytes) of a message that can have a maximum size of 264 bits, and is based on principles similar to those used by Professor Ronald L. Rivest of MIT in the design of message summary algorithms MD4 and MD5.

The resistance of the SHA-1 algorithm was compromised throughout the year 2005. After MD5, among others, was seriously compromised in 2004 by a team of Chinese researchers, the lifetime of SHA-1 was seen for sentence although it is still used more than SHA-2.

The importance of breaking a hash function should be interpreted in the following way: A hash allows you to create a fingerprint, theoretically unique, of a file. A collision between hashes would suppose the possibility of the existence of two documents with the same footprint. That is why cryptographers and cryptographic algorithms are in a constant race to avoid collisions in security applications.

Applications of SHA-256

SHA-2 is used in a large number of security tools and protocols. Some of them are TLS, SSL, PGP, SSH, S / MIME, IPsec and Bitcoin.

In the Bitcoin protocol, SHA-256 is used in the creation of public keys or addresses and in Bitcoin mining.

Creation of addresses or public keys in the Bitcoin protocol with SHA-256

The process of creating a Bitcoin public address starts with a private and public key pair of an ECDSA elliptic curve. The public addresses (for example, 31uEbMgunupShBVTewXjtqbBv5MndwfXhb) that we see when we use a Bitcoin wallet / wallet client have gone through a public key creation and hashing process in which the SHA-256 and RIPEMD-160 hash functions are used to maximize their security.

For example, using the online tool Xorbin to create a hash with SHA-256 with the word "AjedrezDREZ" (without brackets) we obtain this 64-digit hash: bd4526534df8090778b712996d97c39ff11379c8848e4e19d74ad849ef66423.

Bitcoin mining with SHA-256

Bitcoin was the first cryptocurrency that SHA-2 used as part of its proof-of-work scheme. The rise of ASIC mining in Bitcoin has led to the creation of other cryptocurrencies such as Litecoin, which uses Scrypt (another cryptographic algorithm) for the job test. Bitcoin uses the SHA-256 algorithm to verifiably generate the numbers in a manner that requires a predictable amount of CPU effort. Generating a SHA-256 hash with a lower value than the current target solves a block and gives a reward called coinbase (it should not

Imagen
Comments
    Imagen
    Imagen

    Autor

    CCTVRADIO - Institución al Servicio de la Comunidad

    Conciertos

    Imagen

    mas.tienda

    Imagen

    Hosting Compartido

    Imagen

    Publicidad

    Imagen
    Imagen
    Imagen
    Imagen
    Imagen

    Redes Sociales

    Sub-sedes

    Educación

    Imagen

    Archivos

    December 2021
    September 2021
    July 2021
    May 2021
    April 2021
    February 2021
    December 2020
    October 2020
    September 2020
    August 2020
    July 2020
    June 2020
    May 2020
    April 2020
    March 2020
    February 2020
    January 2020
    December 2019
    October 2019
    July 2019
    June 2019
    May 2019
    April 2019
    March 2019
    January 2019
    December 2018

    Categorías

    All
    3500 Canales
    550Satellite
    Academia
    Academia Cantolao
    Ajedrez
    Albuquerque
    Ancash
    Andahuaylas
    App´s
    ARI
    Bitcoin
    Brasil
    BTC-Bitcoin
    Caimanes
    Callao
    Cámara De Comercio
    Cañete
    Carhuaz
    CCI
    CCI2
    CCI Community Bank
    #cctvradio
    CDC Santa Rosa
    Ciencia
    Cienciano
    Clean Bandit
    Club Comerciantes Unidos
    Coin Cryptographic Ajedrez (DREZ)
    Coin Cryptographic Intelligence (CCI)
    Conciento En Carhuaz
    Copa América
    Creditos Habbo
    Cusco
    Cuzco
    Chaoko
    Chaoko (CKO)
    Chiclayo
    Chilpi
    Chillpi (CHILPI)
    Christian Chávez
    Deportivo Coopsol
    D. Garcilaso
    Dogecoin
    Domain
    Domains
    Dominio
    Education
    Falafel
    Familia
    FC Retamoso
    Festejos Cusco
    Furnis
    Futbol
    Gmail
    Habbo
    Habbo CCTVRADIO
    Hacker Éticos
    Heráldica
    Huaral
    Huaraz
    INTI
    IntiCoin
    IntiCoin (INTI)
    IntiQori
    Jabbawockeez
    Januca
    Janucá
    Karolina Protsenko
    La Banda Mabel Nuestros Patrocinados
    La Banda Mabel - Nuestros Patrocinados
    Licores
    Liga 2
    Lima
    Mabel
    MabelCix
    Maracana
    Marshmello
    Medios De Comunicacion
    Metropolitana
    MetropolitanaTV
    Mexico
    México
    MIDIS
    Miguel Grau
    Mundo
    Mund⚽️TV
    Music
    Musica
    New Mexico
    Noticias
    Olimpiadas Lima 2019
    Peliculas
    Películas
    PenCoin
    PenCoin (PEN)
    Peru
    Perú
    PERUradio
    Peruvian
    PlayStore
    QoriCoin
    Quien Recuerda?
    Radio
    Radio Metropolitana
    RADIOTVARMAGEDON
    RBD
    Real Garcilaso
    Rebelde
    Rock
    RollerCoin
    Rusa
    Rusia
    Russian
    SAT550
    Scientific
    Semana Santa
    SINOPSIS
    SJL
    Soccer
    Solo
    Sort. Victoria
    Tecnologia
    Tecnologic
    Television
    Tercera Fecha
    TheScience
    Torneo #WarRobots - Local
    Union Huaral
    United States
    Uriona
    URL
    Videos Gibby
    Violin
    WAWA*Laptop
    WinGet
    Win&Get
    World
    Белоруссия
    Тима Белорусских
    Украина

    RSS Feed

    Quien recuerda nuestra primera pagina web de CCTVRADIO con este blog nosotros empezamos en Internet:
    cctvradioperu.es.tl

    Patrocinados

    Imagen
    Imagen
    Imagen
    Imagen
    Imagen

    Torneo

    Imagen

    Sitios que publican de CCTVRADIO

    Imagen
    PD.: Si ustedes aun no saben que es un código ISIC o CIIU pueden saber desde aquí

    CCTVRADIO GROUPS esta catalogado como: TV por cable y TV por satélite
    Imagen
    Imagen
    Imagen
    Imagen

    Cryptos


    Imagen
    Imagen
    Imagen
    Imagen

    Imagen
    Imagen

Protection and Satellite Tracking​ | Reservados todos los derechos de autor: cctvradio.com | Dirección: Calle La Vendimia Mz E Lote 1 Urb. La Talana - Distrito Santiago de Surco - Perú (Sede Oficial) | Phone: +1 518 665 6666 / +511 6419465  anexo 637339
Imagen
Imagen
CRIPTOMONEDA
Imagen
IntiCoin (INTI) es socio de CCTVRADIO
AGENCIA DE VIAJES
Imagen
Peruvian Travels es socio de CCTVRADIO
EMPRESA DE UTENSILIOS DE COCINA
Picture
TEXTILERIA
Imagen
ESTACION RADIAL
Imagen
PERU Radio es socio de CCTVRADIO
PRODUCTO ARTESANAL
Imagen