SHA-256 Hash Functions (Technical Process)

Overview:

Cryptographic hash functions are primarily used in password security and encryption. They are the fundamental building blocks that are used in many cryptographic algorithms and protocols. Most commonly know are MD5 (message digest 5, the iteration after 4) and SHA-256. Bitcoin uses the hashcash-SHA-256^2 proof of work function developed by Adam Back. Originally proposed as a way to prevent spam e-mail and anonymous remailers.

Hash functions take an input of arbitrary size and uses a mathematical transformation to create a deterministic output, one that is always the same for a given input, called a digest or hash. The size of the output is going to be fixes in length. In bitcoin (SHA-256) the hash is going to be 256-bit in length.

There is a difference between cryptographic hash functions and traditional hash functions. Cryptographic implies the hash function conforms to a certain set of design goals which enable it…

View original post 475 mots de plus

Laisser un commentaire

Choisissez une méthode de connexion pour poster votre commentaire:

Logo WordPress.com

Vous commentez à l'aide de votre compte WordPress.com. Déconnexion / Changer )

Image Twitter

Vous commentez à l'aide de votre compte Twitter. Déconnexion / Changer )

Photo Facebook

Vous commentez à l'aide de votre compte Facebook. Déconnexion / Changer )

Photo Google+

Vous commentez à l'aide de votre compte Google+. Déconnexion / Changer )

Connexion à %s