Title: What is Hash SHA256? Post by: Thebabybillionaire on October 10, 2018, 11:59:18 AM What is the importance of hash?
Hash is very important to bitcoin because a hash function takes input data and forms a complex mathematical operation on it, resulting in a fixed-size output data. The size of the input data (also called message or string) is meaningless. What’s important to know is that the output data (also called digest) is always a fixed length. If you don't understand what is this hash, this is the example. every time you create a user account on a website, your password serves as the input of a hash function. Every time you visit that website and enter your password, a fast function is performed on your password. As long as the password matches the stored output, you can proceed to your account. Hash functions have been used in computational processes for a long time, whether you realize it or not. Cryptographic hash functions are used for several security applications, such as message authentication codes (MACs), e-commerce protocols, and digital signatures. Code: . Plain text ⬇️ Code: . (#) Hash function ⬇️ Code: . (#b!c1d&"(#df#!sk84#) Hash text (Sorry for using code, I can't use images because I'm a newbie so this is my vise versa ;D) Bitcoin hashing properties The following are important properties that a cryptography-viable hash function needs to function properly: Efficiency A cryptographic hash function shouldn’t take a long time to get from input to output. Collision Resistance It’s vital that two different inputs don’t have the same hash output; this is imperative to digital safety. While mathematically this is possible, it’s best if the odds are astronomically long for two different inputs to end up with the same output. In the event two distinct inputs have the same output, it’s referred to as a cryptographic hash collision, making it imperative for a hash to have a strong collision resistance. Otherwise, the algorithm will be vulnerable to collision attacks, which threatens security. Theymos ⬇️ Code: . 10001011100010000110 ↙️↘️ The pharmacist Jet cash Double-spending problem: if theymos sends money in digital format to The pharmacist, the pharmacist cannot know if theymos has deleted his copy of the file and he can choose to send the same file to jet cash. Pre-image Resistance Under ideal circumstances, it’s ideal that an input can’t be found based on the hash output. Any given input should have just one set hash output. If this resistance is absent in a function, it will likely be vulnerable to preimage attacks. Second preimage resistance It should also be difficult to find a second input on the off chance that input shares an output with another input. Functions that can’t resist this are vulnerable to second pre-image attacks. Privacy It’s vital for a hash function to hide input information. It should not be easy, or even possible, to learn information about the input merely by looking at the output. Randomness The final output of a hash function should be randomly distributed. Ideally, it would look akin to a series of coin flips so that a malicious player cannot find a pattern that could lead him or her to the original input. Proof Of Work (Pow) A proof-of-work system is intended to deter service abuses like span or the denial of service on networks that require a service requester. - Cryptocurrency miners tend to use computational work to solve a string of numbers that start with multiple zeros, which is commonly called a challenge string. More zeros mean the mining process will be more difficult. A miner can “solve” a string by locating the response or proof string. Note; that hash functions are not appropriate for storing encrypted passwords, as they are designed to be fast to compute, and hence would be candidates for brute-force attacks. Key derivation functions such as bcrypt or scrypt are designed to be slow to compute, and are more appropriate for password storage (npm has bcrypt and scrypt libraries, and PHP has a bcrypt implementation with password_hash). There's a various “cryptographic hash algorithms” like DSA, SHA-1, SHA 256, MD5, BLAKE, and RIPEMD. But the compatible hash for bitcoin is HASH SHA256, SHA-256 is one of the successor hash functions to SHA-1 (collectively referred to as SHA-2), and is one of the strongest hash functions available. SHA-256 is not much more complex to code than SHA-1, and has not yet been compromised in any way. The 256-bit key makes it a good partner-function for AES. It is defined in the NIST (National Institute of Standards and Technology) standard ‘FIPS 180-4’. NIST also provide a number of test vectors to verify correctness of implementation. In this JavaScript implementation, the script as clear and concise as possible, and equally as close as possible to the NIST specification, to make the operation of the script readily understandable. Code: /* - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - */ Note; that these scripts are intended to assist in studying the algorithms, not for production use. For production use, check this:(for web cryptography API ) https://developer.mozilla.org/en-US/docs/Web/API/SubtleCrypto/digest (And here for crypto library nodes) https://nodejs.org/api/crypto.html#crypto_class_hash Source; https://www.[Suspicious link removed] ( https://bitcoinexchangeguide.com/bitcoin-hash-functions/ ) https://www.movable-type.co.uk/scripts/sha256.html#src-code Ps:all names I provided to this post is my inspiration before I create this, that's why I put their names. Title: Re: What is Hash SHA256? Post by: Daboy_Lyle on October 12, 2018, 05:02:20 AM SHA-256 is part of the SHA-2 cryptographic hash functions. This is designed by the National Security Agency (NSA) and SHA stands for Secure Hash Algorithm.
SHA-256 can be used in Mining and creation of bitcoin addresses. It is used in mining as the proof of work algorithms and SHA-256 is also used on creating bitcoin addresses to improve its privacy and security. Title: Re: What is Hash SHA256? Post by: S_Therapist on October 12, 2018, 06:42:41 AM Guys, he has copied and pasted only with any link- https://bitcoinexchangeguide.com/bitcoin-hash-functions/
And, 33. Posting plagiarized content is not allowed. Title: Re: What is Hash SHA256? Post by: Thebabybillionaire on October 12, 2018, 06:57:20 AM Guys, he has copied and pasted only with any link- https://bitcoinexchangeguide.com/bitcoin-hash-functions/ Yes I copied and paste here. but, I think you didn't read my post.And, 33. Posting plagiarized content is not allowed. I have a source code to this post. This is not a plagiarism. Quote Source; https://www.[Suspicious link removed] The link that I provide as a source, block by the forum.https://www.movable-type.co.uk/scripts/sha256.html#src-code Ps: Are you hungry for merit??? Title: Re: What is Hash SHA256? Post by: Stedsm on October 12, 2018, 07:18:52 AM Guys, he has copied and pasted only with any link- https://bitcoinexchangeguide.com/bitcoin-hash-functions/ Yes I copied and paste here. but, I think you didn't read my post.And, 33. Posting plagiarized content is not allowed. I have a source code to this post. This is not a plagiarism. Quote Source; https://www.[Suspicious link removed] The link that I provide as a source, block by the forum.https://www.movable-type.co.uk/scripts/sha256.html#src-code You may have used the Code function itself to post those links because the links which seem to be suspicious to the forum are hereby deleted without any notice. I appreciate that you tried to say something here, but on another note, what's the meaning of posting the content that's already available over the internet and can be easily found once Googled? This may/may not be considered plagiarism based on many factors but it's not really needed as you didn't add anything extra to it in your own words and didn't try to describe it in your way. Quote Ps: Are you hungry for merit??? Everyone here is, else what's the reason for you to post it? Didn't you post this to earn some merits? ::) Title: Re: What is Hash SHA256? Post by: Thebabybillionaire on October 12, 2018, 08:23:16 AM @stedsm first of all, I want to thank you for appreciating me.
I created this post to all people who don't have much time to research on google that's why I posted here. Yes I didn't add anything here, because I want people to understand clearly this post whats all about. If I add something maybe they don't understand.(Because I have some issue on my grammar) Quote Everyone here is, else what's the reason for you to post it? This is not all about the merits. I know majority for all people want to earn merits.Didn't you post this to earn some merits? Roll Eyes But, that is not my reason for posting this. I came here because I want to learn and to share knowledge as well. Not for merit. Sounds rude, I didn't meant it. I apologized. Title: Re: What is Hash SHA256? Post by: Stedsm on October 12, 2018, 09:08:13 AM @stedsm first of all, I want to thank you for appreciating me. I created this post to all people who don't have much time to research on google that's why I posted here. Yes I didn't add anything here, because I want people to understand clearly this post whats all about. If I add something maybe they don't understand.(Because I have some issue on my grammar) Is it just due to Grammatical issues or that you yourself aren't aware of this HASH thing and posted just to add one more post to your portfolio? You tried to play wise, but did you do it right? No. And yes, nobody in this busy world is too lazy to visit https://www.google.com or even open Google's search app and ask for the same if they aren't aware of what is HASH. It takes not even a whole second in order for Google to show the exact results, one of which you've demonstrated here. Quote Quote Everyone here is, else what's the reason for you to post it? This is not all about the merits. I know majority for all people want to earn merits.Didn't you post this to earn some merits? Roll Eyes But, that is not my reason for posting this. I came here because I want to learn and to share knowledge as well. Not for merit. Sounds rude, I didn't meant it. I apologized. Not trying to be rude here dude, I've tried to put the facts in front of you and there's nothing wrong in sharing anything here, it's just that you should actually know what you're posting about. For example, if I ask you anything out of the box related to this SHA-256, will you be able to answer? Title: Re: What is Hash SHA256? Post by: Thebabybillionaire on October 12, 2018, 09:31:02 AM I got your point, im sorry for being rude to you i didn't mean it.
Maybe, I thought that you're one of the high ranks here that answering or post a reply through the sarcastic way in fact you helping me. I am wrong, i apologized. Quote For example, if I ask you anything out of the box related to this SHA-256, will you be able to answer? Yes, please tell me :) i want also to know if I've improved.Thanks |