Bitcoin Forum
May 07, 2024, 01:08:17 AM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
   Home   Help Search Login Register More  
Pages: [1]
  Print  
Author Topic: What exactly are Hashes and how are they created  (Read 747 times)
drwho88888 (OP)
Member
**
Offline Offline

Activity: 70
Merit: 10


View Profile
May 23, 2013, 08:01:29 PM
 #1

What exactly are Hashes and how are they created ?
1715044097
Hero Member
*
Offline Offline

Posts: 1715044097

View Profile Personal Message (Offline)

Ignore
1715044097
Reply with quote  #2

1715044097
Report to moderator
1715044097
Hero Member
*
Offline Offline

Posts: 1715044097

View Profile Personal Message (Offline)

Ignore
1715044097
Reply with quote  #2

1715044097
Report to moderator
Advertised sites are not endorsed by the Bitcoin Forum. They may be unsafe, untrustworthy, or illegal in your jurisdiction.
1715044097
Hero Member
*
Offline Offline

Posts: 1715044097

View Profile Personal Message (Offline)

Ignore
1715044097
Reply with quote  #2

1715044097
Report to moderator
neurobox
Full Member
***
Offline Offline

Activity: 220
Merit: 100

Getting too old for all this.


View Profile
May 23, 2013, 08:13:23 PM
 #2

A hash is string of numbers/letters/etc resulting from a one-way cryptographic routine. Any slight change in the input results in drastic changes to the output, but identical inputs always yield identical outputs. The output can be used to "identify" matching inputs without any possibility of determining what the inputs actually were.

Most websites, instead of storing passwords, will store a hash of the password. When a password is entered, it is hashed, and if the resulting hash is identical, they know you entered the correct password.

Traditionally this was done with md5 hashes, but now most md5 hashes can be pasted into google and the input is known. This cannot be the case with bitcoin, as the keys are far too complex and unique, and most transactions double up on the NSA-grade SHA256 hash, making it effectively impossible to break. That said, quantum computing is here...
RioGrande
Newbie
*
Offline Offline

Activity: 16
Merit: 0


View Profile
May 23, 2013, 09:02:25 PM
 #3

That was by far the simplest and best answer I have ever heard of for that, and I actually understood it.  Thanks!
theymos
Administrator
Legendary
*
Offline Offline

Activity: 5194
Merit: 12972


View Profile
May 23, 2013, 09:03:56 PM
 #4

That said, quantum computing is here...

QC doesn't break SHA-256.

1NXYoJ5xU91Jp83XfVMHwwTUyZFK64BoAD
neurobox
Full Member
***
Offline Offline

Activity: 220
Merit: 100

Getting too old for all this.


View Profile
May 23, 2013, 09:19:19 PM
 #5

That said, quantum computing is here...

QC doesn't break SHA-256.

I sure hope not. Time will tell.
keyzersoze
Sr. Member
****
Offline Offline

Activity: 476
Merit: 266



View Profile
May 23, 2013, 10:39:05 PM
 #6

Informative and clear answer bro Smiley
Thanx.

            ▄▄████▄▄
        ▄▄██████████████▄▄
      ███████████████████████▄▄
      ▀▀█████████████████████████
██▄▄       ▀▀█████████████████████
██████▄▄        ▀█████████████████
███████████▄▄       ▀▀████████████
███████████████▄▄        ▀████████
████████████████████▄▄       ▀▀███
 ▀▀██████████████████████▄▄
     ▀▀██████████████████████▄▄
▄▄        ▀██████████████████████▄
████▄▄        ▀▀██████████████████
█████████▄▄        ▀▀█████████████
█████████████▄▄        ▀▀█████████
██████████████████▄▄        ▀▀████
▀██████████████████████▄▄
  ▀▀████████████████████████
      ▀▀█████████████████▀▀
           ▀▀███████▀▀



.SEMUX
█ █
█ █
█ █
█ █
█ █
█ █
█ █
█ █
█ █
█ █
█ █
█ █
█ █
█ █
█ █
█ █
█ █
█ █
█ █
█ █
█ █
█ █
█ █
█ █
█ █
█ █
█ █
█ █
  Semux uses 100% original codebase
  Superfast with 30 seconds instant finality
  Tested 5000 tx per block on open network
█ █
█ █
█ █
█ █
█ █
█ █
█ █
█ █
█ █
█ █
█ █
█ █
█ █
█ █
neurobox
Full Member
***
Offline Offline

Activity: 220
Merit: 100

Getting too old for all this.


View Profile
May 23, 2013, 10:55:26 PM
 #7

Glad to help.
alani123
Legendary
*
Offline Offline

Activity: 2394
Merit: 1412


Leading Crypto Sports Betting & Casino Platform


View Profile
May 23, 2013, 11:55:30 PM
 #8

A hash is string of numbers/letters/etc resulting from a one-way cryptographic routine. Any slight change in the input results in drastic changes to the output, but identical inputs always yield identical outputs. The output can be used to "identify" matching inputs without any possibility of determining what the inputs actually were.

Most websites, instead of storing passwords, will store a hash of the password. When a password is entered, it is hashed, and if the resulting hash is identical, they know you entered the correct password.

Traditionally this was done with md5 hashes, but now most md5 hashes can be pasted into google and the input is known. This cannot be the case with bitcoin, as the keys are far too complex and unique, and most transactions double up on the NSA-grade SHA256 hash, making it effectively impossible to break. That said, quantum computing is here...

I'm saving this in a text document... lol
I don't think even the wiki has it in such detail.

..Stake.com..   ▄████████████████████████████████████▄
   ██ ▄▄▄▄▄▄▄▄▄▄            ▄▄▄▄▄▄▄▄▄▄ ██  ▄████▄
   ██ ▀▀▀▀▀▀▀▀▀▀ ██████████ ▀▀▀▀▀▀▀▀▀▀ ██  ██████
   ██ ██████████ ██      ██ ██████████ ██   ▀██▀
   ██ ██      ██ ██████  ██ ██      ██ ██    ██
   ██ ██████  ██ █████  ███ ██████  ██ ████▄ ██
   ██ █████  ███ ████  ████ █████  ███ ████████
   ██ ████  ████ ██████████ ████  ████ ████▀
   ██ ██████████ ▄▄▄▄▄▄▄▄▄▄ ██████████ ██
   ██            ▀▀▀▀▀▀▀▀▀▀            ██ 
   ▀█████████▀ ▄████████████▄ ▀█████████▀
  ▄▄▄▄▄▄▄▄▄▄▄▄███  ██  ██  ███▄▄▄▄▄▄▄▄▄▄▄▄
 ██████████████████████████████████████████
▄▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▄
█  ▄▀▄             █▀▀█▀▄▄
█  █▀█             █  ▐  ▐▌
█       ▄██▄       █  ▌  █
█     ▄██████▄     █  ▌ ▐▌
█    ██████████    █ ▐  █
█   ▐██████████▌   █ ▐ ▐▌
█    ▀▀██████▀▀    █ ▌ █
█     ▄▄▄██▄▄▄     █ ▌▐▌
█                  █▐ █
█                  █▐▐▌
█                  █▐█
▀▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▀█
▄▄█████████▄▄
▄██▀▀▀▀█████▀▀▀▀██▄
▄█▀       ▐█▌       ▀█▄
██         ▐█▌         ██
████▄     ▄█████▄     ▄████
████████▄███████████▄████████
███▀    █████████████    ▀███
██       ███████████       ██
▀█▄       █████████       ▄█▀
▀█▄    ▄██▀▀▀▀▀▀▀██▄  ▄▄▄█▀
▀███████         ███████▀
▀█████▄       ▄█████▀
▀▀▀███▄▄▄███▀▀▀
..PLAY NOW..
drwho88888 (OP)
Member
**
Offline Offline

Activity: 70
Merit: 10


View Profile
May 24, 2013, 03:45:24 PM
 #9

Thx neurobox. Much appreciated.
motnahp
Newbie
*
Offline Offline

Activity: 6
Merit: 0


View Profile
May 24, 2013, 04:22:35 PM
 #10

What exactly are Hashes and how are they created ?

google for "rfc sha256"
JSMill
Newbie
*
Offline Offline

Activity: 56
Merit: 0


View Profile
May 30, 2013, 07:12:12 PM
 #11

I have had heard that quantum computing will not have a great impact on Bitcoins.  Could anyone explain the technical aspects of why?
rme
Hero Member
*****
Offline Offline

Activity: 756
Merit: 504



View Profile
May 30, 2013, 07:17:52 PM
 #12

I have had heard that quantum computing will not have a great impact on Bitcoins.  Could anyone explain the technical aspects of why?

You have to generate every single bitcoin address possible to crack one.

That is not possible.
JSMill
Newbie
*
Offline Offline

Activity: 56
Merit: 0


View Profile
May 30, 2013, 07:20:28 PM
 #13

I have had heard that quantum computing will not have a great impact on Bitcoins.  Could anyone explain the technical aspects of why?

You have to generate every single bitcoin address possible to crack one.

That is not possible.

Thanks.  Not so worried about cracking individual bitcoin addresses but more worried about security of the blockchain.  I had heard that they cannot be used for hashing.  Could you explain why they cannot be used for hashing?
cedivad
Legendary
*
Offline Offline

Activity: 1176
Merit: 1001



View Profile
May 30, 2013, 07:22:46 PM
 #14

I have had heard that quantum computing will not have a great impact on Bitcoins.  Could anyone explain the technical aspects of why?

You have to generate every single bitcoin address possible to crack one.

That is not possible.
Spent addresses could theorically be cracked with qc. Unspent ones, not. as the boss pointed out sha-256 is safe, so should be bitcoin as a whole. Spent addresses, however, might be compromised.

My anger against what is wrong in the Bitcoin community is productive:
Bitcointa.lk - Replace "Bitcointalk.org" with "Bitcointa.lk" in this url to see how this page looks like on a proper forum (Announcement Thread)
Hashfast.org - Wiki for screwed customers
skippylou
Newbie
*
Offline Offline

Activity: 12
Merit: 0


View Profile
May 30, 2013, 09:21:07 PM
 #15

Just remember that the road of the past few decades is littered with broken hashes: MD4, MD5, SHA0, SHA1 and many others.
DannyHamilton
Legendary
*
Offline Offline

Activity: 3388
Merit: 4623



View Profile
May 30, 2013, 09:46:23 PM
 #16

Just remember that the road of the past few decades is littered with broken hashes: MD4, MD5, SHA0, SHA1 and many others.

And yet bitcoin could use anyone of them today instead of SHA2 and there wouldn't be a security issue.

The fact that a weakness is discovered in a particular hashing algorithm doesn't necessarily mean that the algorithm is then immediately useless for all purposes.
skippylou
Newbie
*
Offline Offline

Activity: 12
Merit: 0


View Profile
May 30, 2013, 10:46:32 PM
 #17

Just remember that the road of the past few decades is littered with broken hashes: MD4, MD5, SHA0, SHA1 and many others.

And yet bitcoin could use anyone of them today instead of SHA2 and there wouldn't be a security issue.

The fact that a weakness is discovered in a particular hashing algorithm doesn't necessarily mean that the algorithm is then immediately useless for all purposes.

If SHA2 were broken the breaker could mint coins at a faster rate than brute force.  How much faster depends, could be tens or hundreds of times faster..  If the breaker is intelligent, he/she could slowly cash in over a period of a few years, walk away with a pile of cash and a world full of inflated Bitcoins.  This would be an opportunity to cash in on research without the guilt of doing anything illegal or immoral.  Don't look for them to publish a paper in ASIACRYPT14.

Another point, when a break is found it is usually followed by a improved break in a few months or so. 
Pages: [1]
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!