Difference between revisions of "SHA-256"
m |
|||
Line 9: | Line 9: | ||
==Attribution== | ==Attribution== | ||
− | This content is based on content sourced from https://en.bitcoin.it/wiki/SHA-256 under [https://creativecommons.org/licenses/by/3.0/ Creative Commons Attribution 3.0]. Although it may have been extensively revised and updated we acknowledge the original authors. | + | This content is based on content sourced from https://en.bitcoin.it/wiki/SHA-256 under [https://creativecommons.org/licenses/by/3.0/ Creative Commons Attribution 3.0]. Although it may have been extensively revised and updated, we acknowledge the original authors. |
Latest revision as of 01:28, 18 November 2020
SHA-256 is a member of the SHA-2 cryptographic hash functions designed by the NSA. SHA stands for Secure Hash Algorithm. Cryptographic hash functions are mathematical operations run on digital data; by comparing the computed "hash" (the output from execution of the algorithm) to a known and expected hash value, a person can determine the data's integrity. A one-way hash can be generated from any piece of data, but the data cannot be generated from the hash.
SHA-256 is used in several different parts of the Bitcoin network:
- Mining uses SHA-256 as the Proof of Work algorithm.
- SHA-256 is used in the creation of bitcoin addresses to improve security and privacy.
See also
Attribution
This content is based on content sourced from https://en.bitcoin.it/wiki/SHA-256 under Creative Commons Attribution 3.0. Although it may have been extensively revised and updated, we acknowledge the original authors.