Difference between revisions of "SHA-256"
m |
|||
| (2 intermediate revisions by the same user not shown) | |||
| Line 3: | Line 3: | ||
SHA-256 is used in several different parts of the Bitcoin network: | SHA-256 is used in several different parts of the Bitcoin network: | ||
# [[Mining]] uses SHA-256 as the [[Proof of Work]] algorithm. | # [[Mining]] uses SHA-256 as the [[Proof of Work]] algorithm. | ||
| − | # SHA-256 is used in the [[ | + | # SHA-256 is used in the [[Technical_background_of_Bitcoin_addresses#How_to_create_Bitcoin_Address|creation of bitcoin addresses]] to improve security and privacy. |
== See also == | == See also == | ||
* https://en.wikipedia.org/wiki/SHA-2 | * https://en.wikipedia.org/wiki/SHA-2 | ||
| + | |||
| + | ==Attribution== | ||
| + | This content is based on content sourced from https://en.bitcoin.it/wiki/SHA-256 under [https://creativecommons.org/licenses/by/3.0/ Creative Commons Attribution 3.0]. Although it may have been extensively revised and updated, we acknowledge the original authors. | ||
Latest revision as of 01:28, 18 November 2020
SHA-256 is a member of the SHA-2 cryptographic hash functions designed by the NSA. SHA stands for Secure Hash Algorithm. Cryptographic hash functions are mathematical operations run on digital data; by comparing the computed "hash" (the output from execution of the algorithm) to a known and expected hash value, a person can determine the data's integrity. A one-way hash can be generated from any piece of data, but the data cannot be generated from the hash.
SHA-256 is used in several different parts of the Bitcoin network:
- Mining uses SHA-256 as the Proof of Work algorithm.
- SHA-256 is used in the creation of bitcoin addresses to improve security and privacy.
See also
Attribution
This content is based on content sourced from https://en.bitcoin.it/wiki/SHA-256 under Creative Commons Attribution 3.0. Although it may have been extensively revised and updated, we acknowledge the original authors.