Difference between revisions of "SHA-256"
m |
|||
(One intermediate revision by the same user not shown) | |||
Line 7: | Line 7: | ||
== See also == | == See also == | ||
* https://en.wikipedia.org/wiki/SHA-2 | * https://en.wikipedia.org/wiki/SHA-2 | ||
+ | |||
+ | ==Attribution== | ||
+ | This content is based on content sourced from https://en.bitcoin.it/wiki/SHA-256 under [https://creativecommons.org/licenses/by/3.0/ Creative Commons Attribution 3.0]. Although it may have been extensively revised and updated, we acknowledge the original authors. |
Latest revision as of 01:28, 18 November 2020
SHA-256 is a member of the SHA-2 cryptographic hash functions designed by the NSA. SHA stands for Secure Hash Algorithm. Cryptographic hash functions are mathematical operations run on digital data; by comparing the computed "hash" (the output from execution of the algorithm) to a known and expected hash value, a person can determine the data's integrity. A one-way hash can be generated from any piece of data, but the data cannot be generated from the hash.
SHA-256 is used in several different parts of the Bitcoin network:
- Mining uses SHA-256 as the Proof of Work algorithm.
- SHA-256 is used in the creation of bitcoin addresses to improve security and privacy.
See also
Attribution
This content is based on content sourced from https://en.bitcoin.it/wiki/SHA-256 under Creative Commons Attribution 3.0. Although it may have been extensively revised and updated, we acknowledge the original authors.