SHA-256 is a variant of the SHA-2, which was initially developed by the National Security Agency.((Federal Register - Announcing Approval of Federal Information Processing Standard (FIPS) 180-2, Secure Hash Standard; a Revision of FIPS 180-1<\/a>)) This means that the inner workings of the algorithm aren't known to the public as it protects sensitive information belonging to the United States. <\/p>\n\n\n\n It is practically impossible to reveal the initial data from a hash value as they are only one-way functions. <\/p>\n\n\n\n Bitcoin utilizes a double SHA-256, meaning once they get the initial hash from the data, it is hashed once again - this creates an insurmountable amount of possible hashes basically eliminating the chance of a brute-force attack<\/a> as it would take 2^256 attempts to generate the initial data,((N-able - SHA-256 Algorithm Overview<\/a>)) more than the number of atoms in the universe.<\/p>\n","post_title":"SHA-256","post_excerpt":"","post_status":"publish","comment_status":"closed","ping_status":"open","post_password":"","post_name":"sha-256","to_ping":"","pinged":"https:\/\/www.thedistributed.co\/what-is-a-51-attack-on-a-blockchain\/\nhttps:\/\/www.thedistributed.co\/what-is-distributed-ledger-technology\/\nhttps:\/\/www.thedistributed.co\/a-guide-to-cryptocurrency-mining\/","post_modified":"2022-07-31 23:20:17","post_modified_gmt":"2022-07-31 13:20:17","post_content_filtered":"","post_parent":0,"guid":"https:\/\/www.thedistributed.co\/?p=3401","menu_order":0,"post_type":"post","post_mime_type":"","comment_count":"0","filter":"raw"}],"next":false,"total_page":false},"paged":1,"class":"jblog_block_13"};
SHA-256 is a variant of the SHA-2, which was initially developed by the National Security Agency.((Federal Register - Announcing Approval of Federal Information Processing Standard (FIPS) 180-2, Secure Hash Standard; a Revision of FIPS 180-1<\/a>)) This means that the inner workings of the algorithm aren't known to the public as it protects sensitive information belonging to the United States. <\/p>\n\n\n\n It is practically impossible to reveal the initial data from a hash value as they are only one-way functions. <\/p>\n\n\n\n Bitcoin utilizes a double SHA-256, meaning once they get the initial hash from the data, it is hashed once again - this creates an insurmountable amount of possible hashes basically eliminating the chance of a brute-force attack<\/a> as it would take 2^256 attempts to generate the initial data,((N-able - SHA-256 Algorithm Overview<\/a>)) more than the number of atoms in the universe.<\/p>\n","post_title":"SHA-256","post_excerpt":"","post_status":"publish","comment_status":"closed","ping_status":"open","post_password":"","post_name":"sha-256","to_ping":"","pinged":"https:\/\/www.thedistributed.co\/what-is-a-51-attack-on-a-blockchain\/\nhttps:\/\/www.thedistributed.co\/what-is-distributed-ledger-technology\/\nhttps:\/\/www.thedistributed.co\/a-guide-to-cryptocurrency-mining\/","post_modified":"2022-07-31 23:20:17","post_modified_gmt":"2022-07-31 13:20:17","post_content_filtered":"","post_parent":0,"guid":"https:\/\/www.thedistributed.co\/?p=3401","menu_order":0,"post_type":"post","post_mime_type":"","comment_count":"0","filter":"raw"}],"next":false,"total_page":false},"paged":1,"class":"jblog_block_13"};
The hashing algorithm is responsible for wallet address creation and management along with the verification of transactions on the blockchain ledger<\/a> through mining<\/a>. ((Bitcoin Wiki - SHA-256<\/a>))<\/p>\n\n\n\n SHA-256 is a variant of the SHA-2, which was initially developed by the National Security Agency.((Federal Register - Announcing Approval of Federal Information Processing Standard (FIPS) 180-2, Secure Hash Standard; a Revision of FIPS 180-1<\/a>)) This means that the inner workings of the algorithm aren't known to the public as it protects sensitive information belonging to the United States. <\/p>\n\n\n\n It is practically impossible to reveal the initial data from a hash value as they are only one-way functions. <\/p>\n\n\n\n Bitcoin utilizes a double SHA-256, meaning once they get the initial hash from the data, it is hashed once again - this creates an insurmountable amount of possible hashes basically eliminating the chance of a brute-force attack<\/a> as it would take 2^256 attempts to generate the initial data,((N-able - SHA-256 Algorithm Overview<\/a>)) more than the number of atoms in the universe.<\/p>\n","post_title":"SHA-256","post_excerpt":"","post_status":"publish","comment_status":"closed","ping_status":"open","post_password":"","post_name":"sha-256","to_ping":"","pinged":"https:\/\/www.thedistributed.co\/what-is-a-51-attack-on-a-blockchain\/\nhttps:\/\/www.thedistributed.co\/what-is-distributed-ledger-technology\/\nhttps:\/\/www.thedistributed.co\/a-guide-to-cryptocurrency-mining\/","post_modified":"2022-07-31 23:20:17","post_modified_gmt":"2022-07-31 13:20:17","post_content_filtered":"","post_parent":0,"guid":"https:\/\/www.thedistributed.co\/?p=3401","menu_order":0,"post_type":"post","post_mime_type":"","comment_count":"0","filter":"raw"}],"next":false,"total_page":false},"paged":1,"class":"jblog_block_13"};
Securing Hashing Algorithm 256 (SHA-256) is the hashing algorithm used to secure blockchains such as Bitcoin, where the hashing function<\/a> emits a 256-bit wide output. <\/p>\n\n\n\n The hashing algorithm is responsible for wallet address creation and management along with the verification of transactions on the blockchain ledger<\/a> through mining<\/a>. ((Bitcoin Wiki - SHA-256<\/a>))<\/p>\n\n\n\n SHA-256 is a variant of the SHA-2, which was initially developed by the National Security Agency.((Federal Register - Announcing Approval of Federal Information Processing Standard (FIPS) 180-2, Secure Hash Standard; a Revision of FIPS 180-1<\/a>)) This means that the inner workings of the algorithm aren't known to the public as it protects sensitive information belonging to the United States. <\/p>\n\n\n\n It is practically impossible to reveal the initial data from a hash value as they are only one-way functions. <\/p>\n\n\n\n Bitcoin utilizes a double SHA-256, meaning once they get the initial hash from the data, it is hashed once again - this creates an insurmountable amount of possible hashes basically eliminating the chance of a brute-force attack<\/a> as it would take 2^256 attempts to generate the initial data,((N-able - SHA-256 Algorithm Overview<\/a>)) more than the number of atoms in the universe.<\/p>\n","post_title":"SHA-256","post_excerpt":"","post_status":"publish","comment_status":"closed","ping_status":"open","post_password":"","post_name":"sha-256","to_ping":"","pinged":"https:\/\/www.thedistributed.co\/what-is-a-51-attack-on-a-blockchain\/\nhttps:\/\/www.thedistributed.co\/what-is-distributed-ledger-technology\/\nhttps:\/\/www.thedistributed.co\/a-guide-to-cryptocurrency-mining\/","post_modified":"2022-07-31 23:20:17","post_modified_gmt":"2022-07-31 13:20:17","post_content_filtered":"","post_parent":0,"guid":"https:\/\/www.thedistributed.co\/?p=3401","menu_order":0,"post_type":"post","post_mime_type":"","comment_count":"0","filter":"raw"}],"next":false,"total_page":false},"paged":1,"class":"jblog_block_13"};
Securing Hashing Algorithm 256 (SHA-256) is the hashing algorithm used to secure blockchains such as Bitcoin, where the hashing function<\/a> emits a 256-bit wide output. <\/p>\n\n\n\n The hashing algorithm is responsible for wallet address creation and management along with the verification of transactions on the blockchain ledger<\/a> through mining<\/a>. ((Bitcoin Wiki - SHA-256<\/a>))<\/p>\n\n\n\n SHA-256 is a variant of the SHA-2, which was initially developed by the National Security Agency.((Federal Register - Announcing Approval of Federal Information Processing Standard (FIPS) 180-2, Secure Hash Standard; a Revision of FIPS 180-1<\/a>)) This means that the inner workings of the algorithm aren't known to the public as it protects sensitive information belonging to the United States. <\/p>\n\n\n\n It is practically impossible to reveal the initial data from a hash value as they are only one-way functions. <\/p>\n\n\n\n Bitcoin utilizes a double SHA-256, meaning once they get the initial hash from the data, it is hashed once again - this creates an insurmountable amount of possible hashes basically eliminating the chance of a brute-force attack<\/a> as it would take 2^256 attempts to generate the initial data,((N-able - SHA-256 Algorithm Overview<\/a>)) more than the number of atoms in the universe.<\/p>\n","post_title":"SHA-256","post_excerpt":"","post_status":"publish","comment_status":"closed","ping_status":"open","post_password":"","post_name":"sha-256","to_ping":"","pinged":"https:\/\/www.thedistributed.co\/what-is-a-51-attack-on-a-blockchain\/\nhttps:\/\/www.thedistributed.co\/what-is-distributed-ledger-technology\/\nhttps:\/\/www.thedistributed.co\/a-guide-to-cryptocurrency-mining\/","post_modified":"2022-07-31 23:20:17","post_modified_gmt":"2022-07-31 13:20:17","post_content_filtered":"","post_parent":0,"guid":"https:\/\/www.thedistributed.co\/?p=3401","menu_order":0,"post_type":"post","post_mime_type":"","comment_count":"0","filter":"raw"}],"next":false,"total_page":false},"paged":1,"class":"jblog_block_13"};
How Secure Is SHA-256?<\/h2>\n\n\n\n
How Secure Is SHA-256?<\/h2>\n\n\n\n
How Secure Is SHA-256?<\/h2>\n\n\n\n
What Is SHA-256?<\/h2>\n\n\n\n
How Secure Is SHA-256?<\/h2>\n\n\n\n