SHA-256 is a variant of the SHA-2, which was initially developed by the National Security Agency.((Federal Register - Announcing Approval of Federal Information Processing Standard (FIPS) 180-2, Secure Hash Standard; a Revision of FIPS 180-1<\/a>)) This means that the inner workings of the algorithm aren't known to the public as it protects sensitive information belonging to the United States. <\/p>\n\n\n\n It is practically impossible to reveal the initial data from a hash value as they are only one-way functions. <\/p>\n\n\n\n Bitcoin utilizes a double SHA-256, meaning once they get the initial hash from the data, it is hashed once again - this creates an insurmountable amount of possible hashes basically eliminating the chance of a brute-force attack<\/a> as it would take 2^256 attempts to generate the initial data,((N-able - SHA-256 Algorithm Overview<\/a>)) more than the number of atoms in the universe.<\/p>\n","post_title":"SHA-256","post_excerpt":"","post_status":"publish","comment_status":"closed","ping_status":"open","post_password":"","post_name":"sha-256","to_ping":"","pinged":"https:\/\/www.thedistributed.co\/what-is-a-51-attack-on-a-blockchain\/\nhttps:\/\/www.thedistributed.co\/what-is-distributed-ledger-technology\/\nhttps:\/\/www.thedistributed.co\/a-guide-to-cryptocurrency-mining\/","post_modified":"2022-07-31 23:20:17","post_modified_gmt":"2022-07-31 13:20:17","post_content_filtered":"","post_parent":0,"guid":"https:\/\/www.thedistributed.co\/?p=3401","menu_order":0,"post_type":"post","post_mime_type":"","comment_count":"0","filter":"raw"}],"next":false,"total_page":false},"paged":1,"class":"jblog_block_13"};
SHA-256 is a variant of the SHA-2, which was initially developed by the National Security Agency.((Federal Register - Announcing Approval of Federal Information Processing Standard (FIPS) 180-2, Secure Hash Standard; a Revision of FIPS 180-1<\/a>)) This means that the inner workings of the algorithm aren't known to the public as it protects sensitive information belonging to the United States. <\/p>\n\n\n\n It is practically impossible to reveal the initial data from a hash value as they are only one-way functions. <\/p>\n\n\n\n Bitcoin utilizes a double SHA-256, meaning once they get the initial hash from the data, it is hashed once again - this creates an insurmountable amount of possible hashes basically eliminating the chance of a brute-force attack<\/a> as it would take 2^256 attempts to generate the initial data,((N-able - SHA-256 Algorithm Overview<\/a>)) more than the number of atoms in the universe.<\/p>\n","post_title":"SHA-256","post_excerpt":"","post_status":"publish","comment_status":"closed","ping_status":"open","post_password":"","post_name":"sha-256","to_ping":"","pinged":"https:\/\/www.thedistributed.co\/what-is-a-51-attack-on-a-blockchain\/\nhttps:\/\/www.thedistributed.co\/what-is-distributed-ledger-technology\/\nhttps:\/\/www.thedistributed.co\/a-guide-to-cryptocurrency-mining\/","post_modified":"2022-07-31 23:20:17","post_modified_gmt":"2022-07-31 13:20:17","post_content_filtered":"","post_parent":0,"guid":"https:\/\/www.thedistributed.co\/?p=3401","menu_order":0,"post_type":"post","post_mime_type":"","comment_count":"0","filter":"raw"}],"next":false,"total_page":false},"paged":1,"class":"jblog_block_13"};
The hashing algorithm is responsible for wallet address creation and management along with the verification of transactions on the blockchain ledger<\/a> through mining<\/a>. ((Bitcoin Wiki - SHA-256<\/a>))<\/p>\n\n\n\n SHA-256 is a variant of the SHA-2, which was initially developed by the National Security Agency.((Federal Register - Announcing Approval of Federal Information Processing Standard (FIPS) 180-2, Secure Hash Standard; a Revision of FIPS 180-1<\/a>)) This means that the inner workings of the algorithm aren't known to the public as it protects sensitive information belonging to the United States. <\/p>\n\n\n\n It is practically impossible to reveal the initial data from a hash value as they are only one-way functions. <\/p>\n\n\n\n Bitcoin utilizes a double SHA-256, meaning once they get the initial hash from the data, it is hashed once again - this creates an insurmountable amount of possible hashes basically eliminating the chance of a brute-force attack<\/a> as it would take 2^256 attempts to generate the initial data,((N-able - SHA-256 Algorithm Overview<\/a>)) more than the number of atoms in the universe.<\/p>\n","post_title":"SHA-256","post_excerpt":"","post_status":"publish","comment_status":"closed","ping_status":"open","post_password":"","post_name":"sha-256","to_ping":"","pinged":"https:\/\/www.thedistributed.co\/what-is-a-51-attack-on-a-blockchain\/\nhttps:\/\/www.thedistributed.co\/what-is-distributed-ledger-technology\/\nhttps:\/\/www.thedistributed.co\/a-guide-to-cryptocurrency-mining\/","post_modified":"2022-07-31 23:20:17","post_modified_gmt":"2022-07-31 13:20:17","post_content_filtered":"","post_parent":0,"guid":"https:\/\/www.thedistributed.co\/?p=3401","menu_order":0,"post_type":"post","post_mime_type":"","comment_count":"0","filter":"raw"}],"next":false,"total_page":false},"paged":1,"class":"jblog_block_13"};
Securing Hashing Algorithm 256 (SHA-256) is the hashing algorithm used to secure blockchains such as Bitcoin, where the hashing function<\/a> emits a 256-bit wide output. <\/p>\n\n\n\n The hashing algorithm is responsible for wallet address creation and management along with the verification of transactions on the blockchain ledger<\/a> through mining<\/a>. ((Bitcoin Wiki - SHA-256<\/a>))<\/p>\n\n\n\n SHA-256 is a variant of the SHA-2, which was initially developed by the National Security Agency.((Federal Register - Announcing Approval of Federal Information Processing Standard (FIPS) 180-2, Secure Hash Standard; a Revision of FIPS 180-1<\/a>)) This means that the inner workings of the algorithm aren't known to the public as it protects sensitive information belonging to the United States. <\/p>\n\n\n\n It is practically impossible to reveal the initial data from a hash value as they are only one-way functions. <\/p>\n\n\n\n Bitcoin utilizes a double SHA-256, meaning once they get the initial hash from the data, it is hashed once again - this creates an insurmountable amount of possible hashes basically eliminating the chance of a brute-force attack<\/a> as it would take 2^256 attempts to generate the initial data,((N-able - SHA-256 Algorithm Overview<\/a>)) more than the number of atoms in the universe.<\/p>\n","post_title":"SHA-256","post_excerpt":"","post_status":"publish","comment_status":"closed","ping_status":"open","post_password":"","post_name":"sha-256","to_ping":"","pinged":"https:\/\/www.thedistributed.co\/what-is-a-51-attack-on-a-blockchain\/\nhttps:\/\/www.thedistributed.co\/what-is-distributed-ledger-technology\/\nhttps:\/\/www.thedistributed.co\/a-guide-to-cryptocurrency-mining\/","post_modified":"2022-07-31 23:20:17","post_modified_gmt":"2022-07-31 13:20:17","post_content_filtered":"","post_parent":0,"guid":"https:\/\/www.thedistributed.co\/?p=3401","menu_order":0,"post_type":"post","post_mime_type":"","comment_count":"0","filter":"raw"}],"next":false,"total_page":false},"paged":1,"class":"jblog_block_13"};
Securing Hashing Algorithm 256 (SHA-256) is the hashing algorithm used to secure blockchains such as Bitcoin, where the hashing function<\/a> emits a 256-bit wide output. <\/p>\n\n\n\n The hashing algorithm is responsible for wallet address creation and management along with the verification of transactions on the blockchain ledger<\/a> through mining<\/a>. ((Bitcoin Wiki - SHA-256<\/a>))<\/p>\n\n\n\n SHA-256 is a variant of the SHA-2, which was initially developed by the National Security Agency.((Federal Register - Announcing Approval of Federal Information Processing Standard (FIPS) 180-2, Secure Hash Standard; a Revision of FIPS 180-1<\/a>)) This means that the inner workings of the algorithm aren't known to the public as it protects sensitive information belonging to the United States. <\/p>\n\n\n\n It is practically impossible to reveal the initial data from a hash value as they are only one-way functions. <\/p>\n\n\n\n Bitcoin utilizes a double SHA-256, meaning once they get the initial hash from the data, it is hashed once again - this creates an insurmountable amount of possible hashes basically eliminating the chance of a brute-force attack<\/a> as it would take 2^256 attempts to generate the initial data,((N-able - SHA-256 Algorithm Overview<\/a>)) more than the number of atoms in the universe.<\/p>\n","post_title":"SHA-256","post_excerpt":"","post_status":"publish","comment_status":"closed","ping_status":"open","post_password":"","post_name":"sha-256","to_ping":"","pinged":"https:\/\/www.thedistributed.co\/what-is-a-51-attack-on-a-blockchain\/\nhttps:\/\/www.thedistributed.co\/what-is-distributed-ledger-technology\/\nhttps:\/\/www.thedistributed.co\/a-guide-to-cryptocurrency-mining\/","post_modified":"2022-07-31 23:20:17","post_modified_gmt":"2022-07-31 13:20:17","post_content_filtered":"","post_parent":0,"guid":"https:\/\/www.thedistributed.co\/?p=3401","menu_order":0,"post_type":"post","post_mime_type":"","comment_count":"0","filter":"raw"}],"next":false,"total_page":false},"paged":1,"class":"jblog_block_13"};
Hashrate is also a metric that can measure the profitability of miners. For a single mining device having a high hashrate means that you'll increase your compensation for the work you put in, giving you a better reward.<\/p>\n","post_title":"Mining Hashrate Explained","post_excerpt":"","post_status":"publish","comment_status":"closed","ping_status":"open","post_password":"","post_name":"mining-hashrate","to_ping":"","pinged":"https:\/\/www.thedistributed.co\/what-is-a-51-attack-on-a-blockchain\/\nhttps:\/\/www.thedistributed.co\/what-are-nodes\/\nhttps:\/\/www.thedistributed.co\/what-is-distributed-ledger-technology\/","post_modified":"2022-06-02 22:17:31","post_modified_gmt":"2022-06-02 12:17:31","post_content_filtered":"","post_parent":0,"guid":"https:\/\/www.thedistributed.co\/?p=3471","menu_order":0,"post_type":"post","post_mime_type":"","comment_count":"0","filter":"raw"},{"ID":3401,"post_author":"1","post_date":"2022-02-07 19:10:06","post_date_gmt":"2022-02-07 08:10:06","post_content":"\n Securing Hashing Algorithm 256 (SHA-256) is the hashing algorithm used to secure blockchains such as Bitcoin, where the hashing function<\/a> emits a 256-bit wide output. <\/p>\n\n\n\n The hashing algorithm is responsible for wallet address creation and management along with the verification of transactions on the blockchain ledger<\/a> through mining<\/a>. ((Bitcoin Wiki - SHA-256<\/a>))<\/p>\n\n\n\n SHA-256 is a variant of the SHA-2, which was initially developed by the National Security Agency.((Federal Register - Announcing Approval of Federal Information Processing Standard (FIPS) 180-2, Secure Hash Standard; a Revision of FIPS 180-1<\/a>)) This means that the inner workings of the algorithm aren't known to the public as it protects sensitive information belonging to the United States. <\/p>\n\n\n\n It is practically impossible to reveal the initial data from a hash value as they are only one-way functions. <\/p>\n\n\n\n Bitcoin utilizes a double SHA-256, meaning once they get the initial hash from the data, it is hashed once again - this creates an insurmountable amount of possible hashes basically eliminating the chance of a brute-force attack<\/a> as it would take 2^256 attempts to generate the initial data,((N-able - SHA-256 Algorithm Overview<\/a>)) more than the number of atoms in the universe.<\/p>\n","post_title":"SHA-256","post_excerpt":"","post_status":"publish","comment_status":"closed","ping_status":"open","post_password":"","post_name":"sha-256","to_ping":"","pinged":"https:\/\/www.thedistributed.co\/what-is-a-51-attack-on-a-blockchain\/\nhttps:\/\/www.thedistributed.co\/what-is-distributed-ledger-technology\/\nhttps:\/\/www.thedistributed.co\/a-guide-to-cryptocurrency-mining\/","post_modified":"2022-07-31 23:20:17","post_modified_gmt":"2022-07-31 13:20:17","post_content_filtered":"","post_parent":0,"guid":"https:\/\/www.thedistributed.co\/?p=3401","menu_order":0,"post_type":"post","post_mime_type":"","comment_count":"0","filter":"raw"}],"next":false,"total_page":false},"paged":1,"class":"jblog_block_13"};
Hashrate can measure the health and security of a network against potential attackers. Having a higher hashrate means a 51% attack<\/a> is unlikely due to the high amount of computational power needed. The more computational power or nodes<\/a> within a network, the more secure it is.<\/p>\n\n\n\n Hashrate is also a metric that can measure the profitability of miners. For a single mining device having a high hashrate means that you'll increase your compensation for the work you put in, giving you a better reward.<\/p>\n","post_title":"Mining Hashrate Explained","post_excerpt":"","post_status":"publish","comment_status":"closed","ping_status":"open","post_password":"","post_name":"mining-hashrate","to_ping":"","pinged":"https:\/\/www.thedistributed.co\/what-is-a-51-attack-on-a-blockchain\/\nhttps:\/\/www.thedistributed.co\/what-are-nodes\/\nhttps:\/\/www.thedistributed.co\/what-is-distributed-ledger-technology\/","post_modified":"2022-06-02 22:17:31","post_modified_gmt":"2022-06-02 12:17:31","post_content_filtered":"","post_parent":0,"guid":"https:\/\/www.thedistributed.co\/?p=3471","menu_order":0,"post_type":"post","post_mime_type":"","comment_count":"0","filter":"raw"},{"ID":3401,"post_author":"1","post_date":"2022-02-07 19:10:06","post_date_gmt":"2022-02-07 08:10:06","post_content":"\n Securing Hashing Algorithm 256 (SHA-256) is the hashing algorithm used to secure blockchains such as Bitcoin, where the hashing function<\/a> emits a 256-bit wide output. <\/p>\n\n\n\n The hashing algorithm is responsible for wallet address creation and management along with the verification of transactions on the blockchain ledger<\/a> through mining<\/a>. ((Bitcoin Wiki - SHA-256<\/a>))<\/p>\n\n\n\n SHA-256 is a variant of the SHA-2, which was initially developed by the National Security Agency.((Federal Register - Announcing Approval of Federal Information Processing Standard (FIPS) 180-2, Secure Hash Standard; a Revision of FIPS 180-1<\/a>)) This means that the inner workings of the algorithm aren't known to the public as it protects sensitive information belonging to the United States. <\/p>\n\n\n\n It is practically impossible to reveal the initial data from a hash value as they are only one-way functions. <\/p>\n\n\n\n Bitcoin utilizes a double SHA-256, meaning once they get the initial hash from the data, it is hashed once again - this creates an insurmountable amount of possible hashes basically eliminating the chance of a brute-force attack<\/a> as it would take 2^256 attempts to generate the initial data,((N-able - SHA-256 Algorithm Overview<\/a>)) more than the number of atoms in the universe.<\/p>\n","post_title":"SHA-256","post_excerpt":"","post_status":"publish","comment_status":"closed","ping_status":"open","post_password":"","post_name":"sha-256","to_ping":"","pinged":"https:\/\/www.thedistributed.co\/what-is-a-51-attack-on-a-blockchain\/\nhttps:\/\/www.thedistributed.co\/what-is-distributed-ledger-technology\/\nhttps:\/\/www.thedistributed.co\/a-guide-to-cryptocurrency-mining\/","post_modified":"2022-07-31 23:20:17","post_modified_gmt":"2022-07-31 13:20:17","post_content_filtered":"","post_parent":0,"guid":"https:\/\/www.thedistributed.co\/?p=3401","menu_order":0,"post_type":"post","post_mime_type":"","comment_count":"0","filter":"raw"}],"next":false,"total_page":false},"paged":1,"class":"jblog_block_13"};
Hashrate can measure the health and security of a network against potential attackers. Having a higher hashrate means a 51% attack<\/a> is unlikely due to the high amount of computational power needed. The more computational power or nodes<\/a> within a network, the more secure it is.<\/p>\n\n\n\n Hashrate is also a metric that can measure the profitability of miners. For a single mining device having a high hashrate means that you'll increase your compensation for the work you put in, giving you a better reward.<\/p>\n","post_title":"Mining Hashrate Explained","post_excerpt":"","post_status":"publish","comment_status":"closed","ping_status":"open","post_password":"","post_name":"mining-hashrate","to_ping":"","pinged":"https:\/\/www.thedistributed.co\/what-is-a-51-attack-on-a-blockchain\/\nhttps:\/\/www.thedistributed.co\/what-are-nodes\/\nhttps:\/\/www.thedistributed.co\/what-is-distributed-ledger-technology\/","post_modified":"2022-06-02 22:17:31","post_modified_gmt":"2022-06-02 12:17:31","post_content_filtered":"","post_parent":0,"guid":"https:\/\/www.thedistributed.co\/?p=3471","menu_order":0,"post_type":"post","post_mime_type":"","comment_count":"0","filter":"raw"},{"ID":3401,"post_author":"1","post_date":"2022-02-07 19:10:06","post_date_gmt":"2022-02-07 08:10:06","post_content":"\n Securing Hashing Algorithm 256 (SHA-256) is the hashing algorithm used to secure blockchains such as Bitcoin, where the hashing function<\/a> emits a 256-bit wide output. <\/p>\n\n\n\n The hashing algorithm is responsible for wallet address creation and management along with the verification of transactions on the blockchain ledger<\/a> through mining<\/a>. ((Bitcoin Wiki - SHA-256<\/a>))<\/p>\n\n\n\n SHA-256 is a variant of the SHA-2, which was initially developed by the National Security Agency.((Federal Register - Announcing Approval of Federal Information Processing Standard (FIPS) 180-2, Secure Hash Standard; a Revision of FIPS 180-1<\/a>)) This means that the inner workings of the algorithm aren't known to the public as it protects sensitive information belonging to the United States. <\/p>\n\n\n\n It is practically impossible to reveal the initial data from a hash value as they are only one-way functions. <\/p>\n\n\n\n Bitcoin utilizes a double SHA-256, meaning once they get the initial hash from the data, it is hashed once again - this creates an insurmountable amount of possible hashes basically eliminating the chance of a brute-force attack<\/a> as it would take 2^256 attempts to generate the initial data,((N-able - SHA-256 Algorithm Overview<\/a>)) more than the number of atoms in the universe.<\/p>\n","post_title":"SHA-256","post_excerpt":"","post_status":"publish","comment_status":"closed","ping_status":"open","post_password":"","post_name":"sha-256","to_ping":"","pinged":"https:\/\/www.thedistributed.co\/what-is-a-51-attack-on-a-blockchain\/\nhttps:\/\/www.thedistributed.co\/what-is-distributed-ledger-technology\/\nhttps:\/\/www.thedistributed.co\/a-guide-to-cryptocurrency-mining\/","post_modified":"2022-07-31 23:20:17","post_modified_gmt":"2022-07-31 13:20:17","post_content_filtered":"","post_parent":0,"guid":"https:\/\/www.thedistributed.co\/?p=3401","menu_order":0,"post_type":"post","post_mime_type":"","comment_count":"0","filter":"raw"}],"next":false,"total_page":false},"paged":1,"class":"jblog_block_13"};
The hashrate of a network refers to the hash rates of all miners<\/a> on a specific network.<\/p>\n\n\n\n Hashrate can measure the health and security of a network against potential attackers. Having a higher hashrate means a 51% attack<\/a> is unlikely due to the high amount of computational power needed. The more computational power or nodes<\/a> within a network, the more secure it is.<\/p>\n\n\n\n Hashrate is also a metric that can measure the profitability of miners. For a single mining device having a high hashrate means that you'll increase your compensation for the work you put in, giving you a better reward.<\/p>\n","post_title":"Mining Hashrate Explained","post_excerpt":"","post_status":"publish","comment_status":"closed","ping_status":"open","post_password":"","post_name":"mining-hashrate","to_ping":"","pinged":"https:\/\/www.thedistributed.co\/what-is-a-51-attack-on-a-blockchain\/\nhttps:\/\/www.thedistributed.co\/what-are-nodes\/\nhttps:\/\/www.thedistributed.co\/what-is-distributed-ledger-technology\/","post_modified":"2022-06-02 22:17:31","post_modified_gmt":"2022-06-02 12:17:31","post_content_filtered":"","post_parent":0,"guid":"https:\/\/www.thedistributed.co\/?p=3471","menu_order":0,"post_type":"post","post_mime_type":"","comment_count":"0","filter":"raw"},{"ID":3401,"post_author":"1","post_date":"2022-02-07 19:10:06","post_date_gmt":"2022-02-07 08:10:06","post_content":"\n Securing Hashing Algorithm 256 (SHA-256) is the hashing algorithm used to secure blockchains such as Bitcoin, where the hashing function<\/a> emits a 256-bit wide output. <\/p>\n\n\n\n The hashing algorithm is responsible for wallet address creation and management along with the verification of transactions on the blockchain ledger<\/a> through mining<\/a>. ((Bitcoin Wiki - SHA-256<\/a>))<\/p>\n\n\n\n SHA-256 is a variant of the SHA-2, which was initially developed by the National Security Agency.((Federal Register - Announcing Approval of Federal Information Processing Standard (FIPS) 180-2, Secure Hash Standard; a Revision of FIPS 180-1<\/a>)) This means that the inner workings of the algorithm aren't known to the public as it protects sensitive information belonging to the United States. <\/p>\n\n\n\n It is practically impossible to reveal the initial data from a hash value as they are only one-way functions. <\/p>\n\n\n\n Bitcoin utilizes a double SHA-256, meaning once they get the initial hash from the data, it is hashed once again - this creates an insurmountable amount of possible hashes basically eliminating the chance of a brute-force attack<\/a> as it would take 2^256 attempts to generate the initial data,((N-able - SHA-256 Algorithm Overview<\/a>)) more than the number of atoms in the universe.<\/p>\n","post_title":"SHA-256","post_excerpt":"","post_status":"publish","comment_status":"closed","ping_status":"open","post_password":"","post_name":"sha-256","to_ping":"","pinged":"https:\/\/www.thedistributed.co\/what-is-a-51-attack-on-a-blockchain\/\nhttps:\/\/www.thedistributed.co\/what-is-distributed-ledger-technology\/\nhttps:\/\/www.thedistributed.co\/a-guide-to-cryptocurrency-mining\/","post_modified":"2022-07-31 23:20:17","post_modified_gmt":"2022-07-31 13:20:17","post_content_filtered":"","post_parent":0,"guid":"https:\/\/www.thedistributed.co\/?p=3401","menu_order":0,"post_type":"post","post_mime_type":"","comment_count":"0","filter":"raw"}],"next":false,"total_page":false},"paged":1,"class":"jblog_block_13"};
The hashrate of a miner<\/a> refers to the number calculations a rig can solve per second, known as a hash. <\/p>\n\n\n\n The hashrate of a network refers to the hash rates of all miners<\/a> on a specific network.<\/p>\n\n\n\n Hashrate can measure the health and security of a network against potential attackers. Having a higher hashrate means a 51% attack<\/a> is unlikely due to the high amount of computational power needed. The more computational power or nodes<\/a> within a network, the more secure it is.<\/p>\n\n\n\n Hashrate is also a metric that can measure the profitability of miners. For a single mining device having a high hashrate means that you'll increase your compensation for the work you put in, giving you a better reward.<\/p>\n","post_title":"Mining Hashrate Explained","post_excerpt":"","post_status":"publish","comment_status":"closed","ping_status":"open","post_password":"","post_name":"mining-hashrate","to_ping":"","pinged":"https:\/\/www.thedistributed.co\/what-is-a-51-attack-on-a-blockchain\/\nhttps:\/\/www.thedistributed.co\/what-are-nodes\/\nhttps:\/\/www.thedistributed.co\/what-is-distributed-ledger-technology\/","post_modified":"2022-06-02 22:17:31","post_modified_gmt":"2022-06-02 12:17:31","post_content_filtered":"","post_parent":0,"guid":"https:\/\/www.thedistributed.co\/?p=3471","menu_order":0,"post_type":"post","post_mime_type":"","comment_count":"0","filter":"raw"},{"ID":3401,"post_author":"1","post_date":"2022-02-07 19:10:06","post_date_gmt":"2022-02-07 08:10:06","post_content":"\n Securing Hashing Algorithm 256 (SHA-256) is the hashing algorithm used to secure blockchains such as Bitcoin, where the hashing function<\/a> emits a 256-bit wide output. <\/p>\n\n\n\n The hashing algorithm is responsible for wallet address creation and management along with the verification of transactions on the blockchain ledger<\/a> through mining<\/a>. ((Bitcoin Wiki - SHA-256<\/a>))<\/p>\n\n\n\n SHA-256 is a variant of the SHA-2, which was initially developed by the National Security Agency.((Federal Register - Announcing Approval of Federal Information Processing Standard (FIPS) 180-2, Secure Hash Standard; a Revision of FIPS 180-1<\/a>)) This means that the inner workings of the algorithm aren't known to the public as it protects sensitive information belonging to the United States. <\/p>\n\n\n\n It is practically impossible to reveal the initial data from a hash value as they are only one-way functions. <\/p>\n\n\n\n Bitcoin utilizes a double SHA-256, meaning once they get the initial hash from the data, it is hashed once again - this creates an insurmountable amount of possible hashes basically eliminating the chance of a brute-force attack<\/a> as it would take 2^256 attempts to generate the initial data,((N-able - SHA-256 Algorithm Overview<\/a>)) more than the number of atoms in the universe.<\/p>\n","post_title":"SHA-256","post_excerpt":"","post_status":"publish","comment_status":"closed","ping_status":"open","post_password":"","post_name":"sha-256","to_ping":"","pinged":"https:\/\/www.thedistributed.co\/what-is-a-51-attack-on-a-blockchain\/\nhttps:\/\/www.thedistributed.co\/what-is-distributed-ledger-technology\/\nhttps:\/\/www.thedistributed.co\/a-guide-to-cryptocurrency-mining\/","post_modified":"2022-07-31 23:20:17","post_modified_gmt":"2022-07-31 13:20:17","post_content_filtered":"","post_parent":0,"guid":"https:\/\/www.thedistributed.co\/?p=3401","menu_order":0,"post_type":"post","post_mime_type":"","comment_count":"0","filter":"raw"}],"next":false,"total_page":false},"paged":1,"class":"jblog_block_13"};
A mining hashrate is the amount of processing power a miner or network has to process transactions onto a blockchains ledger<\/a>.<\/p>\n\n\n\n The hashrate of a miner<\/a> refers to the number calculations a rig can solve per second, known as a hash. <\/p>\n\n\n\n The hashrate of a network refers to the hash rates of all miners<\/a> on a specific network.<\/p>\n\n\n\n Hashrate can measure the health and security of a network against potential attackers. Having a higher hashrate means a 51% attack<\/a> is unlikely due to the high amount of computational power needed. The more computational power or nodes<\/a> within a network, the more secure it is.<\/p>\n\n\n\n Hashrate is also a metric that can measure the profitability of miners. For a single mining device having a high hashrate means that you'll increase your compensation for the work you put in, giving you a better reward.<\/p>\n","post_title":"Mining Hashrate Explained","post_excerpt":"","post_status":"publish","comment_status":"closed","ping_status":"open","post_password":"","post_name":"mining-hashrate","to_ping":"","pinged":"https:\/\/www.thedistributed.co\/what-is-a-51-attack-on-a-blockchain\/\nhttps:\/\/www.thedistributed.co\/what-are-nodes\/\nhttps:\/\/www.thedistributed.co\/what-is-distributed-ledger-technology\/","post_modified":"2022-06-02 22:17:31","post_modified_gmt":"2022-06-02 12:17:31","post_content_filtered":"","post_parent":0,"guid":"https:\/\/www.thedistributed.co\/?p=3471","menu_order":0,"post_type":"post","post_mime_type":"","comment_count":"0","filter":"raw"},{"ID":3401,"post_author":"1","post_date":"2022-02-07 19:10:06","post_date_gmt":"2022-02-07 08:10:06","post_content":"\n Securing Hashing Algorithm 256 (SHA-256) is the hashing algorithm used to secure blockchains such as Bitcoin, where the hashing function<\/a> emits a 256-bit wide output. <\/p>\n\n\n\n The hashing algorithm is responsible for wallet address creation and management along with the verification of transactions on the blockchain ledger<\/a> through mining<\/a>. ((Bitcoin Wiki - SHA-256<\/a>))<\/p>\n\n\n\n SHA-256 is a variant of the SHA-2, which was initially developed by the National Security Agency.((Federal Register - Announcing Approval of Federal Information Processing Standard (FIPS) 180-2, Secure Hash Standard; a Revision of FIPS 180-1<\/a>)) This means that the inner workings of the algorithm aren't known to the public as it protects sensitive information belonging to the United States. <\/p>\n\n\n\n It is practically impossible to reveal the initial data from a hash value as they are only one-way functions. <\/p>\n\n\n\n Bitcoin utilizes a double SHA-256, meaning once they get the initial hash from the data, it is hashed once again - this creates an insurmountable amount of possible hashes basically eliminating the chance of a brute-force attack<\/a> as it would take 2^256 attempts to generate the initial data,((N-able - SHA-256 Algorithm Overview<\/a>)) more than the number of atoms in the universe.<\/p>\n","post_title":"SHA-256","post_excerpt":"","post_status":"publish","comment_status":"closed","ping_status":"open","post_password":"","post_name":"sha-256","to_ping":"","pinged":"https:\/\/www.thedistributed.co\/what-is-a-51-attack-on-a-blockchain\/\nhttps:\/\/www.thedistributed.co\/what-is-distributed-ledger-technology\/\nhttps:\/\/www.thedistributed.co\/a-guide-to-cryptocurrency-mining\/","post_modified":"2022-07-31 23:20:17","post_modified_gmt":"2022-07-31 13:20:17","post_content_filtered":"","post_parent":0,"guid":"https:\/\/www.thedistributed.co\/?p=3401","menu_order":0,"post_type":"post","post_mime_type":"","comment_count":"0","filter":"raw"}],"next":false,"total_page":false},"paged":1,"class":"jblog_block_13"};
The previous candidate block has now become a confirmed block. The miners now move on to the next block. The miners whose candidate blocks weren't successful discard it and repeat the process in hopes of having the next confirmed block.<\/p>\n","post_title":"Cryptocurrency Mining","post_excerpt":"","post_status":"publish","comment_status":"closed","ping_status":"open","post_password":"","post_name":"cryptocurrency-mining","to_ping":"","pinged":"https:\/\/www.thedistributed.co\/what-are-nodes\/\nhttps:\/\/www.thedistributed.co\/what-is-a-cryptographic-nonce-a-number-only-used-once\/\nhttps:\/\/www.thedistributed.co\/what-is-a-mining-hashrate\/\nhttps:\/\/www.thedistributed.co\/what-is-a-mempool-cryptocurrency-memory-pool\/\nhttps:\/\/www.thedistributed.co\/what-is-a-blockchain-protocol\/\nhttps:\/\/www.thedistributed.co\/what-is-distributed-ledger-technology\/","post_modified":"2022-07-25 00:47:38","post_modified_gmt":"2022-07-24 14:47:38","post_content_filtered":"","post_parent":0,"guid":"https:\/\/www.thedistributed.co\/?p=3527","menu_order":0,"post_type":"post","post_mime_type":"","comment_count":"0","filter":"raw"},{"ID":3471,"post_author":"1","post_date":"2022-02-15 20:49:02","post_date_gmt":"2022-02-15 09:49:02","post_content":"\n A mining hashrate is the amount of processing power a miner or network has to process transactions onto a blockchains ledger<\/a>.<\/p>\n\n\n\n The hashrate of a miner<\/a> refers to the number calculations a rig can solve per second, known as a hash. <\/p>\n\n\n\n The hashrate of a network refers to the hash rates of all miners<\/a> on a specific network.<\/p>\n\n\n\n Hashrate can measure the health and security of a network against potential attackers. Having a higher hashrate means a 51% attack<\/a> is unlikely due to the high amount of computational power needed. The more computational power or nodes<\/a> within a network, the more secure it is.<\/p>\n\n\n\n Hashrate is also a metric that can measure the profitability of miners. For a single mining device having a high hashrate means that you'll increase your compensation for the work you put in, giving you a better reward.<\/p>\n","post_title":"Mining Hashrate Explained","post_excerpt":"","post_status":"publish","comment_status":"closed","ping_status":"open","post_password":"","post_name":"mining-hashrate","to_ping":"","pinged":"https:\/\/www.thedistributed.co\/what-is-a-51-attack-on-a-blockchain\/\nhttps:\/\/www.thedistributed.co\/what-are-nodes\/\nhttps:\/\/www.thedistributed.co\/what-is-distributed-ledger-technology\/","post_modified":"2022-06-02 22:17:31","post_modified_gmt":"2022-06-02 12:17:31","post_content_filtered":"","post_parent":0,"guid":"https:\/\/www.thedistributed.co\/?p=3471","menu_order":0,"post_type":"post","post_mime_type":"","comment_count":"0","filter":"raw"},{"ID":3401,"post_author":"1","post_date":"2022-02-07 19:10:06","post_date_gmt":"2022-02-07 08:10:06","post_content":"\n Securing Hashing Algorithm 256 (SHA-256) is the hashing algorithm used to secure blockchains such as Bitcoin, where the hashing function<\/a> emits a 256-bit wide output. <\/p>\n\n\n\n The hashing algorithm is responsible for wallet address creation and management along with the verification of transactions on the blockchain ledger<\/a> through mining<\/a>. ((Bitcoin Wiki - SHA-256<\/a>))<\/p>\n\n\n\n SHA-256 is a variant of the SHA-2, which was initially developed by the National Security Agency.((Federal Register - Announcing Approval of Federal Information Processing Standard (FIPS) 180-2, Secure Hash Standard; a Revision of FIPS 180-1<\/a>)) This means that the inner workings of the algorithm aren't known to the public as it protects sensitive information belonging to the United States. <\/p>\n\n\n\n It is practically impossible to reveal the initial data from a hash value as they are only one-way functions. <\/p>\n\n\n\n Bitcoin utilizes a double SHA-256, meaning once they get the initial hash from the data, it is hashed once again - this creates an insurmountable amount of possible hashes basically eliminating the chance of a brute-force attack<\/a> as it would take 2^256 attempts to generate the initial data,((N-able - SHA-256 Algorithm Overview<\/a>)) more than the number of atoms in the universe.<\/p>\n","post_title":"SHA-256","post_excerpt":"","post_status":"publish","comment_status":"closed","ping_status":"open","post_password":"","post_name":"sha-256","to_ping":"","pinged":"https:\/\/www.thedistributed.co\/what-is-a-51-attack-on-a-blockchain\/\nhttps:\/\/www.thedistributed.co\/what-is-distributed-ledger-technology\/\nhttps:\/\/www.thedistributed.co\/a-guide-to-cryptocurrency-mining\/","post_modified":"2022-07-31 23:20:17","post_modified_gmt":"2022-07-31 13:20:17","post_content_filtered":"","post_parent":0,"guid":"https:\/\/www.thedistributed.co\/?p=3401","menu_order":0,"post_type":"post","post_mime_type":"","comment_count":"0","filter":"raw"}],"next":false,"total_page":false},"paged":1,"class":"jblog_block_13"};
Once a miner finds a valid block hash, the miner who found it will broadcast it to the entire network of other miners\/nodes. The nodes will confirm that the block and its hash are valid. If they find it is valid, the block is added to their copy of the blockchain. <\/p>\n\n\n\n The previous candidate block has now become a confirmed block. The miners now move on to the next block. The miners whose candidate blocks weren't successful discard it and repeat the process in hopes of having the next confirmed block.<\/p>\n","post_title":"Cryptocurrency Mining","post_excerpt":"","post_status":"publish","comment_status":"closed","ping_status":"open","post_password":"","post_name":"cryptocurrency-mining","to_ping":"","pinged":"https:\/\/www.thedistributed.co\/what-are-nodes\/\nhttps:\/\/www.thedistributed.co\/what-is-a-cryptographic-nonce-a-number-only-used-once\/\nhttps:\/\/www.thedistributed.co\/what-is-a-mining-hashrate\/\nhttps:\/\/www.thedistributed.co\/what-is-a-mempool-cryptocurrency-memory-pool\/\nhttps:\/\/www.thedistributed.co\/what-is-a-blockchain-protocol\/\nhttps:\/\/www.thedistributed.co\/what-is-distributed-ledger-technology\/","post_modified":"2022-07-25 00:47:38","post_modified_gmt":"2022-07-24 14:47:38","post_content_filtered":"","post_parent":0,"guid":"https:\/\/www.thedistributed.co\/?p=3527","menu_order":0,"post_type":"post","post_mime_type":"","comment_count":"0","filter":"raw"},{"ID":3471,"post_author":"1","post_date":"2022-02-15 20:49:02","post_date_gmt":"2022-02-15 09:49:02","post_content":"\n A mining hashrate is the amount of processing power a miner or network has to process transactions onto a blockchains ledger<\/a>.<\/p>\n\n\n\n The hashrate of a miner<\/a> refers to the number calculations a rig can solve per second, known as a hash. <\/p>\n\n\n\n The hashrate of a network refers to the hash rates of all miners<\/a> on a specific network.<\/p>\n\n\n\n Hashrate can measure the health and security of a network against potential attackers. Having a higher hashrate means a 51% attack<\/a> is unlikely due to the high amount of computational power needed. The more computational power or nodes<\/a> within a network, the more secure it is.<\/p>\n\n\n\n Hashrate is also a metric that can measure the profitability of miners. For a single mining device having a high hashrate means that you'll increase your compensation for the work you put in, giving you a better reward.<\/p>\n","post_title":"Mining Hashrate Explained","post_excerpt":"","post_status":"publish","comment_status":"closed","ping_status":"open","post_password":"","post_name":"mining-hashrate","to_ping":"","pinged":"https:\/\/www.thedistributed.co\/what-is-a-51-attack-on-a-blockchain\/\nhttps:\/\/www.thedistributed.co\/what-are-nodes\/\nhttps:\/\/www.thedistributed.co\/what-is-distributed-ledger-technology\/","post_modified":"2022-06-02 22:17:31","post_modified_gmt":"2022-06-02 12:17:31","post_content_filtered":"","post_parent":0,"guid":"https:\/\/www.thedistributed.co\/?p=3471","menu_order":0,"post_type":"post","post_mime_type":"","comment_count":"0","filter":"raw"},{"ID":3401,"post_author":"1","post_date":"2022-02-07 19:10:06","post_date_gmt":"2022-02-07 08:10:06","post_content":"\n Securing Hashing Algorithm 256 (SHA-256) is the hashing algorithm used to secure blockchains such as Bitcoin, where the hashing function<\/a> emits a 256-bit wide output. <\/p>\n\n\n\n The hashing algorithm is responsible for wallet address creation and management along with the verification of transactions on the blockchain ledger<\/a> through mining<\/a>. ((Bitcoin Wiki - SHA-256<\/a>))<\/p>\n\n\n\n SHA-256 is a variant of the SHA-2, which was initially developed by the National Security Agency.((Federal Register - Announcing Approval of Federal Information Processing Standard (FIPS) 180-2, Secure Hash Standard; a Revision of FIPS 180-1<\/a>)) This means that the inner workings of the algorithm aren't known to the public as it protects sensitive information belonging to the United States. <\/p>\n\n\n\n It is practically impossible to reveal the initial data from a hash value as they are only one-way functions. <\/p>\n\n\n\n Bitcoin utilizes a double SHA-256, meaning once they get the initial hash from the data, it is hashed once again - this creates an insurmountable amount of possible hashes basically eliminating the chance of a brute-force attack<\/a> as it would take 2^256 attempts to generate the initial data,((N-able - SHA-256 Algorithm Overview<\/a>)) more than the number of atoms in the universe.<\/p>\n","post_title":"SHA-256","post_excerpt":"","post_status":"publish","comment_status":"closed","ping_status":"open","post_password":"","post_name":"sha-256","to_ping":"","pinged":"https:\/\/www.thedistributed.co\/what-is-a-51-attack-on-a-blockchain\/\nhttps:\/\/www.thedistributed.co\/what-is-distributed-ledger-technology\/\nhttps:\/\/www.thedistributed.co\/a-guide-to-cryptocurrency-mining\/","post_modified":"2022-07-31 23:20:17","post_modified_gmt":"2022-07-31 13:20:17","post_content_filtered":"","post_parent":0,"guid":"https:\/\/www.thedistributed.co\/?p=3401","menu_order":0,"post_type":"post","post_mime_type":"","comment_count":"0","filter":"raw"}],"next":false,"total_page":false},"paged":1,"class":"jblog_block_13"};
Once a miner finds a valid block hash, the miner who found it will broadcast it to the entire network of other miners\/nodes. The nodes will confirm that the block and its hash are valid. If they find it is valid, the block is added to their copy of the blockchain. <\/p>\n\n\n\n The previous candidate block has now become a confirmed block. The miners now move on to the next block. The miners whose candidate blocks weren't successful discard it and repeat the process in hopes of having the next confirmed block.<\/p>\n","post_title":"Cryptocurrency Mining","post_excerpt":"","post_status":"publish","comment_status":"closed","ping_status":"open","post_password":"","post_name":"cryptocurrency-mining","to_ping":"","pinged":"https:\/\/www.thedistributed.co\/what-are-nodes\/\nhttps:\/\/www.thedistributed.co\/what-is-a-cryptographic-nonce-a-number-only-used-once\/\nhttps:\/\/www.thedistributed.co\/what-is-a-mining-hashrate\/\nhttps:\/\/www.thedistributed.co\/what-is-a-mempool-cryptocurrency-memory-pool\/\nhttps:\/\/www.thedistributed.co\/what-is-a-blockchain-protocol\/\nhttps:\/\/www.thedistributed.co\/what-is-distributed-ledger-technology\/","post_modified":"2022-07-25 00:47:38","post_modified_gmt":"2022-07-24 14:47:38","post_content_filtered":"","post_parent":0,"guid":"https:\/\/www.thedistributed.co\/?p=3527","menu_order":0,"post_type":"post","post_mime_type":"","comment_count":"0","filter":"raw"},{"ID":3471,"post_author":"1","post_date":"2022-02-15 20:49:02","post_date_gmt":"2022-02-15 09:49:02","post_content":"\n A mining hashrate is the amount of processing power a miner or network has to process transactions onto a blockchains ledger<\/a>.<\/p>\n\n\n\n The hashrate of a miner<\/a> refers to the number calculations a rig can solve per second, known as a hash. <\/p>\n\n\n\n The hashrate of a network refers to the hash rates of all miners<\/a> on a specific network.<\/p>\n\n\n\n Hashrate can measure the health and security of a network against potential attackers. Having a higher hashrate means a 51% attack<\/a> is unlikely due to the high amount of computational power needed. The more computational power or nodes<\/a> within a network, the more secure it is.<\/p>\n\n\n\n Hashrate is also a metric that can measure the profitability of miners. For a single mining device having a high hashrate means that you'll increase your compensation for the work you put in, giving you a better reward.<\/p>\n","post_title":"Mining Hashrate Explained","post_excerpt":"","post_status":"publish","comment_status":"closed","ping_status":"open","post_password":"","post_name":"mining-hashrate","to_ping":"","pinged":"https:\/\/www.thedistributed.co\/what-is-a-51-attack-on-a-blockchain\/\nhttps:\/\/www.thedistributed.co\/what-are-nodes\/\nhttps:\/\/www.thedistributed.co\/what-is-distributed-ledger-technology\/","post_modified":"2022-06-02 22:17:31","post_modified_gmt":"2022-06-02 12:17:31","post_content_filtered":"","post_parent":0,"guid":"https:\/\/www.thedistributed.co\/?p=3471","menu_order":0,"post_type":"post","post_mime_type":"","comment_count":"0","filter":"raw"},{"ID":3401,"post_author":"1","post_date":"2022-02-07 19:10:06","post_date_gmt":"2022-02-07 08:10:06","post_content":"\n Securing Hashing Algorithm 256 (SHA-256) is the hashing algorithm used to secure blockchains such as Bitcoin, where the hashing function<\/a> emits a 256-bit wide output. <\/p>\n\n\n\n The hashing algorithm is responsible for wallet address creation and management along with the verification of transactions on the blockchain ledger<\/a> through mining<\/a>. ((Bitcoin Wiki - SHA-256<\/a>))<\/p>\n\n\n\n SHA-256 is a variant of the SHA-2, which was initially developed by the National Security Agency.((Federal Register - Announcing Approval of Federal Information Processing Standard (FIPS) 180-2, Secure Hash Standard; a Revision of FIPS 180-1<\/a>)) This means that the inner workings of the algorithm aren't known to the public as it protects sensitive information belonging to the United States. <\/p>\n\n\n\n It is practically impossible to reveal the initial data from a hash value as they are only one-way functions. <\/p>\n\n\n\n Bitcoin utilizes a double SHA-256, meaning once they get the initial hash from the data, it is hashed once again - this creates an insurmountable amount of possible hashes basically eliminating the chance of a brute-force attack<\/a> as it would take 2^256 attempts to generate the initial data,((N-able - SHA-256 Algorithm Overview<\/a>)) more than the number of atoms in the universe.<\/p>\n","post_title":"SHA-256","post_excerpt":"","post_status":"publish","comment_status":"closed","ping_status":"open","post_password":"","post_name":"sha-256","to_ping":"","pinged":"https:\/\/www.thedistributed.co\/what-is-a-51-attack-on-a-blockchain\/\nhttps:\/\/www.thedistributed.co\/what-is-distributed-ledger-technology\/\nhttps:\/\/www.thedistributed.co\/a-guide-to-cryptocurrency-mining\/","post_modified":"2022-07-31 23:20:17","post_modified_gmt":"2022-07-31 13:20:17","post_content_filtered":"","post_parent":0,"guid":"https:\/\/www.thedistributed.co\/?p=3401","menu_order":0,"post_type":"post","post_mime_type":"","comment_count":"0","filter":"raw"}],"next":false,"total_page":false},"paged":1,"class":"jblog_block_13"};
This means as more miners join the network the hashing difficulty gets harder. Likewise, if miners leave the hashing difficulty is easier. Allowing for a steady flow of blocks being mined.<\/p>\n\n\n\n Once a miner finds a valid block hash, the miner who found it will broadcast it to the entire network of other miners\/nodes. The nodes will confirm that the block and its hash are valid. If they find it is valid, the block is added to their copy of the blockchain. <\/p>\n\n\n\n The previous candidate block has now become a confirmed block. The miners now move on to the next block. The miners whose candidate blocks weren't successful discard it and repeat the process in hopes of having the next confirmed block.<\/p>\n","post_title":"Cryptocurrency Mining","post_excerpt":"","post_status":"publish","comment_status":"closed","ping_status":"open","post_password":"","post_name":"cryptocurrency-mining","to_ping":"","pinged":"https:\/\/www.thedistributed.co\/what-are-nodes\/\nhttps:\/\/www.thedistributed.co\/what-is-a-cryptographic-nonce-a-number-only-used-once\/\nhttps:\/\/www.thedistributed.co\/what-is-a-mining-hashrate\/\nhttps:\/\/www.thedistributed.co\/what-is-a-mempool-cryptocurrency-memory-pool\/\nhttps:\/\/www.thedistributed.co\/what-is-a-blockchain-protocol\/\nhttps:\/\/www.thedistributed.co\/what-is-distributed-ledger-technology\/","post_modified":"2022-07-25 00:47:38","post_modified_gmt":"2022-07-24 14:47:38","post_content_filtered":"","post_parent":0,"guid":"https:\/\/www.thedistributed.co\/?p=3527","menu_order":0,"post_type":"post","post_mime_type":"","comment_count":"0","filter":"raw"},{"ID":3471,"post_author":"1","post_date":"2022-02-15 20:49:02","post_date_gmt":"2022-02-15 09:49:02","post_content":"\n A mining hashrate is the amount of processing power a miner or network has to process transactions onto a blockchains ledger<\/a>.<\/p>\n\n\n\n The hashrate of a miner<\/a> refers to the number calculations a rig can solve per second, known as a hash. <\/p>\n\n\n\n The hashrate of a network refers to the hash rates of all miners<\/a> on a specific network.<\/p>\n\n\n\n Hashrate can measure the health and security of a network against potential attackers. Having a higher hashrate means a 51% attack<\/a> is unlikely due to the high amount of computational power needed. The more computational power or nodes<\/a> within a network, the more secure it is.<\/p>\n\n\n\n Hashrate is also a metric that can measure the profitability of miners. For a single mining device having a high hashrate means that you'll increase your compensation for the work you put in, giving you a better reward.<\/p>\n","post_title":"Mining Hashrate Explained","post_excerpt":"","post_status":"publish","comment_status":"closed","ping_status":"open","post_password":"","post_name":"mining-hashrate","to_ping":"","pinged":"https:\/\/www.thedistributed.co\/what-is-a-51-attack-on-a-blockchain\/\nhttps:\/\/www.thedistributed.co\/what-are-nodes\/\nhttps:\/\/www.thedistributed.co\/what-is-distributed-ledger-technology\/","post_modified":"2022-06-02 22:17:31","post_modified_gmt":"2022-06-02 12:17:31","post_content_filtered":"","post_parent":0,"guid":"https:\/\/www.thedistributed.co\/?p=3471","menu_order":0,"post_type":"post","post_mime_type":"","comment_count":"0","filter":"raw"},{"ID":3401,"post_author":"1","post_date":"2022-02-07 19:10:06","post_date_gmt":"2022-02-07 08:10:06","post_content":"\n Securing Hashing Algorithm 256 (SHA-256) is the hashing algorithm used to secure blockchains such as Bitcoin, where the hashing function<\/a> emits a 256-bit wide output. <\/p>\n\n\n\n The hashing algorithm is responsible for wallet address creation and management along with the verification of transactions on the blockchain ledger<\/a> through mining<\/a>. ((Bitcoin Wiki - SHA-256<\/a>))<\/p>\n\n\n\n SHA-256 is a variant of the SHA-2, which was initially developed by the National Security Agency.((Federal Register - Announcing Approval of Federal Information Processing Standard (FIPS) 180-2, Secure Hash Standard; a Revision of FIPS 180-1<\/a>)) This means that the inner workings of the algorithm aren't known to the public as it protects sensitive information belonging to the United States. <\/p>\n\n\n\n It is practically impossible to reveal the initial data from a hash value as they are only one-way functions. <\/p>\n\n\n\n Bitcoin utilizes a double SHA-256, meaning once they get the initial hash from the data, it is hashed once again - this creates an insurmountable amount of possible hashes basically eliminating the chance of a brute-force attack<\/a> as it would take 2^256 attempts to generate the initial data,((N-able - SHA-256 Algorithm Overview<\/a>)) more than the number of atoms in the universe.<\/p>\n","post_title":"SHA-256","post_excerpt":"","post_status":"publish","comment_status":"closed","ping_status":"open","post_password":"","post_name":"sha-256","to_ping":"","pinged":"https:\/\/www.thedistributed.co\/what-is-a-51-attack-on-a-blockchain\/\nhttps:\/\/www.thedistributed.co\/what-is-distributed-ledger-technology\/\nhttps:\/\/www.thedistributed.co\/a-guide-to-cryptocurrency-mining\/","post_modified":"2022-07-31 23:20:17","post_modified_gmt":"2022-07-31 13:20:17","post_content_filtered":"","post_parent":0,"guid":"https:\/\/www.thedistributed.co\/?p=3401","menu_order":0,"post_type":"post","post_mime_type":"","comment_count":"0","filter":"raw"}],"next":false,"total_page":false},"paged":1,"class":"jblog_block_13"};
This is what makes the issuance of new coins steady and predictable. The difficulty adjusts in proportion to the amount of computational power or mining hash rate<\/a> on to the network.<\/p>\n\n\n\n This means as more miners join the network the hashing difficulty gets harder. Likewise, if miners leave the hashing difficulty is easier. Allowing for a steady flow of blocks being mined.<\/p>\n\n\n\n Once a miner finds a valid block hash, the miner who found it will broadcast it to the entire network of other miners\/nodes. The nodes will confirm that the block and its hash are valid. If they find it is valid, the block is added to their copy of the blockchain. <\/p>\n\n\n\n The previous candidate block has now become a confirmed block. The miners now move on to the next block. The miners whose candidate blocks weren't successful discard it and repeat the process in hopes of having the next confirmed block.<\/p>\n","post_title":"Cryptocurrency Mining","post_excerpt":"","post_status":"publish","comment_status":"closed","ping_status":"open","post_password":"","post_name":"cryptocurrency-mining","to_ping":"","pinged":"https:\/\/www.thedistributed.co\/what-are-nodes\/\nhttps:\/\/www.thedistributed.co\/what-is-a-cryptographic-nonce-a-number-only-used-once\/\nhttps:\/\/www.thedistributed.co\/what-is-a-mining-hashrate\/\nhttps:\/\/www.thedistributed.co\/what-is-a-mempool-cryptocurrency-memory-pool\/\nhttps:\/\/www.thedistributed.co\/what-is-a-blockchain-protocol\/\nhttps:\/\/www.thedistributed.co\/what-is-distributed-ledger-technology\/","post_modified":"2022-07-25 00:47:38","post_modified_gmt":"2022-07-24 14:47:38","post_content_filtered":"","post_parent":0,"guid":"https:\/\/www.thedistributed.co\/?p=3527","menu_order":0,"post_type":"post","post_mime_type":"","comment_count":"0","filter":"raw"},{"ID":3471,"post_author":"1","post_date":"2022-02-15 20:49:02","post_date_gmt":"2022-02-15 09:49:02","post_content":"\n A mining hashrate is the amount of processing power a miner or network has to process transactions onto a blockchains ledger<\/a>.<\/p>\n\n\n\n The hashrate of a miner<\/a> refers to the number calculations a rig can solve per second, known as a hash. <\/p>\n\n\n\n The hashrate of a network refers to the hash rates of all miners<\/a> on a specific network.<\/p>\n\n\n\n Hashrate can measure the health and security of a network against potential attackers. Having a higher hashrate means a 51% attack<\/a> is unlikely due to the high amount of computational power needed. The more computational power or nodes<\/a> within a network, the more secure it is.<\/p>\n\n\n\n Hashrate is also a metric that can measure the profitability of miners. For a single mining device having a high hashrate means that you'll increase your compensation for the work you put in, giving you a better reward.<\/p>\n","post_title":"Mining Hashrate Explained","post_excerpt":"","post_status":"publish","comment_status":"closed","ping_status":"open","post_password":"","post_name":"mining-hashrate","to_ping":"","pinged":"https:\/\/www.thedistributed.co\/what-is-a-51-attack-on-a-blockchain\/\nhttps:\/\/www.thedistributed.co\/what-are-nodes\/\nhttps:\/\/www.thedistributed.co\/what-is-distributed-ledger-technology\/","post_modified":"2022-06-02 22:17:31","post_modified_gmt":"2022-06-02 12:17:31","post_content_filtered":"","post_parent":0,"guid":"https:\/\/www.thedistributed.co\/?p=3471","menu_order":0,"post_type":"post","post_mime_type":"","comment_count":"0","filter":"raw"},{"ID":3401,"post_author":"1","post_date":"2022-02-07 19:10:06","post_date_gmt":"2022-02-07 08:10:06","post_content":"\n Securing Hashing Algorithm 256 (SHA-256) is the hashing algorithm used to secure blockchains such as Bitcoin, where the hashing function<\/a> emits a 256-bit wide output. <\/p>\n\n\n\n The hashing algorithm is responsible for wallet address creation and management along with the verification of transactions on the blockchain ledger<\/a> through mining<\/a>. ((Bitcoin Wiki - SHA-256<\/a>))<\/p>\n\n\n\n SHA-256 is a variant of the SHA-2, which was initially developed by the National Security Agency.((Federal Register - Announcing Approval of Federal Information Processing Standard (FIPS) 180-2, Secure Hash Standard; a Revision of FIPS 180-1<\/a>)) This means that the inner workings of the algorithm aren't known to the public as it protects sensitive information belonging to the United States. <\/p>\n\n\n\n It is practically impossible to reveal the initial data from a hash value as they are only one-way functions. <\/p>\n\n\n\n Bitcoin utilizes a double SHA-256, meaning once they get the initial hash from the data, it is hashed once again - this creates an insurmountable amount of possible hashes basically eliminating the chance of a brute-force attack<\/a> as it would take 2^256 attempts to generate the initial data,((N-able - SHA-256 Algorithm Overview<\/a>)) more than the number of atoms in the universe.<\/p>\n","post_title":"SHA-256","post_excerpt":"","post_status":"publish","comment_status":"closed","ping_status":"open","post_password":"","post_name":"sha-256","to_ping":"","pinged":"https:\/\/www.thedistributed.co\/what-is-a-51-attack-on-a-blockchain\/\nhttps:\/\/www.thedistributed.co\/what-is-distributed-ledger-technology\/\nhttps:\/\/www.thedistributed.co\/a-guide-to-cryptocurrency-mining\/","post_modified":"2022-07-31 23:20:17","post_modified_gmt":"2022-07-31 13:20:17","post_content_filtered":"","post_parent":0,"guid":"https:\/\/www.thedistributed.co\/?p=3401","menu_order":0,"post_type":"post","post_mime_type":"","comment_count":"0","filter":"raw"}],"next":false,"total_page":false},"paged":1,"class":"jblog_block_13"};
The cryptocurrency mining difficulty is adjusted by the protocol regularly. This ensures that the rate at which new blocks are mined remains constant. <\/p>\n\n\n\n This is what makes the issuance of new coins steady and predictable. The difficulty adjusts in proportion to the amount of computational power or mining hash rate<\/a> on to the network.<\/p>\n\n\n\n This means as more miners join the network the hashing difficulty gets harder. Likewise, if miners leave the hashing difficulty is easier. Allowing for a steady flow of blocks being mined.<\/p>\n\n\n\n Once a miner finds a valid block hash, the miner who found it will broadcast it to the entire network of other miners\/nodes. The nodes will confirm that the block and its hash are valid. If they find it is valid, the block is added to their copy of the blockchain. <\/p>\n\n\n\n The previous candidate block has now become a confirmed block. The miners now move on to the next block. The miners whose candidate blocks weren't successful discard it and repeat the process in hopes of having the next confirmed block.<\/p>\n","post_title":"Cryptocurrency Mining","post_excerpt":"","post_status":"publish","comment_status":"closed","ping_status":"open","post_password":"","post_name":"cryptocurrency-mining","to_ping":"","pinged":"https:\/\/www.thedistributed.co\/what-are-nodes\/\nhttps:\/\/www.thedistributed.co\/what-is-a-cryptographic-nonce-a-number-only-used-once\/\nhttps:\/\/www.thedistributed.co\/what-is-a-mining-hashrate\/\nhttps:\/\/www.thedistributed.co\/what-is-a-mempool-cryptocurrency-memory-pool\/\nhttps:\/\/www.thedistributed.co\/what-is-a-blockchain-protocol\/\nhttps:\/\/www.thedistributed.co\/what-is-distributed-ledger-technology\/","post_modified":"2022-07-25 00:47:38","post_modified_gmt":"2022-07-24 14:47:38","post_content_filtered":"","post_parent":0,"guid":"https:\/\/www.thedistributed.co\/?p=3527","menu_order":0,"post_type":"post","post_mime_type":"","comment_count":"0","filter":"raw"},{"ID":3471,"post_author":"1","post_date":"2022-02-15 20:49:02","post_date_gmt":"2022-02-15 09:49:02","post_content":"\n A mining hashrate is the amount of processing power a miner or network has to process transactions onto a blockchains ledger<\/a>.<\/p>\n\n\n\n The hashrate of a miner<\/a> refers to the number calculations a rig can solve per second, known as a hash. <\/p>\n\n\n\n The hashrate of a network refers to the hash rates of all miners<\/a> on a specific network.<\/p>\n\n\n\n Hashrate can measure the health and security of a network against potential attackers. Having a higher hashrate means a 51% attack<\/a> is unlikely due to the high amount of computational power needed. The more computational power or nodes<\/a> within a network, the more secure it is.<\/p>\n\n\n\n Hashrate is also a metric that can measure the profitability of miners. For a single mining device having a high hashrate means that you'll increase your compensation for the work you put in, giving you a better reward.<\/p>\n","post_title":"Mining Hashrate Explained","post_excerpt":"","post_status":"publish","comment_status":"closed","ping_status":"open","post_password":"","post_name":"mining-hashrate","to_ping":"","pinged":"https:\/\/www.thedistributed.co\/what-is-a-51-attack-on-a-blockchain\/\nhttps:\/\/www.thedistributed.co\/what-are-nodes\/\nhttps:\/\/www.thedistributed.co\/what-is-distributed-ledger-technology\/","post_modified":"2022-06-02 22:17:31","post_modified_gmt":"2022-06-02 12:17:31","post_content_filtered":"","post_parent":0,"guid":"https:\/\/www.thedistributed.co\/?p=3471","menu_order":0,"post_type":"post","post_mime_type":"","comment_count":"0","filter":"raw"},{"ID":3401,"post_author":"1","post_date":"2022-02-07 19:10:06","post_date_gmt":"2022-02-07 08:10:06","post_content":"\n Securing Hashing Algorithm 256 (SHA-256) is the hashing algorithm used to secure blockchains such as Bitcoin, where the hashing function<\/a> emits a 256-bit wide output. <\/p>\n\n\n\n The hashing algorithm is responsible for wallet address creation and management along with the verification of transactions on the blockchain ledger<\/a> through mining<\/a>. ((Bitcoin Wiki - SHA-256<\/a>))<\/p>\n\n\n\n SHA-256 is a variant of the SHA-2, which was initially developed by the National Security Agency.((Federal Register - Announcing Approval of Federal Information Processing Standard (FIPS) 180-2, Secure Hash Standard; a Revision of FIPS 180-1<\/a>)) This means that the inner workings of the algorithm aren't known to the public as it protects sensitive information belonging to the United States. <\/p>\n\n\n\n It is practically impossible to reveal the initial data from a hash value as they are only one-way functions. <\/p>\n\n\n\n Bitcoin utilizes a double SHA-256, meaning once they get the initial hash from the data, it is hashed once again - this creates an insurmountable amount of possible hashes basically eliminating the chance of a brute-force attack<\/a> as it would take 2^256 attempts to generate the initial data,((N-able - SHA-256 Algorithm Overview<\/a>)) more than the number of atoms in the universe.<\/p>\n","post_title":"SHA-256","post_excerpt":"","post_status":"publish","comment_status":"closed","ping_status":"open","post_password":"","post_name":"sha-256","to_ping":"","pinged":"https:\/\/www.thedistributed.co\/what-is-a-51-attack-on-a-blockchain\/\nhttps:\/\/www.thedistributed.co\/what-is-distributed-ledger-technology\/\nhttps:\/\/www.thedistributed.co\/a-guide-to-cryptocurrency-mining\/","post_modified":"2022-07-31 23:20:17","post_modified_gmt":"2022-07-31 13:20:17","post_content_filtered":"","post_parent":0,"guid":"https:\/\/www.thedistributed.co\/?p=3401","menu_order":0,"post_type":"post","post_mime_type":"","comment_count":"0","filter":"raw"}],"next":false,"total_page":false},"paged":1,"class":"jblog_block_13"};
The cryptocurrency mining difficulty is adjusted by the protocol regularly. This ensures that the rate at which new blocks are mined remains constant. <\/p>\n\n\n\n This is what makes the issuance of new coins steady and predictable. The difficulty adjusts in proportion to the amount of computational power or mining hash rate<\/a> on to the network.<\/p>\n\n\n\n This means as more miners join the network the hashing difficulty gets harder. Likewise, if miners leave the hashing difficulty is easier. Allowing for a steady flow of blocks being mined.<\/p>\n\n\n\n Once a miner finds a valid block hash, the miner who found it will broadcast it to the entire network of other miners\/nodes. The nodes will confirm that the block and its hash are valid. If they find it is valid, the block is added to their copy of the blockchain. <\/p>\n\n\n\n The previous candidate block has now become a confirmed block. The miners now move on to the next block. The miners whose candidate blocks weren't successful discard it and repeat the process in hopes of having the next confirmed block.<\/p>\n","post_title":"Cryptocurrency Mining","post_excerpt":"","post_status":"publish","comment_status":"closed","ping_status":"open","post_password":"","post_name":"cryptocurrency-mining","to_ping":"","pinged":"https:\/\/www.thedistributed.co\/what-are-nodes\/\nhttps:\/\/www.thedistributed.co\/what-is-a-cryptographic-nonce-a-number-only-used-once\/\nhttps:\/\/www.thedistributed.co\/what-is-a-mining-hashrate\/\nhttps:\/\/www.thedistributed.co\/what-is-a-mempool-cryptocurrency-memory-pool\/\nhttps:\/\/www.thedistributed.co\/what-is-a-blockchain-protocol\/\nhttps:\/\/www.thedistributed.co\/what-is-distributed-ledger-technology\/","post_modified":"2022-07-25 00:47:38","post_modified_gmt":"2022-07-24 14:47:38","post_content_filtered":"","post_parent":0,"guid":"https:\/\/www.thedistributed.co\/?p=3527","menu_order":0,"post_type":"post","post_mime_type":"","comment_count":"0","filter":"raw"},{"ID":3471,"post_author":"1","post_date":"2022-02-15 20:49:02","post_date_gmt":"2022-02-15 09:49:02","post_content":"\n A mining hashrate is the amount of processing power a miner or network has to process transactions onto a blockchains ledger<\/a>.<\/p>\n\n\n\n The hashrate of a miner<\/a> refers to the number calculations a rig can solve per second, known as a hash. <\/p>\n\n\n\n The hashrate of a network refers to the hash rates of all miners<\/a> on a specific network.<\/p>\n\n\n\n Hashrate can measure the health and security of a network against potential attackers. Having a higher hashrate means a 51% attack<\/a> is unlikely due to the high amount of computational power needed. The more computational power or nodes<\/a> within a network, the more secure it is.<\/p>\n\n\n\n Hashrate is also a metric that can measure the profitability of miners. For a single mining device having a high hashrate means that you'll increase your compensation for the work you put in, giving you a better reward.<\/p>\n","post_title":"Mining Hashrate Explained","post_excerpt":"","post_status":"publish","comment_status":"closed","ping_status":"open","post_password":"","post_name":"mining-hashrate","to_ping":"","pinged":"https:\/\/www.thedistributed.co\/what-is-a-51-attack-on-a-blockchain\/\nhttps:\/\/www.thedistributed.co\/what-are-nodes\/\nhttps:\/\/www.thedistributed.co\/what-is-distributed-ledger-technology\/","post_modified":"2022-06-02 22:17:31","post_modified_gmt":"2022-06-02 12:17:31","post_content_filtered":"","post_parent":0,"guid":"https:\/\/www.thedistributed.co\/?p=3471","menu_order":0,"post_type":"post","post_mime_type":"","comment_count":"0","filter":"raw"},{"ID":3401,"post_author":"1","post_date":"2022-02-07 19:10:06","post_date_gmt":"2022-02-07 08:10:06","post_content":"\n Securing Hashing Algorithm 256 (SHA-256) is the hashing algorithm used to secure blockchains such as Bitcoin, where the hashing function<\/a> emits a 256-bit wide output. <\/p>\n\n\n\n The hashing algorithm is responsible for wallet address creation and management along with the verification of transactions on the blockchain ledger<\/a> through mining<\/a>. ((Bitcoin Wiki - SHA-256<\/a>))<\/p>\n\n\n\n SHA-256 is a variant of the SHA-2, which was initially developed by the National Security Agency.((Federal Register - Announcing Approval of Federal Information Processing Standard (FIPS) 180-2, Secure Hash Standard; a Revision of FIPS 180-1<\/a>)) This means that the inner workings of the algorithm aren't known to the public as it protects sensitive information belonging to the United States. <\/p>\n\n\n\n It is practically impossible to reveal the initial data from a hash value as they are only one-way functions. <\/p>\n\n\n\n Bitcoin utilizes a double SHA-256, meaning once they get the initial hash from the data, it is hashed once again - this creates an insurmountable amount of possible hashes basically eliminating the chance of a brute-force attack<\/a> as it would take 2^256 attempts to generate the initial data,((N-able - SHA-256 Algorithm Overview<\/a>)) more than the number of atoms in the universe.<\/p>\n","post_title":"SHA-256","post_excerpt":"","post_status":"publish","comment_status":"closed","ping_status":"open","post_password":"","post_name":"sha-256","to_ping":"","pinged":"https:\/\/www.thedistributed.co\/what-is-a-51-attack-on-a-blockchain\/\nhttps:\/\/www.thedistributed.co\/what-is-distributed-ledger-technology\/\nhttps:\/\/www.thedistributed.co\/a-guide-to-cryptocurrency-mining\/","post_modified":"2022-07-31 23:20:17","post_modified_gmt":"2022-07-31 13:20:17","post_content_filtered":"","post_parent":0,"guid":"https:\/\/www.thedistributed.co\/?p=3401","menu_order":0,"post_type":"post","post_mime_type":"","comment_count":"0","filter":"raw"}],"next":false,"total_page":false},"paged":1,"class":"jblog_block_13"};
In order to be considered valid, the block hash must be less than a certain target value determined in the protocol<\/a>. In Bitcoin mining, the block hash must start with a certain number of zeros. This is what we call mining difficulty.<\/p>\n\n\n\n The cryptocurrency mining difficulty is adjusted by the protocol regularly. This ensures that the rate at which new blocks are mined remains constant. <\/p>\n\n\n\n This is what makes the issuance of new coins steady and predictable. The difficulty adjusts in proportion to the amount of computational power or mining hash rate<\/a> on to the network.<\/p>\n\n\n\n This means as more miners join the network the hashing difficulty gets harder. Likewise, if miners leave the hashing difficulty is easier. Allowing for a steady flow of blocks being mined.<\/p>\n\n\n\n Once a miner finds a valid block hash, the miner who found it will broadcast it to the entire network of other miners\/nodes. The nodes will confirm that the block and its hash are valid. If they find it is valid, the block is added to their copy of the blockchain. <\/p>\n\n\n\n The previous candidate block has now become a confirmed block. The miners now move on to the next block. The miners whose candidate blocks weren't successful discard it and repeat the process in hopes of having the next confirmed block.<\/p>\n","post_title":"Cryptocurrency Mining","post_excerpt":"","post_status":"publish","comment_status":"closed","ping_status":"open","post_password":"","post_name":"cryptocurrency-mining","to_ping":"","pinged":"https:\/\/www.thedistributed.co\/what-are-nodes\/\nhttps:\/\/www.thedistributed.co\/what-is-a-cryptographic-nonce-a-number-only-used-once\/\nhttps:\/\/www.thedistributed.co\/what-is-a-mining-hashrate\/\nhttps:\/\/www.thedistributed.co\/what-is-a-mempool-cryptocurrency-memory-pool\/\nhttps:\/\/www.thedistributed.co\/what-is-a-blockchain-protocol\/\nhttps:\/\/www.thedistributed.co\/what-is-distributed-ledger-technology\/","post_modified":"2022-07-25 00:47:38","post_modified_gmt":"2022-07-24 14:47:38","post_content_filtered":"","post_parent":0,"guid":"https:\/\/www.thedistributed.co\/?p=3527","menu_order":0,"post_type":"post","post_mime_type":"","comment_count":"0","filter":"raw"},{"ID":3471,"post_author":"1","post_date":"2022-02-15 20:49:02","post_date_gmt":"2022-02-15 09:49:02","post_content":"\n A mining hashrate is the amount of processing power a miner or network has to process transactions onto a blockchains ledger<\/a>.<\/p>\n\n\n\n The hashrate of a miner<\/a> refers to the number calculations a rig can solve per second, known as a hash. <\/p>\n\n\n\n The hashrate of a network refers to the hash rates of all miners<\/a> on a specific network.<\/p>\n\n\n\n Hashrate can measure the health and security of a network against potential attackers. Having a higher hashrate means a 51% attack<\/a> is unlikely due to the high amount of computational power needed. The more computational power or nodes<\/a> within a network, the more secure it is.<\/p>\n\n\n\n Hashrate is also a metric that can measure the profitability of miners. For a single mining device having a high hashrate means that you'll increase your compensation for the work you put in, giving you a better reward.<\/p>\n","post_title":"Mining Hashrate Explained","post_excerpt":"","post_status":"publish","comment_status":"closed","ping_status":"open","post_password":"","post_name":"mining-hashrate","to_ping":"","pinged":"https:\/\/www.thedistributed.co\/what-is-a-51-attack-on-a-blockchain\/\nhttps:\/\/www.thedistributed.co\/what-are-nodes\/\nhttps:\/\/www.thedistributed.co\/what-is-distributed-ledger-technology\/","post_modified":"2022-06-02 22:17:31","post_modified_gmt":"2022-06-02 12:17:31","post_content_filtered":"","post_parent":0,"guid":"https:\/\/www.thedistributed.co\/?p=3471","menu_order":0,"post_type":"post","post_mime_type":"","comment_count":"0","filter":"raw"},{"ID":3401,"post_author":"1","post_date":"2022-02-07 19:10:06","post_date_gmt":"2022-02-07 08:10:06","post_content":"\n Securing Hashing Algorithm 256 (SHA-256) is the hashing algorithm used to secure blockchains such as Bitcoin, where the hashing function<\/a> emits a 256-bit wide output. <\/p>\n\n\n\n The hashing algorithm is responsible for wallet address creation and management along with the verification of transactions on the blockchain ledger<\/a> through mining<\/a>. ((Bitcoin Wiki - SHA-256<\/a>))<\/p>\n\n\n\n SHA-256 is a variant of the SHA-2, which was initially developed by the National Security Agency.((Federal Register - Announcing Approval of Federal Information Processing Standard (FIPS) 180-2, Secure Hash Standard; a Revision of FIPS 180-1<\/a>)) This means that the inner workings of the algorithm aren't known to the public as it protects sensitive information belonging to the United States. <\/p>\n\n\n\n It is practically impossible to reveal the initial data from a hash value as they are only one-way functions. <\/p>\n\n\n\n Bitcoin utilizes a double SHA-256, meaning once they get the initial hash from the data, it is hashed once again - this creates an insurmountable amount of possible hashes basically eliminating the chance of a brute-force attack<\/a> as it would take 2^256 attempts to generate the initial data,((N-able - SHA-256 Algorithm Overview<\/a>)) more than the number of atoms in the universe.<\/p>\n","post_title":"SHA-256","post_excerpt":"","post_status":"publish","comment_status":"closed","ping_status":"open","post_password":"","post_name":"sha-256","to_ping":"","pinged":"https:\/\/www.thedistributed.co\/what-is-a-51-attack-on-a-blockchain\/\nhttps:\/\/www.thedistributed.co\/what-is-distributed-ledger-technology\/\nhttps:\/\/www.thedistributed.co\/a-guide-to-cryptocurrency-mining\/","post_modified":"2022-07-31 23:20:17","post_modified_gmt":"2022-07-31 13:20:17","post_content_filtered":"","post_parent":0,"guid":"https:\/\/www.thedistributed.co\/?p=3401","menu_order":0,"post_type":"post","post_mime_type":"","comment_count":"0","filter":"raw"}],"next":false,"total_page":false},"paged":1,"class":"jblog_block_13"};
The nonce number is changed until a valid hash is found, as the hash of the previous block and the root hash cannot be changed.<\/p>\n\n\n\n In order to be considered valid, the block hash must be less than a certain target value determined in the protocol<\/a>. In Bitcoin mining, the block hash must start with a certain number of zeros. This is what we call mining difficulty.<\/p>\n\n\n\n The cryptocurrency mining difficulty is adjusted by the protocol regularly. This ensures that the rate at which new blocks are mined remains constant. <\/p>\n\n\n\n This is what makes the issuance of new coins steady and predictable. The difficulty adjusts in proportion to the amount of computational power or mining hash rate<\/a> on to the network.<\/p>\n\n\n\n This means as more miners join the network the hashing difficulty gets harder. Likewise, if miners leave the hashing difficulty is easier. Allowing for a steady flow of blocks being mined.<\/p>\n\n\n\n Once a miner finds a valid block hash, the miner who found it will broadcast it to the entire network of other miners\/nodes. The nodes will confirm that the block and its hash are valid. If they find it is valid, the block is added to their copy of the blockchain. <\/p>\n\n\n\n The previous candidate block has now become a confirmed block. The miners now move on to the next block. The miners whose candidate blocks weren't successful discard it and repeat the process in hopes of having the next confirmed block.<\/p>\n","post_title":"Cryptocurrency Mining","post_excerpt":"","post_status":"publish","comment_status":"closed","ping_status":"open","post_password":"","post_name":"cryptocurrency-mining","to_ping":"","pinged":"https:\/\/www.thedistributed.co\/what-are-nodes\/\nhttps:\/\/www.thedistributed.co\/what-is-a-cryptographic-nonce-a-number-only-used-once\/\nhttps:\/\/www.thedistributed.co\/what-is-a-mining-hashrate\/\nhttps:\/\/www.thedistributed.co\/what-is-a-mempool-cryptocurrency-memory-pool\/\nhttps:\/\/www.thedistributed.co\/what-is-a-blockchain-protocol\/\nhttps:\/\/www.thedistributed.co\/what-is-distributed-ledger-technology\/","post_modified":"2022-07-25 00:47:38","post_modified_gmt":"2022-07-24 14:47:38","post_content_filtered":"","post_parent":0,"guid":"https:\/\/www.thedistributed.co\/?p=3527","menu_order":0,"post_type":"post","post_mime_type":"","comment_count":"0","filter":"raw"},{"ID":3471,"post_author":"1","post_date":"2022-02-15 20:49:02","post_date_gmt":"2022-02-15 09:49:02","post_content":"\n A mining hashrate is the amount of processing power a miner or network has to process transactions onto a blockchains ledger<\/a>.<\/p>\n\n\n\n The hashrate of a miner<\/a> refers to the number calculations a rig can solve per second, known as a hash. <\/p>\n\n\n\n The hashrate of a network refers to the hash rates of all miners<\/a> on a specific network.<\/p>\n\n\n\n Hashrate can measure the health and security of a network against potential attackers. Having a higher hashrate means a 51% attack<\/a> is unlikely due to the high amount of computational power needed. The more computational power or nodes<\/a> within a network, the more secure it is.<\/p>\n\n\n\n Hashrate is also a metric that can measure the profitability of miners. For a single mining device having a high hashrate means that you'll increase your compensation for the work you put in, giving you a better reward.<\/p>\n","post_title":"Mining Hashrate Explained","post_excerpt":"","post_status":"publish","comment_status":"closed","ping_status":"open","post_password":"","post_name":"mining-hashrate","to_ping":"","pinged":"https:\/\/www.thedistributed.co\/what-is-a-51-attack-on-a-blockchain\/\nhttps:\/\/www.thedistributed.co\/what-are-nodes\/\nhttps:\/\/www.thedistributed.co\/what-is-distributed-ledger-technology\/","post_modified":"2022-06-02 22:17:31","post_modified_gmt":"2022-06-02 12:17:31","post_content_filtered":"","post_parent":0,"guid":"https:\/\/www.thedistributed.co\/?p=3471","menu_order":0,"post_type":"post","post_mime_type":"","comment_count":"0","filter":"raw"},{"ID":3401,"post_author":"1","post_date":"2022-02-07 19:10:06","post_date_gmt":"2022-02-07 08:10:06","post_content":"\n Securing Hashing Algorithm 256 (SHA-256) is the hashing algorithm used to secure blockchains such as Bitcoin, where the hashing function<\/a> emits a 256-bit wide output. <\/p>\n\n\n\n The hashing algorithm is responsible for wallet address creation and management along with the verification of transactions on the blockchain ledger<\/a> through mining<\/a>. ((Bitcoin Wiki - SHA-256<\/a>))<\/p>\n\n\n\n SHA-256 is a variant of the SHA-2, which was initially developed by the National Security Agency.((Federal Register - How Secure Is SHA-256?<\/h2>\n\n\n\n
How Secure Is SHA-256?<\/h2>\n\n\n\n
How Secure Is SHA-256?<\/h2>\n\n\n\n
What Is SHA-256?<\/h2>\n\n\n\n
How Secure Is SHA-256?<\/h2>\n\n\n\n
What Is SHA-256?<\/h2>\n\n\n\n
How Secure Is SHA-256?<\/h2>\n\n\n\n
What Is SHA-256?<\/h2>\n\n\n\n
How Secure Is SHA-256?<\/h2>\n\n\n\n
Why Is Hashrate Important?<\/h2>\n\n\n\n
What Is SHA-256?<\/h2>\n\n\n\n
How Secure Is SHA-256?<\/h2>\n\n\n\n
Why Is Hashrate Important?<\/h2>\n\n\n\n
What Is SHA-256?<\/h2>\n\n\n\n
How Secure Is SHA-256?<\/h2>\n\n\n\n
Why Is Hashrate Important?<\/h2>\n\n\n\n
What Is SHA-256?<\/h2>\n\n\n\n
How Secure Is SHA-256?<\/h2>\n\n\n\n
Why Is Hashrate Important?<\/h2>\n\n\n\n
What Is SHA-256?<\/h2>\n\n\n\n
How Secure Is SHA-256?<\/h2>\n\n\n\n
Why Is Hashrate Important?<\/h2>\n\n\n\n
What Is SHA-256?<\/h2>\n\n\n\n
How Secure Is SHA-256?<\/h2>\n\n\n\n
Why Is Hashrate Important?<\/h2>\n\n\n\n
What Is SHA-256?<\/h2>\n\n\n\n
How Secure Is SHA-256?<\/h2>\n\n\n\n
Step 4 - Broadcast The Block<\/h3>\n\n\n\n
Why Is Hashrate Important?<\/h2>\n\n\n\n
What Is SHA-256?<\/h2>\n\n\n\n
How Secure Is SHA-256?<\/h2>\n\n\n\n
Step 4 - Broadcast The Block<\/h3>\n\n\n\n
Why Is Hashrate Important?<\/h2>\n\n\n\n
What Is SHA-256?<\/h2>\n\n\n\n
How Secure Is SHA-256?<\/h2>\n\n\n\n
Step 4 - Broadcast The Block<\/h3>\n\n\n\n
Why Is Hashrate Important?<\/h2>\n\n\n\n
What Is SHA-256?<\/h2>\n\n\n\n
How Secure Is SHA-256?<\/h2>\n\n\n\n
Step 4 - Broadcast The Block<\/h3>\n\n\n\n
Why Is Hashrate Important?<\/h2>\n\n\n\n
What Is SHA-256?<\/h2>\n\n\n\n
How Secure Is SHA-256?<\/h2>\n\n\n\n
What Is Mining Difficulty?<\/h4>\n\n\n\n
Step 4 - Broadcast The Block<\/h3>\n\n\n\n
Why Is Hashrate Important?<\/h2>\n\n\n\n
What Is SHA-256?<\/h2>\n\n\n\n
How Secure Is SHA-256?<\/h2>\n\n\n\n
What Is Mining Difficulty?<\/h4>\n\n\n\n
Step 4 - Broadcast The Block<\/h3>\n\n\n\n
Why Is Hashrate Important?<\/h2>\n\n\n\n
What Is SHA-256?<\/h2>\n\n\n\n
How Secure Is SHA-256?<\/h2>\n\n\n\n
What Is Mining Difficulty?<\/h4>\n\n\n\n
Step 4 - Broadcast The Block<\/h3>\n\n\n\n
Why Is Hashrate Important?<\/h2>\n\n\n\n
What Is SHA-256?<\/h2>\n\n\n\n
How Secure Is SHA-256?<\/h2>\n\n\n\n