Reading assignment: Hashing

  1. SHA-256
  2. It’s a one-way mechanism that is guaranteed through intricate mathematical equations which do not allow the reversal of a new hash. A bitcoin hash is only solved in a linear unidirectional manner.
2 Likes
  1. SHA256

  2. Because each such algorithm has different features, including that that makes each one produce unique hashes that are solved in a linear, unidirectional manner that intricate mathematical equations do not allow to reverse.
    The more blocks are mined on the Bitcoin Network, the harder it gets to reverse the algorithm.
    In order to do that, a computational power so huge we unknown the existence would be needed.

1 Like

HASHING – Lesson 5 – Homework

Hashing – Questions

  1. What is the hashing algorithm called used in Bitcoin?

SHA 256 (Secure Hash Algorithm 256)

  1. Why is this hashing algorithm really hard (almost impossible) to brute-force?

A hash is the cryptographic result of a hash algorithm.
A (Bitcoin) Hash is only solved in a linear unidirectional manner.
Therefore they can not be reversed to calculate the initial raw data.

1 Like
  1. What is the hashing algorithm called used in Bitcoin?

~SHA 256 -(Secure. Hashing. Algorithm.)

  1. Why is this hashing algorithm really hard (almost impossible) to brute-force?

~The amount of time required to do a brute force, it just would not be worth the effort to do such a thing.

1 Like
  1. SHA-256
  2. because it can’t be reverse-engineered. it’s one directional
1 Like
  1. SHA-256
  2. Because it is hard to find 2 inputs which produce the same output in a hash function.
1 Like
  1. SHA-256

  2. Because it is nearly impossible for 2 users to get the same output.

1 Like

1 sha 256

2 Because it is so hard it’s like a lottery, solving an equation with up and over 256 variable digits to get a result of some kind? I’m really not sure why it’s really hard but it is really hard!

1 Like
  1. A secure hash algorithm SHA-256
  2. The probability that two miners get the same output is practically impossible and would take a very long time to crack making it impractical.
1 Like
  1. What is the hashing algorithm called used in Bitcoin?

SHA-256

  1. Why is this hashing algorithm really hard (almost impossible) to brute-force?

You can’t recreate an hash. You need to have the input that the hash had received to recreate the same output.

1 Like

1- the hashing algorithm used in Bitcoin is called SHA-256

2- The hashing algorithm is almost impossible to brute force since it has so many possibilities that it would take an unreasonable time to brute force it.

1 Like
  1. The hashing algorithm in bitcoin is called Sha-256
  2. The algorithm is almost impossible to brute force because its difficult to find 2 of the same outputs in a hash function and it requires a lot of computing power.
1 Like

(1) SHA-256

(2) The number of attempts to randomly generate the correct code after hash is very high and would take our normal computers a long time to brute-force. Quantum computers may be a threat in the days ahead, and cryptography will have to evolve to meet that challenge.

1 Like
  1. Secure Hash Algorithm 256
  2. It is almost impossible to break the system due to the vast number of combinations that exist as it would take a huge amount of processing power and time
1 Like

(SHA) named SHA-256.

There are so many possibilities that it will take so long to break it.

1 Like
  1. SHA known as SHA 256 too
  2. Because of the always harder computational power that is needed for mining.
1 Like
  1. What is the hashing algorithm called used in Bitcoin?

Secure Hash algorithm 256 or SHA-256
2. Why is this hashing algorithm really hard (almost impossible) to brute-force?

Because the chances of figuring out the algorithm are statistically low with brute force alone. It requires computational power involving computer hardware. The answer of the algorithm should be between 0-256 which it is often much higher requiring another attempt at figuring out the algorithm. It can also only be 4x greater as it creates new blocks every two weeks or so. This is so that the software can adapt its computational power to continue to figure out the algorithm.

1 Like
  1. SHA-256
  2. The hashing algorithm runs the input through an intricate array of mathemetical formulae resulting in it being almost impossible to reverse engineer an output from the input without first knowing both input and output.
1 Like

1 sha 256
2 it hard to fine 2 inputs to do the same

1 Like
  1. sha-256

  2. a hash is a one-way function. Thus we cannot deduce the input by simply using the output and an “inverted” version of the function. So the only way to obtain a desired output (let’s say with a number of “0” bits at the beginning of the hash) we must try each possible input, one by one.

1 Like