Reading assignment: Hashing

1.) The hash algorithm used in bitcoin is called SHA-256.

2.) The hash algorithm is almost impossible to brute force because it requires you to solve very hard equations. There are almost infinite possibilities for block headers.

1 Like
  1. Secure hashing algorithm - SHA256
  2. different inputs result in different outputs, so trying random input to get a know output is impossible and you also cannot work out the input if you only have the output
1 Like
  1. SHA-256
  2. A brute-force attack on a 256-bit string would have to check 2^256 permutations of that string. The best available machines in the world, even if connected, would need billions of years to complete this task.
1 Like

Reading Assignment: Hashing

  1. The hashing algorithm used in Bitcoin is called SHA-256.

  2. The amount of time needed to “guess” the target value is extremely unrealistic. Especially since the hash value is constantly changing and randomly chosen. Not to mention the extreme difficulty that it places on even miners to achieve correctly. Also, not a single individual or organization controls more than 51% of a hash. Meaning, a successful brute force attack is unlikely, due to the implementation of consensus within the shared portions of the network.

1 Like

Answers

  1. BTC Hash Function called Secure Hash Algorithm - SHA-256
  2. You need an enormous amount of computing power to do that. It’s almost impossible.
1 Like
  1. SHA 256
  2. The equations become increasingly difficult and is compared to a lottery.
1 Like
  1. SHA-256
  2. It is mathematically irreversible
1 Like
  1. SHA-256
  2. SHA-256 was developed in such a way that it may be impossible to brute-force it due to the number of computational possibilities - 2^256. Probably, in the future when quantum computers will be a thing, to increase that to SHA-5120
1 Like
  1. SHA-256
  2. Hashing algorithm is really hard to brute force because it is a one way mechanism and there is no way to reverse it.
1 Like

Reading assignment: Hashing

  1. What is the hashing algorithm called used in Bitcoin?
    A: SHA-256
  2. Why is this hashing algorithm really hard (almost impossible) to brute-force?
    A: With the number of possibilities in a 256 hash, the likelihood of a collision would nearly be improbable to occur.
1 Like
  1. SHA 256 2. due to mathematics it would take an extremely long time.
1 Like
  1. SHA-256.
  2. It is like trying to figure out what ingredients are all in a smoothie, once everything has been blended together. The information placed in the hashing algorithm is incredibly difficult to decipher entirely from the hash output.
1 Like
  1. What is the hashing algorithm called used in Bitcoin?

The bitcoin algorithm is called the Secure Hash Algorithm (SHA) SHA-256

  1. Why is this hashing algorithm really hard (almost impossible) to brute-force?

The SHA 256 is not easy cracked because there a lot of electrical energy, CPU and GPU power and a too much mathematical processing required.
It would take a well designed password to be cracked in more than a thousands of years with current computers. In other words, with current technology it is impossible to find the input based on the output.

For future computer and internet development might require bitcoin adaptation to SHA 512 or perhaps and development of crypto-graphical future protection for for quantum computers.

1 Like
  1. The hashing algorithm in Bitcoin is called “SHA-256”
  2. It is impossible to retrieve the input of a hashed data from the output
1 Like

1.sha 256
2.you could only go from input to output but not from output to input

1 Like

What is the hashing algorithm called used in Bitcoin?
SHA-256 algorithm

Why is this hashing algorithm really hard (almost impossible) to brute-force?
BTC hash is only solved in a linear, unidirectional manner. Once a hash is solved, there is no way to trace back to the input.

1 Like
  1. The hash algorithm called used in Bitcoin is (SHA-256 Algorithm).
  2. The hashing algorithm is almost impossible to crack because it moves in a unidirectional pattern. The information or code input would need to be flawless in order to get the same hash output. There is no going back and reversing a hash once it’s computed.
1 Like
  1. SHA 256
  2. The time needed to solve the algorithm makes it difficult.
1 Like
  1. SHA256
  2. The algorithm is very difficult to be solved due to the computational complexity of solving the riddle as a miner.
1 Like
  1. SHA256
  2. It is practically impossible to use an output of a function to determine its input.
1 Like