maiakee on Nostr: Why SHA-256 Is Secure • Pre-image Resistance: It’s nearly impossible to find an ...
Why SHA-256 Is Secure
• Pre-image Resistance: It’s nearly impossible to find an input from its hash.
• Second Pre-image Resistance: It’s infeasible to find two inputs producing the same hash.
• Avalanche Effect: A small change in input drastically changes the hash output.
• High Computational Cost: Brute-forcing SHA-256 requires astronomical amounts of computation.
SHA-256 in Action
Let’s say the input is Hello, Bitcoin!.
1. Apply SHA-256:
**Input: Hello, Bitcoin!
Output: 18af8192c1c09bd51a5cc4b6074c3e8c6d52f29523d20ae993f8e7c1e26e5e0f
2. Changing even one letter results in a completely different hash:
**Input: hello, Bitcoin!
Output: b53e563b8cd3fb7b0136623f2c6b3af1b30bc5018029bdabc3f125d96c3e63db
By leveraging SHA-256, Bitcoin ensures that the blockchain remains tamper-proof and secure, providing the foundation for trust in the network.
#siamstr #btc #bitcoin #nostr
Published at
2024-12-06 15:36:18Event JSON
{
"id": "8a64041f0ebddadb020be1f11783713b8435d5c4449eada78a84d521071c081e",
"pubkey": "ba335e71086a601e3ddb4a4c08159289f74a2a270444a909a57fb2704e5bfc08",
"created_at": 1733499378,
"kind": 1,
"tags": [
[
"imeta",
"url https://image.nostr.build/6e8dfeb8010503941eda17edd41a8a5b9291a3864af563347117428eafd0353c.jpg",
"m image/jpeg",
"x cb96c3847ac4a334d1d1952717f9105c3bff5371fd276ae4eaef6df826193228",
"ox 6e8dfeb8010503941eda17edd41a8a5b9291a3864af563347117428eafd0353c",
"blurhash L7E,wKb+Mm}I}KOq9=#k0MWJ78R=",
"dim 554x554",
"alt 6e8dfeb8010503941eda17edd41a8a5b9291a3864af563347117428eafd0353c.jpg",
"thumb https://image.nostr.build/thumb/6e8dfeb8010503941eda17edd41a8a5b9291a3864af563347117428eafd0353c.jpg",
"image https://image.nostr.build/resp/1080p/6e8dfeb8010503941eda17edd41a8a5b9291a3864af563347117428eafd0353c.jpg",
"size 56699"
],
[
"t",
"siamstr"
],
[
"t",
"btc"
],
[
"t",
"bitcoin"
],
[
"t",
"nostr"
]
],
"content": "https://image.nostr.build/6e8dfeb8010503941eda17edd41a8a5b9291a3864af563347117428eafd0353c.jpg\n\nWhy SHA-256 Is Secure\n\n • Pre-image Resistance: It’s nearly impossible to find an input from its hash.\n • Second Pre-image Resistance: It’s infeasible to find two inputs producing the same hash.\n • Avalanche Effect: A small change in input drastically changes the hash output.\n • High Computational Cost: Brute-forcing SHA-256 requires astronomical amounts of computation.\n\nSHA-256 in Action\n\nLet’s say the input is Hello, Bitcoin!.\n 1. Apply SHA-256:\n\n**Input: Hello, Bitcoin!\nOutput: 18af8192c1c09bd51a5cc4b6074c3e8c6d52f29523d20ae993f8e7c1e26e5e0f\n\n2. Changing even one letter results in a completely different hash:\n\n**Input: hello, Bitcoin!\nOutput: b53e563b8cd3fb7b0136623f2c6b3af1b30bc5018029bdabc3f125d96c3e63db\n\nBy leveraging SHA-256, Bitcoin ensures that the blockchain remains tamper-proof and secure, providing the foundation for trust in the network.\n\n#siamstr #btc #bitcoin #nostr",
"sig": "08768c0b6f010b8669c385b8b21642cb7f52115869e3a3b4aa9b4646f10f5333e02b4b7a2a92bbb1c10e8ea05e95ec28d43b11573410a6b1bd98db46e8e05c77"
}