Download presentation
Presentation is loading. Please wait.
Published byBenedict Gilbert Modified over 9 years ago
1
An Analysis and Breakdown of SHA Hashing in Bitcoin Cyryptocurrency Project Proposal - Spring 2015
2
SHA Use in Bitcoin ● SHA256 used heavily as bitcoin’s underlying cryptographic hashing function ● Two examples (of many) are its use in the Merkle tree hash, as well as the proof of work calculation
3
Bitcoin and Beyond Areas of use: ● bitcoin ● pointcoin ● other CS classwork (CS3240) ● encrypting sensitive forms (taxes, etc.) ● We have been taught to be more critical of foreign methods/software
4
An Exploratory Analysis of SHA encryption 1)How the algorithm (SHA256) actually works 2)Comparison of the different version’s algorithms 3)Historical review of attacks on SHA algorithm 4)Energy analysis for hashing power 5)A forecast for the future (SHA -3, tokenization for data transfer, the potential of mining without hashing, etc.)
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.