How SHA-256 Hashing Works in Bitcoin

Written by escholar | Published 2025/01/12
Tech Story Tags: bitcoin-mining | quantum-bitcoin-mining | grover's-algorithm | proof-of-work-protocol | quantum-computing-and-bitcoin | bitcoin-mining-security | quantum-vs-classical-mining | bitcoin-hashing

TLDRThis section defines the binary alphabet and introduces SHA-256 as the cryptographic hash function used in Bitcoin, explaining its role in securing the network.via the TL;DR App

Table of Links

Abstract and I. Introduction

A. Quantum Bitcoin Mining

B. Our Contribution

C. Comparison with Related Works

D. Conventions

II. Background

A. Bitcoin Basics

B. Bitcoin Security

C. Grover’s Search Algorithm

D. Quantum Attacks

III. Approach

A. Algorithm

B. Markov Chain

C. Assumptions and Approximations

IV. Results

A. Probability of Success

B. Performance Measures

C. Example Application

V. Discussion, Acknowledgments, and References

D. Conventions

Authors:

(1) Robert R. Nerem, Institute for Quantum Science and Technology, University of Calgary, Alberta T2N 1N4, Canada ([email protected]);

(2) Daya R. Gaur, Department of Mathematics and Computer Science, University of Lethbridge, Alberta T1K 3M4, Canada.


This paper is available on arxiv under CC BY 4.0 DEED license.


Written by escholar | We publish the best academic work (that's too often lost to peer reviews & the TA's desk) to the global tech community
Published by HackerNoon on 2025/01/12