You are viewing a single comment's thread from:

RE: NICE SELECTION OF STEEMIT IN CHOOSING SHA 256 AS HASH ALGORITHM

in #steemit8 years ago

Sha256 is only one step of the hash function. The full proof-of-work requires elliptic-curve operations that are used for signature verification. Optimizing the proof of work should improve the whole platform's key computational bottleneck.

Sort:  

To break accounts, this is true. If one could "solve" the sha256 algo, one could drive the mining difficult up and stop mining. That would stall network and make bitcoin useless. And bitcoin "mgmt" is incapable of agreeing on forks.

Of course, there are more lucrative things to do if you could break sha256.

yeahh, i think so
if SHA256 is successfully solved, you can break password or get the sequence of letter which has the same hash value of an account on the database. So you can log in to an account

Yes that's right. All of the step must have good securities. In here, i just show that steemit has a good choice to choose SHA 256 for the hash algorithm. I didn't show the security of all of the steemit's protocol. Thank you

Coin Marketplace

STEEM 0.18
TRX 0.14
JST 0.029
BTC 58068.07
ETH 3133.85
USDT 1.00
SBD 2.44