
BLOCKCHAIN TECHNOLOGY AND THE ROLE OF THE SHA-256 ALGORITHM
Sadullayeva Shahrizoda , Master's student, 1st year, Samarkand State University,Abstract
This article analyzes the SHA-256 cryptographic hash algorithm used in modern blockchain systems. The mathematical foundations of the algorithm, its application in blockchain, security aspects, and stability under computational threats are examined. The study highlights that the security of blockchain technology is of paramount importance today and that using the SHA-256 algorithm is effective for ensuring this security. The findings indicate that the SHA-256 hash algorithm meets the reliability and security requirements of blockchain systems.
Keywords
Blockchain, SHA-256, cryptography, hash function, Bitcoin, mining, security.
References
Nakamoto, S. (2008). Bitcoin: A Peer-to-Peer Electronic Cash System, Bitcoin Whitepaper (https://bitcoin.org/bitcoin.pdf), "SHA-256 in blockchain's original implementation."
NIST FIPS 180-4: Secure Hash Standard (SHA-256 specification), Official Specification (https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.180-4.pdf ), "Technical specification of SHA-256 algorithm."
Antonopoulos, A. (2017). Mastering Bitcoin, BitcoinBook (https://github.com/bitcoinbook/bitcoinbook ), "Detailed explanation of SHA-256 in Bitcoin."
Merkle, R. (1989). A Certified Digital Signature, Merkle Trees Paper (https://people.eecs.berkeley.edu/~raluca/cs261-f15/readings/merkle.pdf ), "Foundational paper on Merkle Trees using hash functions."
Article Statistics
Downloads
Copyright License

This work is licensed under a Creative Commons Attribution 4.0 International License.