Articles | Open Access |

BLOCKCHAIN TECHNOLOGY AND THE ROLE OF THE SHA-256 ALGORITHM

Sadullayeva Shahrizoda , Master's student, 1st year, Samarkand State University,

Abstract

This article analyzes the SHA-256 cryptographic hash algorithm used in modern blockchain systems. The mathematical foundations of the algorithm, its application in blockchain, security aspects, and stability under computational threats are examined. The study highlights that the security of blockchain technology is of paramount importance today and that using the SHA-256 algorithm is effective for ensuring this security. The findings indicate that the SHA-256 hash algorithm meets the reliability and security requirements of blockchain systems.

Keywords

Blockchain, SHA-256, cryptography, hash function, Bitcoin, mining, security.

References

Nakamoto, S. (2008). Bitcoin: A Peer-to-Peer Electronic Cash System, Bitcoin Whitepaper (https://bitcoin.org/bitcoin.pdf), "SHA-256 in blockchain's original implementation."

NIST FIPS 180-4: Secure Hash Standard (SHA-256 specification), Official Specification (https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.180-4.pdf ), "Technical specification of SHA-256 algorithm."

Antonopoulos, A. (2017). Mastering Bitcoin, BitcoinBook (https://github.com/bitcoinbook/bitcoinbook ), "Detailed explanation of SHA-256 in Bitcoin."

Merkle, R. (1989). A Certified Digital Signature, Merkle Trees Paper (https://people.eecs.berkeley.edu/~raluca/cs261-f15/readings/merkle.pdf ), "Foundational paper on Merkle Trees using hash functions."

Article Statistics

Downloads

Download data is not yet available.

Copyright License

Download Citations

How to Cite

BLOCKCHAIN TECHNOLOGY AND THE ROLE OF THE SHA-256 ALGORITHM. (2025). International Journal of Artificial Intelligence, 5(03), 1660-1664. https://www.academicpublishers.org/journals/index.php/ijai/article/view/3636