Bitcoin SHA-256 & Bitgesell Keccak


BTC and BGL mining algoritms
SHA-256 & KECCAK

The difference between the Keccak mining algorithm used by Bitgesell and the SHA-256 used by Bitcoin mainly lies in the hashing algorithms they utilize. Let's examine each one:

SHA-256 (Bitcoin)
- SHA-256 stands for "Secure Hash Algorithm 256-bit" and is part of the SHA-2 family of hash algorithms.
- Hashing Process: SHA-256 generates a 256-bit (32-byte) hash from an input of arbitrary size.
- Security: SHA-256 is considered secure and is widely used in various security and cryptographic applications.
- Usage in Bitcoin: In Bitcoin, SHA-256 is used in two rounds in the proof-of-work (PoW) process. Miners try to solve a cryptographic puzzle by finding a nonce that, when combined with the block data and passed through SHA-256 twice, results in a hash that is less than the target set by the network.

Keccak (Bitgesell)
- Keccak is the algorithm that won the NIST (National Institute of Standards and Technology) competition to become SHA-3, but in its original unmodified state.
- Hashing Process: Keccak can also produce hashes of varying sizes, including 256 bits.
- Security: Keccak is considered secure and has different properties compared to SHA-2. It is more resistant to certain types of attacks, such as length extension attacks.
- Usage in Bitgesell: Bitgesell uses Keccak as its proof-of-work algorithm. Bitgesell miners solve similar cryptographic puzzles as Bitcoin miners, but using the Keccak algorithm to generate the hash that validates the blocks.

Key Differences
1. Hash Algorithm:
   - Bitcoin uses SHA-256 (part of the SHA-2 family).
   - Bitgesell uses Keccak (the original before it became SHA-3).

2. Attack Resistance:
   - SHA-256 is robust against most known attacks but can be vulnerable to length extension attacks.
   - Keccak, on the other hand, is designed to be resistant to these attacks.

3. Structure and Design:
   - SHA-256 is based on a modified Feistel network structure.
   - Keccak uses a sponge structure, which allows for greater flexibility and efficiency in hardware.

4. Performance and Implementation:
   - SHA-256 has optimized performance across various platforms due to its long adoption.
   - Keccak can be more efficient in specific hardware implementations and is more flexible in terms of security configurations and hash size.

These differences influence how each blockchain performs mining and block validation, affecting security, efficiency and resistance to certain types of attacks.


Comments

Popular posts from this blog

TWO PRIVATE MONEYS

Bitgesell Halvings List

Bitgesell - TOKEN WBGL EQUAL TO BGL COIN