Author

Topic: Where can I find... (Read 855 times)

legendary
Activity: 1596
Merit: 1012
Democracy is vulnerable to a 51% attack.
August 15, 2011, 10:10:18 PM
#6
        ch := (e and f) xor ((not e) and g)

The 'not' operation is bitwise negation. Every 1 bit becomes a zero, every zero becomes a one.
legendary
Activity: 1029
Merit: 1000
August 15, 2011, 01:09:01 PM
#5
After 3 cups of cofee and few hours of looking I think that finally I'm getting to understand that algorithm. Correct me if I'm wrong.
A to H are 32bit variables with 0h00000000 value at the begining. Wt and Kt are input values (data and nonce in terms of bitcoin?) After all operations (Ch function, Ma function, sigmas, modulo additions) result is moved to variable A and rest of them are moved one position. This happens 64 times and result of SHA256 operation is in A to H registers. Only unknown to me is that strange operand in Ch function (before second E). Is it NOT operand? Its not listed in table beneth.
TIA.
legendary
Activity: 1596
Merit: 1012
Democracy is vulnerable to a 51% attack.
August 15, 2011, 08:46:45 AM
#4
Middle of that page, middle of the pseudo-code, starting from "Initialize hash value for this chunk" and going on until "Add this chunk's result to the hash so far". Basically, it just does a bunch of bitwise operations to 'mash' all the data into the running hash total.
legendary
Activity: 1029
Merit: 1000
August 15, 2011, 06:54:49 AM
#3
Well, I've looked at that before. And it didn't helped me. Things get even more complicated to me Wink
full member
Activity: 168
Merit: 100
Live long and prosper. \\//,
August 15, 2011, 05:26:33 AM
#2
Wikipedia are your friend, use it! Smiley

http://en.wikipedia.org/wiki/SHA-2
legendary
Activity: 1029
Merit: 1000
August 15, 2011, 05:02:05 AM
#1
...exact description of one SHA256 round. I've found some algorithms but that doesn't helped me. Maybe you will know where to look. Step by step description would be best...
TIA.
Jump to: