Blocks Found: 0
Cryptography Fundamentals

SHA-256:
The Math Behind Mining

Understand why mining requires massive computation. Discover how a simple hash function creates an unbreakable proof-of-work system.

SHA-256 Visualizer

See how miners change the nonce millions of times to find a hash below the target. This is the mathematical foundation of Bitcoin.

0
Attempts0
Progress to target0 / 2 zeros
0000000000000000000000000000000000000000000000000000000000000000

What is SHA-256?

A cryptographic one-way function that turns any input into a fixed 64-character hexadecimal fingerprint. Impossible to reverse.

Proof of Work

Finding a hash with specific properties requires brute force. This energy expenditure secures the network against attacks.

The Avalanche Effect

Change just one character in the input, and the entire hash changes completely. This ensures tampering is immediately visible.

What is SHA-256?

SHA-256 (Secure Hash Algorithm 256-bit) is a cryptographic hash function that transforms any amount of data into a fixed 64-character hexadecimal string. Think of it as a digital fingerprint—every piece of data has a unique hash, and even the tiniest change produces a completely different result.

Key Properties:

  • Deterministic: The same input always produces the same hash.
  • One-way: You cannot reverse-engineer the input from the hash.
  • Avalanche Effect: Change one bit, and the entire hash changes completely.
  • Collision Resistant: It's virtually impossible to find two different inputs with the same hash.

The Mining Process

Bitcoin mining is essentially a guessing game. Miners take a block of transactions, add a random number called a nonce (Number used ONCE), and hash the result. The goal? Find a hash that starts with a specific number of zeros.

1️⃣

Prepare Block

Combine transactions, previous hash, timestamp, and nonce

2️⃣

Calculate Hash

Run SHA-256 on the block data to get a 64-character hash

3️⃣

Check Target

Does the hash have enough leading zeros? If yes, you win!

If the hash doesn't meet the target, miners change the nonce and try again. And again. Billions of times per second, across the entire network. This is what makes Bitcoin secure—the energy required to attack the network is far greater than any potential reward.

Why Proof-of-Work Works

The genius of Bitcoin's proof-of-work is that it requires real-world resources—electricity and specialized hardware—to produce valid blocks. This creates several important properties:

  • 1
    Cost to Attack: To rewrite blockchain history, an attacker would need to control more than 50% of the network's hash power—requiring billions of dollars in hardware and electricity.
  • 2
    Fair Distribution: Anyone with the hardware can participate. No special permissions required.
  • 3
    Predictable Issuance: The difficulty adjustment ensures blocks are found every 10 minutes on average, regardless of how much hash power joins the network.

The Energy Question

Yes, Bitcoin uses significant energy. But this is the cost of having a truly decentralized, censorship-resistant monetary system. The energy isn't "wasted"—it's securing hundreds of billions of dollars in value and providing financial freedom to millions of people worldwide.

Try It Yourself

Go back to the visualizer above and experiment! Try different difficulty levels, change the input data, and see how the hash changes. Turn on auto-mining and watch the attempts counter climb as the computer searches for a valid block.

Next Lesson

Solo vs Pool Mining: The Variance Simulator

Now that you understand the math, see why most miners join pools instead of going solo.