{"title":"Evaluation of Hash Algorithm Performance for Cryptocurrency Exchanges Based on Blockchain System","authors":"Abel C. H. Chen","doi":"arxiv-2408.11950","DOIUrl":null,"url":null,"abstract":"The blockchain system has emerged as one of the focal points of research in\nrecent years, particularly in applications and services such as\ncryptocurrencies and smart contracts. In this context, the hash value serves as\na crucial element in linking blocks within the blockchain, ensuring the\nintegrity of block contents. Therefore, hash algorithms represent a vital\nsecurity technology for ensuring the integrity and security of blockchain\nsystems. This study primarily focuses on analyzing the security and execution\nefficiency of mainstream hash algorithms in the Proof of Work (PoW)\ncalculations within blockchain systems. It proposes an evaluation factor and\nconducts comparative experiments to evaluate each hash algorithm. The\nexperimental results indicate that there are no significant differences in the\nsecurity aspects among SHA-2, SHA-3, and BLAKE2. However, SHA-2 and BLAKE2\ndemonstrate shorter computation times, indicating higher efficiency in\nexecution.","PeriodicalId":501291,"journal":{"name":"arXiv - CS - Performance","volume":"88 1","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2024-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"arXiv - CS - Performance","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/arxiv-2408.11950","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
The blockchain system has emerged as one of the focal points of research in
recent years, particularly in applications and services such as
cryptocurrencies and smart contracts. In this context, the hash value serves as
a crucial element in linking blocks within the blockchain, ensuring the
integrity of block contents. Therefore, hash algorithms represent a vital
security technology for ensuring the integrity and security of blockchain
systems. This study primarily focuses on analyzing the security and execution
efficiency of mainstream hash algorithms in the Proof of Work (PoW)
calculations within blockchain systems. It proposes an evaluation factor and
conducts comparative experiments to evaluate each hash algorithm. The
experimental results indicate that there are no significant differences in the
security aspects among SHA-2, SHA-3, and BLAKE2. However, SHA-2 and BLAKE2
demonstrate shorter computation times, indicating higher efficiency in
execution.