Modified SHA256 For Block Chain
Modified SHA256 For Block Chain
M Merchant
Fig. 3. Code Snippet
BC Blockchain
Like blockchain transactions, all parties must agree to R Request
accept particular method by which transactions occurs. This
being done through determining the hash, validating the block Ts Timestamp
with trusted signatures. Ku Public key
Leading the way for what could be possible for within other N Nonce
realms with Blockchain is to explore its mechanism so that it AT Authentication Token
can be practically useful for any possible application.
Exploration and harnessing to blockchain technology has been TS Timestamp
slow to other sector due to budgetary limitations, One of the H Hash value
main reasons is the security protocol being used in blockchain
requires high en computing devices for optimum transactions. ID Customer Identification
With these, the researcher tends to modify SHA256 lessening
the weight of its computation but maintaining its strong
security. The following are the procedures performed by the
proposed modification of SHA256 security protocol and how
these steps covers security aspects of online transactions:
The block on a blockchain is using SHA256 hash
algorithm. A customized token in a new block (nVer)
composed of a previos block (HPrB), the hash values and
nonce (N). A key resolver will be used for two sign token
carrying the timestamp (TS), where verification and
authentication happens.
A modified SHA256 (MSHA256) will be computed through
the concatenation of the above mention elements:
MSHA2562(nVer||HPrB||TS||N)
REFERENCES