
I will always be here but maybe not every day, I am the same as you guys, eating and drinking as well as playing and resting, this is just a simple education about Cryptography especially the entropy of each Cryptography that you can learn SHA-256 Part of the SHA-2 family, this algorithm produces a 256-bit (32-byte) hash value. Hᵢ = Hᵢ₋₁ + (Ch(E,F,G) + Σ₁(E) + Wᵢ + Kᵢ) Recommendations for complex but still easy to apply elementals Keccak (SHA-3) Based on sponge construction, resistant to attacks that compromise SHA-2. S' = Keccak-p[1600, 24](S ⊕ P) Suitable for service or service RIPEMD-256 An improved version of RIPEMD with a 256-bit output size. H = Lₙ ∥ Rₙ where Lᵢ = F(Lᵢ₋₁, mᵢ) Stronger than SHA-256 and only suitable for one role per elemental RIPEMD-320 Extended version with 320-bit output for enhanced security. H = Lₙ ∥ Rₙ ∥ Eₙ Useful for privacy either personal or state E-documents if needed SHA-256 Detailed Calculation // Message Schedule Expansion For i from 16 to 63: s0 = rightrotate(W[i-15], 7) XOR rightrotate(W[i-15], 18) XOR (W[i-15] >> 3) s1 = rightrotate(W[i-2], 17) XOR rightrotate(W[i-2], 19) XOR (W[i-2] >> 10) W[i] = W[i-16] + s0 + W[i-7] + s1 // Compression Function For i from 0 to 63: S1 = rightrotate(e, 6) XOR rightrotate(e, 11) XOR rightrotate(e, 25) ch = (e AND f) XOR ((NOT e) AND g) temp1 = h + S1 + ch + K[i] + W[i] S0 = rightrotate(a, 2) XOR rightrotate(a, 13) XOR rightrotate(a, 22) maj = (a AND b) XOR (a AND c) XOR (b AND c) temp2 = S0 + maj h = g g = f f = e e = d + temp1 d = c c = b b = a a = temp1 + temp2 Warning that Qubits will never exist but SHA-256 needs to be upgraded in the temp2 section before later Bit 1 Perform the baseline rate Keccak (SHA-3) Calculation Framework // Theta (θ) step For all pairs (x,z): C[x,z] = A[x,0,z] XOR A[x,1,z] XOR A[x,2,z] XOR A[x,3,z] XOR A[x,4,z] For all pairs (x,z): D[x,z] = C[(x-1) mod 5, z] XOR C[(x+1) mod 5, (z-1) mod 64] For all triples (x,y,z): A'[x,y,z] = A[x,y,z] XOR D[x,z] // Rho (ρ) and Pi (π) steps For all pairs (x,y): (x',y') = (y mod 5, (2x+3y) mod 5) For all z: A''[x',y',z] = A'[x,y,(z-(r[x,y])) mod 64] where r[x,y] is a rotation constant // Chi (χ) step For all triples (x,y,z): A'''[x,y,z] = A''[x,y,z] XOR ((NOT A''[(x+1) mod 5,y,z]) AND A''[(x+2) mod 5,y,z]) // Iota (ι) step - adds round constants A''''[0,0,z] = A'''[0,0,z] XOR RC[i][z] Actually, if you create an Altcoin with KECCAK Cryptography, then it is irrelevant plus Hackers will easily find loopholes because the constant arrangement of this Cryptography is XOR-based RIPEMD-256 Calculation Structure // RIPEMD-256 uses two parallel instances of RIPEMD-128 // Initialization Vectors h0[0..3] = (0x67452301, 0xEFCDAB89, 0x98BADCFE, 0x10325476) h1[0..3] = (0x76543210, 0xFEDCBA98, 0x89ABCDEF, 0x01234567) // Processing For each 512-bit message block: // Copy state A = h0[0]; B = h0[1]; C = h0[2]; D = h0[3]; A' = h1[0]; B' = h1[1]; C' = h1[2]; D' = h1[3]; // 64 steps of transformation For t = 0 to 63: T = rol_s(A + f(t,B,C,D) + X[r(t)] + K(t), s(t)) A = D; D = C; C = B; B = T; T = rol_s(A' + f(63-t,B',C',D') + X[r'(t)] + K'(t), s'(t)) A' = D'; D' = C'; C' = B'; B' = T; // Combine results T = h1[1] + C + D'; h1[1] = h0[1] + D + A'; h0[1] = T; // Final 256-bit hash is (h0[0], h1[0], h0[1], h1[1], h0[2], h1[2], h0[3], h1[3]) This may be suitable for those of you who want to create an Altcoin with solid cryptography, but it is necessary to pay attention to excess consumption if with this, add 448 Bit EdDSA RIPEMD-320 Calculation Structure // RIPEMD-320 uses five parallel instances extended from RIPEMD-160 // Initialization Vectors h0[0..4] = (0x67452301, 0xEFCDAB89, 0x98BADCFE, 0x10325476, 0xC3D2E1F0) h1[0..4] = (0x76543210, 0xFEDCBA98, 0x89ABCDEF, 0x01234567, 0x3C2D1E0F) // Processing For each 512-bit message block: // Copy state A1 = h0[0]; B1 = h0[1]; C1 = h0[2]; D1 = h0[3]; E1 = h0[4]; A2 = h1[0]; B2 = h1[1]; C2 = h1[2]; D2 = h1[3]; E2 = h1[4]; // 80 steps of transformation with 5 rounds each For t = 0 to 79: // Left line T = rol_s(A1 + f_j(t,B1,C1,D1) + X[r_j(t)] + K_j(t), s_j(t)) + E1; A1 = E1; E1 = D1; D1 = rol_10(C1); C1 = B1; B1 = T; // Right line T = rol_s(A2 + f_j(79-t,B2,C2,D2) + X[r'_j(t)] + K'_j(t), s'_j(t)) + E2; A2 = E2; E2 = D2; D2 = rol_10(C2); C2 = B2; B2 = T; // Combine results T = h1[1] + C1 + D2; h1[1] = h0[1] + D1 + E2; h0[1] = T; // Final 320-bit hash combines both line results // (h0[0], h1[0], h0[1], h1[1], h0[2], h1[2], h0[3], h1[3], h0[4], h1[4]) RIPEMD-320 may not be suitable for all of your Cryptography creations but for Privacy it will be suitable if you have a specific wallet, read how the 5 Rounds work.