SHA-256SW: Demonstrating Flaws in Hash Functions & PoW Bypass

SHA-256SW is a deliberately weakened version of SHA-256. This demonstration explores how its flaw can be exploited for various attacks, including bypassing Proof-of-Work, a core security mechanism for cryptocurrencies.

IMPORTANT DISCLAIMER: This page demonstrates vulnerabilities in SHA-256SW, a deliberately flawed hash function for educational purposes. The actual, cryptographically secure SHA-256 algorithm used in Bitcoin and other applications remains robust and is NOT broken by these methods.

The Critical Flaw: Invertibility & Reduced Diffusion

The attack is possible due to a deliberate flaw in this hash function's message schedule expansion (the process by which initial message blocks are expanded into 64 words). In standard SHA-256, future message words are complex combinations of past words, ensuring strong bit diffusion.

In this SHA-256SW implementation, a simple internal array `hs_b` is used, and the flaw manifests with a rule like hs_b[i+20] = hs_b[i+4]. This creates a direct, predictable relationship between certain internal state values and original message words.

The Flaw in Detail:

Why This Breaks Cryptographic Security:

Why Standard SHA-256 Remains Secure

The standard SHA-256 algorithm (and other secure cryptographic hashes like SHA-3, BLAKE2) prevents these attacks through fundamental design principles:

These properties are meticulously designed and rigorously tested to ensure SHA-256's continued cryptographic strength against practical attacks.

Attack & Mining Controls

1. Select Attack/Mining Mode:

2. Set Mining Difficulty (Leading Zeros)

22

For PoW modes: Specify the number of leading zeros for the hash to target. Each step up makes it exponentially harder.

> System idle. Select a mode and click START.