-
bitcoin $87959.907984 USD
1.34% -
ethereum $2920.497338 USD
3.04% -
tether $0.999775 USD
0.00% -
xrp $2.237324 USD
8.12% -
bnb $860.243768 USD
0.90% -
solana $138.089498 USD
5.43% -
usd-coin $0.999807 USD
0.01% -
tron $0.272801 USD
-1.53% -
dogecoin $0.150904 USD
2.96% -
cardano $0.421635 USD
1.97% -
hyperliquid $32.152445 USD
2.23% -
bitcoin-cash $533.301069 USD
-1.94% -
chainlink $12.953417 USD
2.68% -
unus-sed-leo $9.535951 USD
0.73% -
zcash $521.483386 USD
-2.87%
What algorithm is used for the hash function of a wallet address?
Cryptocurrency wallets use hash functions like SHA-256 and Keccak-256 to generate secure, unique addresses through cryptographic hashing of public keys.
Jun 16, 2025 at 01:56 pm
Understanding the Role of Hash Functions in Cryptocurrency Wallets
In the world of cryptocurrency, wallet addresses are essential for sending and receiving digital assets. These addresses are derived from cryptographic operations that ensure security and uniqueness. One of the core components involved in generating a wallet address is the hash function. A hash function takes an input (or 'message') and returns a fixed-size string of bytes, which is typically represented as a hexadecimal number.
The use of hash functions in cryptocurrency wallets serves multiple purposes: it ensures data integrity, provides a unique identifier, and enhances overall security. The process of deriving a wallet address involves several cryptographic steps, with hashing being one of the most crucial.
The SHA-256 Algorithm in Bitcoin Wallet Addresses
One of the most commonly used algorithms in cryptocurrency is SHA-256, particularly in Bitcoin. The Secure Hash Algorithm 256-bit (SHA-256) is part of the SHA-2 family developed by the National Institute of Standards and Technology (NIST). In Bitcoin's case, the public key generated from the Elliptic Curve Digital Signature Algorithm (ECDSA) is first hashed using SHA-256, followed by another hash using RIPEMD-160.
This two-step hashing process produces a shorter and more manageable address while maintaining high levels of security. The output of the RIPEMD-160 hash is then encoded using Base58Check to generate the final wallet address visible to users.
- Step 1: Generate the ECDSA public key.
- Step 2: Apply SHA-256 to the public key.
- Step 3: Apply RIPEMD-160 to the result of Step 2.
- Step 4: Add a version byte at the beginning of the RIPEMD-160 hash.
- Step 5: Perform double SHA-256 on the modified hash to create a checksum.
- Step 6: Append the first four bytes of the checksum to the modified hash.
- Step 7: Encode the final binary data using Base58Check.
Ethereum’s Use of Keccak-256 for Address Generation
Unlike Bitcoin, Ethereum uses a different algorithm known as Keccak-256 for generating wallet addresses. Keccak-256 is the hash function selected as the basis for the SHA-3 standard, although Ethereum implemented it before the standard was finalized. It offers similar security properties but differs in internal structure and processing.
In Ethereum, the wallet address is derived directly from the public key. The process involves hashing the public key using Keccak-256 and taking the last 20 bytes (160 bits) of the resulting hash. This shorter length allows for compact representation while still providing a vast number of possible unique addresses.
- Step 1: Derive the public key from the private key using ECDSA (secp256k1 curve).
- Step 2: Apply Keccak-256 hashing to the public key.
- Step 3: Extract the last 20 bytes of the Keccak-256 hash.
- Step 4: Convert these bytes into a hexadecimal string prefixed with '0x'.
It's important to note that Ethereum also introduced checksum addressing through EIP-55, which allows mixed-case encoding to detect typos and prevent errors during transactions.
Other Cryptocurrencies and Their Hashing Algorithms
While Bitcoin and Ethereum represent two major ecosystems, many other cryptocurrencies have adopted different hashing algorithms based on their design goals. For example:
- Litecoin uses the same combination of SHA-256 and RIPEMD-160 as Bitcoin.
- Monero employs Keccak and Blake2b among others in its RingCT protocol and wallet generation.
- Zcash utilizes Blake2b as its primary hash function in certain privacy-preserving protocols.
Each blockchain may tailor its cryptographic approach depending on whether it prioritizes speed, quantum resistance, or compatibility with existing systems. The choice of hash function often reflects broader architectural decisions within the blockchain network.
Hash Function Security Considerations
Security is paramount when selecting a hash function for wallet address generation. A secure hash function must exhibit properties such as collision resistance, pre-image resistance, and second pre-image resistance. These properties ensure that it is computationally infeasible to find two different inputs producing the same output, reverse-engineer the input from the output, or find a second input that maps to the same output as a given input.
Both SHA-256 and Keccak-256 are currently considered secure against known attacks. However, the cryptographic community continuously evaluates these algorithms as computing power increases and new attack vectors emerge.
Frequently Asked Questions
Why not use SHA-1 or MD5 for generating wallet addresses?These older hash functions are vulnerable to collision attacks and are no longer considered secure for cryptographic purposes. Modern blockchains avoid them to ensure robust security standards.
Can two different public keys produce the same wallet address?Theoretically, yes, due to the pigeonhole principle — there are more possible public keys than addresses. However, the probability is astronomically low due to the large output size of hash functions like SHA-256 and Keccak-256.
Is Base58Check encoding related to the hash function itself?No, Base58Check is an encoding scheme used after hashing to make addresses more user-friendly and error-resistant. It does not involve the hash function directly but plays a role in final address formatting.
Do all wallet types follow the same hashing procedure?No, newer wallet formats or advanced protocols (like SegWit in Bitcoin) may introduce variations in how hashes are applied. Always check the specific derivation path and hashing sequence for the wallet type in question.
Disclaimer:info@kdj.com
The information provided is not trading advice. kdj.com does not assume any responsibility for any investments made based on the information provided in this article. Cryptocurrencies are highly volatile and it is highly recommended that you invest with caution after thorough research!
If you believe that the content used on this website infringes your copyright, please contact us immediately (info@kdj.com) and we will delete it promptly.
- Hyperliquid's HIP-3 Ignites DEX Launch Frenzy: Proof-of-Activity and IP Membership Set to Reshape Trading
- 2026-02-07 13:00:02
- Hold Onto Your Hats: 1983 'New Pence' 2p Coins Could Be Worth £1,000 Today!
- 2026-02-07 12:40:07
- Bithumb's Bitcoin Bonanza: An Accidental Windfall Triggers Localized Market Dump
- 2026-02-07 10:10:01
- Big Apple Bites: While Ethereum Grapples, DeepSnitch AI Whispers of a 1000x Run
- 2026-02-07 06:30:02
- Token cat appointments furong tian to lead audit Amdst Strategic Reshffle
- 2026-02-07 06:40:01
- Coinbase Expands Roadmap, Navigating Cryptocurrency's Evolving Landscape
- 2026-02-07 10:05:02
Related knowledge
How to generate a new receiving address for Bitcoin privacy?
Jan 28,2026 at 01:00pm
Understanding Bitcoin Address Reuse Risks1. Reusing the same Bitcoin address across multiple transactions exposes transaction history to public blockc...
How to view transaction history on Etherscan via wallet link?
Jan 29,2026 at 02:40am
Accessing Wallet Transaction History1. Navigate to the official Etherscan website using a secure and updated web browser. 2. Locate the search bar pos...
How to restore a Trezor wallet on a new device?
Jan 28,2026 at 06:19am
Understanding the Recovery Process1. Trezor devices rely on a 12- or 24-word recovery seed generated during initial setup. This seed is the sole crypt...
How to delegate Tezos (XTZ) staking in Temple Wallet?
Jan 28,2026 at 11:00am
Accessing the Staking Interface1. Open the Temple Wallet browser extension or mobile application and ensure your wallet is unlocked. 2. Navigate to th...
How to set up a recurring buy on a non-custodial wallet?
Jan 28,2026 at 03:19pm
Understanding Non-Custodial Wallet Limitations1. Non-custodial wallets do not store private keys on centralized servers, meaning users retain full con...
How to protect your wallet from clipboard hijacking malware?
Jan 27,2026 at 10:39pm
Understanding Clipboard Hijacking in Cryptocurrency Wallets1. Clipboard hijacking malware monitors the system clipboard for cryptocurrency wallet addr...
How to generate a new receiving address for Bitcoin privacy?
Jan 28,2026 at 01:00pm
Understanding Bitcoin Address Reuse Risks1. Reusing the same Bitcoin address across multiple transactions exposes transaction history to public blockc...
How to view transaction history on Etherscan via wallet link?
Jan 29,2026 at 02:40am
Accessing Wallet Transaction History1. Navigate to the official Etherscan website using a secure and updated web browser. 2. Locate the search bar pos...
How to restore a Trezor wallet on a new device?
Jan 28,2026 at 06:19am
Understanding the Recovery Process1. Trezor devices rely on a 12- or 24-word recovery seed generated during initial setup. This seed is the sole crypt...
How to delegate Tezos (XTZ) staking in Temple Wallet?
Jan 28,2026 at 11:00am
Accessing the Staking Interface1. Open the Temple Wallet browser extension or mobile application and ensure your wallet is unlocked. 2. Navigate to th...
How to set up a recurring buy on a non-custodial wallet?
Jan 28,2026 at 03:19pm
Understanding Non-Custodial Wallet Limitations1. Non-custodial wallets do not store private keys on centralized servers, meaning users retain full con...
How to protect your wallet from clipboard hijacking malware?
Jan 27,2026 at 10:39pm
Understanding Clipboard Hijacking in Cryptocurrency Wallets1. Clipboard hijacking malware monitors the system clipboard for cryptocurrency wallet addr...
See all articles














