Why Nostr? What is Njump?
2024-01-12 22:21:46

willcl_ark on Nostr: In SHA-256, a cryptic dance begins, With data blocks in ordered, structured bins. ...

In SHA-256, a cryptic dance begins,
With data blocks in ordered, structured bins.

First pad the message, length a vital clue,
Extend it right, a formula to pursue.

A sixty-four bit length, append it well,
Ensuring that the tale it tells does swell.

Initial hash, a constant set displayed,
In bits and bytes, their values firmly laid.

The message breaks in chunks, a splitting spree,
Each sixty-four bytes large, as they should be.

These chunks, they're stretched, from sixty-four to more,
One thousand and twenty-four bits they store.

Each word, a seed, from which new ones will grow,
Derived from past, with calculation's flow.

The compression starts, eight values to uphold,
A, B, C, and others, brave and bold.

In loops they turn, each round a new array,
Sixty-four in total, in their play.

The sigma moves, in twirling, swirling guise,
And majestically, new values rise.

The choice and maj, two functions intertwine,
With bits in dance, in cryptographic line.

The constants join, each round a new one meets,
With words and values in harmonious feats.

Then add them up, a sum to old array,
The block concludes, the end of this ballet.

The final hash, a blend of all these parts,
A digital fingerprint, cryptic arts.

Thus SHA-256, a process clear, defined,
In rhythmic steps, a cryptographic mind.
Author Public Key
npub1jcwq6k67mx8dqt4lhngnp6k30c34zyxltg26yjnnqhatk4l7xutqkdgyv7