bitcoin support number 18552709666 bitcoin customer service number bitcoin cryptocurrencies | Page 6
Berentsen and Schär
ated Bitcoin units through this activity. The miner can succeed in doing this if he or she can
convince all other network participants to add his or her block candidate to their copies of
the Bitcoin Blockchain.
Bitcoin mining is permissionless. Anyone can become a miner by downloading the respec-
tive software and the most recent copy of the Bitcoin Blockchain. In practice, however, there
are a few large miners that produce most of the new generally accepted blocks. The reason is
that competition has become fierce and only large mining farms with highly specialized hard-
ware and access to cheap electricity can still make a profit from mining.
For a block candidate to be generally accepted, it must fulfill a specific set of predefined
criteria. For instance, all included transactions must be legitimate. Another important crite-
rion is the so-called “fingerprint” of the block candidate. A miner obtains this fingerprint by
computing the block candidate’s hash value using the hash function dSHA256.
For example, we will look at the hash value for the text, “Federal Reserve Bank of Saint
Louis.” The fingerprint of this text, which was calculated using the hash function dSHA256, is
72641707ba7c9be334f111ef5238f4a0b355481796fdddfdaac4c5f2320eea68.
Now notice the small change in the original text to “federal Reserve Bank of Saint Louis.” It
will cause an unpredictable change of the fingerprint, which can be seen from the correspond-
ing new hash value:
423f5dd7246de6faf8b839c41bf46d303014cffa65724ab008431514e36c4dba.
As suggested by this example, a data file’s hash value cannot be prognosticated.
This characteristic is employed in the mining process as follows. For a block candidate to
be accepted by all miners, its fingerprint must possess an extremely rare feature: The hash
value must be below a certain threshold value—that is, it must display several zeroes at the
beginning of the fingerprint. An example of a fingerprint of a block that was added to the
Bitcoin Blockchain in 2010 is given in the following example:
Block #69785 (July 23rd, 2010, 12:09:36 CET)
0000000000
1 4 2 4 3 293b78a2833b45d78e97625 f 6484ddd1accbe0067c2b8 f 98b57995
Need to be zero
Miners are continuously trying to find block candidates that have a hash value satisfying the
above mentioned criterion. For this purpose, a block includes a data field (called the nonce)
that contains arbitrary data. Miners modify this arbitrary data in order to gain a new finger-
print. These modifications do not affect the set of included transactions. Just as with our
example, every modification results in a new hash value. Most of the time, the hash value lies
above the threshold value, and the miner discards the block candidate. If, however, a miner
succeeds in creating a block candidate with a hash value below the current threshold value,
he or she broadcasts the block candidate as quickly as possible to the network. All the other
network participants can then easily verify that the fingerprint satisfies the threshold criterion
by computing it themselves.
6
First Quarter 2018
Federal Reserve Bank of St. Louis REVIEW