Benchmarking SHA256 vs Scrypt in Blockchain Block Discovery

PDF (659KB), PP.39-49

Views: 0 Downloads: 0

Author(s)

Fitria 1,* Joko Triloka 1 Eko Win Kenali 2 Riko Herwanto 1,3

1. Darmajaya Institute of Informatics and Business, Faculty of Computer Science, Bandar Lampung 35142, Indonesia

2. Lampung State Polytechnic, Information Technology Department, Software Engineering Technology Study Program, Bandar Lampung, 35141, Indonesia

3. Lampung University, Doctoral Program of Computer Science, Faculty of Mathematics and Science, Bandar Lampung, 35141, Indonesia

* Corresponding author.

DOI: https://doi.org/10.5815/ijmsc.2025.04.04

Received: 2 Mar. 2025 / Revised: 12 Jun. 2025 / Accepted: 13 Sep. 2025 / Published: 8 Dec. 2025

Index Terms

Blockchain, Comparison, Proof of Works, Scrypt, SHA256

Abstract

Blockchain technology has emerged as a pivotal innovation across multiple sectors due to its decentralized nature, secure transaction processing, and transparency. Central to blockchain operations are cryptographic hashing algorithms like SHA256 and Scrypt, which play a crucial role in ensuring transaction integrity and security. This study conducts a comprehensive benchmarking analysis of SHA256 and Scrypt, focusing on their performance in blockchain block discovery, specifically evaluating hashing speed and block discovery probability. SHA256, known for its high hashing speed, demonstrated rates reaching 101.111 kH/s during a 10-hour test, whereas Scrypt performed at a slower average speed of 9 kH/s. However, Scrypt exhibited a higher probability of block discovery, achieving up to 8.18%, significantly surpassing SHA256's near-zero probability under similar conditions. Tests across various CPUs underscore these differences: SHA256 excels in raw hashing speed, while Scrypt’s memory-intensive design offers greater ASIC resistance and a higher likelihood of block discovery, especially in environments that demand enhanced security. These findings highlight the importance of choosing an algorithm aligned with the specific requirements of a blockchain application, balancing speed, security, and resistance to specialized hardware attacks. The study suggests that hybrid approaches combining SHA256’s speed with Scrypt’s security features could maximize both efficiency and security, contributing valuable insights into the ongoing optimization of blockchain technology.

Cite This Paper

Fitria, Joko Triloka, Eko Win Kenali, Riko Herwanto, "Benchmarking SHA256 vs Scrypt in Blockchain Block Discovery", International Journal of Mathematical Sciences and Computing(IJMSC), Vol.11, No.4, pp. 39-49, 2025. DOI: 10.5815/ijmsc.2025.04.04

Reference

[1]A. Bahalul Haque and M. Rahman, “Blockchain Technology: Methodology, Application and Security Issues,” 2020.
[2]SivanesanR, AshwinS, VigneshP, and ManikandanG, “AN OVERVIEW OF BLOCKCHAIN TECHNOLOGY,” Int. Res. J. Eng. Technol., [Online]. Available: www.irjet.net
[3]O. Sadeghi, V. Paprotski, A. Jacobsen, V. Berestetsky, and P. Coulthard, Blockchain technology, no. April 2018. 2020. doi: 10.1515/ci-2020-0304.
[4]S. I. M. Ali, H. Farouk, and H. Sharaf, “A blockchain-based models for student information systems,” Egypt. Informatics J., vol. 23, no. 2, pp. 187–196, 2022, doi: 10.1016/j.eij.2021.12.002.
[5]K. N. Ambili, M. Sindhu, and M. Sethumadhavan, “On federated and proof of validation based consensus algorithms in blockchain,” IOP Conf. Ser. Mater. Sci. Eng., vol. 225, no. 1, 2017, doi: 10.1088/1757-899X/225/1/012198.
[6]S. Jabbar, H. Lloyd, M. Hammoudeh, B. Adebisi, and U. Raza, “Blockchain-enabled supply chain: analysis, challenges, and future directions,” Multimed. Syst., vol. 27, no. 4, pp. 787–806, 2021, doi: 10.1007/s00530-020-00687-0.
[7]W. Laurier, “Blockchain Value Networks.”
[8]O. Pal, B. Alam, V. Thakur, and S. Singh, “Key management for blockchain technology,” ICT Express, vol. 7, no. 1, 2021, doi: 10.1016/j.icte.2019.08.002.
[9]D. K. Lam, V. T. D. Le, and T. H. Tran, “Efficient Architectures for Full Hardware Scrypt-Based Block Hashing System,” Electron., vol. 11, no. 7, pp. 1–17, 2022, doi: 10.3390/electronics11071068.
[10]A. Kuznetsov, I. Oleshko, V. Tymchenko, K. Lisitsky, M. Rodinko, and A. Kolhatin, “Performance analysis of cryptographic hash functions suitable for use in blockchain,” Int. J. Comput. Netw. Inf. Secur., vol. 13, no. 2, pp. 1–15, 2021, doi: 10.5815/IJCNIS.2021.02.01.
[11]G. Song and H. Seo, “Grover on Scrypt,” 2024.
[12]J. S. Coron and J. B. Nielsen, “Preface,” Lect. Notes Comput. Sci. (including Subser. Lect. Notes Artif. Intell. Lect. Notes Bioinformatics), vol. 10212 LNCS, pp. V–VI, 2017, doi: 10.1007/978-3-319-56617-7.
[13]B. Chen, W. Zhang, Y. Shi, D. Lv, and Z. Yang, “Reliable and efficient emergency rescue networks: A blockchain and fireworks algorithm-based approach,” Comput. Commun., vol. 206, no. February, pp. 172–177, 2023, doi: 10.1016/j.comcom.2023.05.005.
[14]A. Alofi, M. A. Bokhari, R. Bahsoon, and R. Hendley, “Optimizing the Energy Consumption of Blockchain-Based Systems Using Evolutionary Algorithms: A New Problem Formulation,” IEEE Trans. Sustain. Comput., vol. 7, no. 4, pp. 910–922, 2022, doi: 10.1109/TSUSC.2022.3160491.
[15]J. Leng, M. Zhou, J. L. Zhao, Y. Huang, and Y. Bian, “Blockchain Security: A Survey of Techniques and Research Directions,” IEEE Trans. Serv. Comput., vol. 15, no. 4, pp. 2490–2510, 2022, doi: 10.1109/TSC.2020.3038641.
[16]M. Vivekanandan and S. V. N. S. R. U, “Blockchain based Privacy Preserving User Authentication Protocol for Distributed Mobile Cloud Environment,” pp. 1572–1595, 2021.
[17]C. Li et al., “A decentralized blockchain with high throughput and fast confirmation,” Proc. 2020 USENIX Annu. Tech. Conf. ATC 2020, pp. 515–528, 2020.
[18]Y. Soulaimani, “Blockchain and hashing algorithms : A review,” vol. 11, no. 3, pp. 140–157, 2023.
[19]R. Beck, J. Stenum Czepluch, N. Lollike, and S. Malone, “Blockchain - The gateway to trust-free cryptographic transactions,” 24th Eur. Conf. Inf. Syst. ECIS 2016, pp. 1–14, 2016.
[20]G. Chen, B. Xu, M. Lu, and N.-S. Chen, “Exploring blockchain technology and its potential applications for education,” Smart Learn. Environ., vol. 5, no. 1, pp. 1–10, 2018, doi: 10.1186/s40561-017-0050-x.
[21]R. Yasaweerasinghelage, M. Staples, and I. Weber, “Predicting Latency of Blockchain-Based Systems Using Architectural Modelling and Simulation,” Proc. - 2017 IEEE Int. Conf. Softw. Archit. ICSA 2017, no. October, pp. 253–256, 2017, doi: 10.1109/ICSA.2017.22.
[22]C. G. Akcora, M. Kantarcioglu, and Y. R. Gel, “Data Science on Blockchains,” Proc. ACM SIGKDD Int. Conf. Knowl. Discov. Data Min., pp. 4025–4026, 2021, doi: 10.1145/3447548.3470800.
[23]W. Chen, S. M. Bohloul, Y. Ma, and L. Li, “A blockchain-based information management system for academic institutions: a case study of international students’ workflow,” Inf. Discov. Deliv., vol. 50, no. 4, pp. 343–352, 2022.
[24]C. Yu, W. Yang, F. Xie, and J. He, “Technology and Security Analysis of Cryptocurrency Based on Blockchain,” Complexity, vol. 2022, 2022, doi: 10.1155/2022/5835457.
[25]M. Pilkington, “11 Blockchain technology : principles and applications,” pp. 225–253, 2015.
[26]F. Jahan, M. Mostafa, and S. Chowdhury, “SHA-256 in Parallel Blockchain Technology: Storing Land Related Documents,” Int. J. Comput. Appl., vol. 175, no. 35, pp. 33–38, 2020, doi: 10.5120/ijca2020920911.
[27]L. Grassi, D. Khovratovich, R. Lüftenegger, C. Rechberger, M. Schofnegger, and R. Walch, “Reinforced Concrete: A Fast Hash Function for Verifiable Computation,” Proc. ACM Conf. Comput. Commun. Secur., pp. 1323–1335, 2022, doi: 10.1145/3548606.3560686. 
[28]H. Guo and X. Yu, “A survey on blockchain technology and its security,” Blockchain Res. Appl., vol. 3, no. 2, p. 100067, Jun. 2022, doi: 10.1016/J.BCRA.2022.100067.
[29]S. M. Idrees, M. Nowostawski, R. Jameel, and A. K. Mourya, “Security Aspects of Blockchain Technology Intended for,” Electronics, vol. 10, no. 951, pp. 2–24, 2021.
[30]I. Eyal, A. E. Gencer, E. G. Sirer, and R. Van Renesse, “Bitcoin-NG: A scalable blockchain protocol,” Proc. 13th USENIX Symp. Networked Syst. Des. Implementation, NSDI 2016, pp. 45–59, 2016.