{"id":9766,"date":"2023-07-22T12:24:25","date_gmt":"2023-07-22T12:24:25","guid":{"rendered":"https:\/\/www.bitnovo.com\/blog\/?p=9766"},"modified":"2025-09-10T15:24:17","modified_gmt":"2025-09-10T15:24:17","slug":"what-is-the-nonce-number","status":"publish","type":"post","link":"https:\/\/www.bitnovo.com\/blog\/en\/what-is-the-nonce-number","title":{"rendered":"What is the Nonce number?"},"content":{"rendered":"<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_75 counter-hierarchy ez-toc-counter ez-toc-transparent ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">Table of Contents<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"Alternar tabla de contenidos\"><span class=\"ez-toc-js-icon-con\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #ffffff;color:#ffffff\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #ffffff;color:#ffffff\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/span><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 eztoc-toggle-hide-by-default' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/www.bitnovo.com\/blog\/en\/what-is-the-nonce-number\/#how_does_nonce_work\" >How does Nonce work?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/www.bitnovo.com\/blog\/en\/what-is-the-nonce-number\/#nonce_on_the_blockchain\" >Nonce on the Blockchain<\/a><\/li><\/ul><\/nav><\/div>\n<span class=\"span-reading-time rt-reading-time\" style=\"display: block;\"><span class=\"rt-label rt-prefix\">Tiempo de lectura:<\/span> <span class=\"rt-time\"> 3<\/span> <span class=\"rt-label rt-postfix\">minutos<\/span><\/span><p>One of the most important topics in the world of cryptocurrency cryptography is the \u201c<strong>Nonce<\/strong>\u201c. In this article we will explain what exactly it is and what is its function in the world of cryptocurrencies.<\/p>\n<p>The nonce is characterized as<strong>\u00a0a random, single use number<\/strong>. It is used in\u00a0<strong>cryptographic<\/strong>\u00a0systems, specifically in the so called\u00a0<strong>authentication<\/strong>\u00a0protocols. These numbers are generated through a random number generator. The generators can be either\u00a0<strong>software or hardware<\/strong>. Once generated, the numbers are used in a\u00a0<strong>specific cryptographic<\/strong>\u00a0function.<\/p>\n<p>The number is used<strong>\u00a0for programming the function<\/strong>. Once it has been used, the number<strong>\u00a0can never be used again<\/strong>. This is where the difficult implementation of the \u201cNonce\u201d comes from. For the process to be successful, it must be guaranteed that the number will never be repeated in the existence of the cryptographic system, which is no easy task.<\/p>\n<p>Thanks to the random generation of these numbers, the\u00a0<strong>security<\/strong>\u00a0of the cryptographic function in which it is used is guaranteed. Therefore, there cannot be any<strong>\u00a0recognizable<\/strong>\u00a0<strong>pattern<\/strong>\u00a0in its generation, since otherwise the cryptographic systems could be\u00a0<strong>broken<\/strong>\u00a0and with it the security of our\u00a0<strong>digital assets<\/strong>.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"how_does_nonce_work\"><\/span><strong>How does Nonce work?<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>When Satoshi designed the<strong>\u00a0first cryptocurrency<\/strong>,\u00a0<a href=\"https:\/\/www.bitnovo.com\/blog\/en\/what-is-bitcoin\/\">Bitcoin<\/a>, he included in its operation a strong use of cryptography. Bitcoin uses\u00a0<strong>asymmetric<\/strong>\u00a0cryptography which means that when issuing a transaction or\u00a0<strong>mining<\/strong>\u00a0a block the network makes use of the hash function called\u00a0<a href=\"https:\/\/www.bitnovo.com\/blog\/en\/what-is-sha-256-algorithm-and-how-does-it-work\/\">SHA-256<\/a>. This function makes it possible to generate unique and unrepeatable text strings.<\/p>\n<p>Like Bitcoin, many other cryptocurrencies use<strong>\u00a0cryptocurrency<\/strong>\u00a0for their operation so Nonce is much more important than we thought. However, the operation of\u00a0<strong>Nonce<\/strong>\u00a0is not limited to the<strong>\u00a0blockchain<\/strong>\u00a0alone.<\/p>\n<p>The nonce is a\u00a0<strong>34 bit or 4 byte<\/strong>\u00a0field which, as mentioned above, must not be repeated. This requires a time variant that makes its repetition impossible.<\/p>\n<p>In the case of Bitcoin, the nonce participates in the generation of a<strong>\u00a0Block ID or Block Hash<\/strong>. This Block ID is created through the consensus algorithm called\u00a0<strong>Proof of Work<\/strong>. One of the Nonce\u2019s roles is to assist in\u00a0<strong>verifying<\/strong>\u00a0that the Proof of Work has been successfully completed. The most difficult task in this process is to find it.<\/p>\n<p>This is because each block that forms the blockchain has an unrepeatable identifier. This Block ID is a\u00a0<strong>SHA-256<\/strong>\u00a0<a href=\"https:\/\/www.bitnovo.com\/blog\/en\/what-is-a-hash\/\">Hash<\/a>\u00a0that has unique characteristics as a result of an extremely\u00a0<strong>expensive mining process<\/strong>.<\/p>\n<p>In Bitcoin, when miners prepare to start mining, they take into account a set of parameters given by the network. Among these parameters is<strong>\u00a0the Hash Target or Target<\/strong>. The Hash Target\u00a0<strong>is a 256 bit wide number<\/strong>\u00a0that each Bitcoin node presents. This number dictates the maximum\u00a0<strong>decimal value<\/strong>\u00a0limit of a Block ID at a given time, that is, what a hash must measure to be accepted by the network.<\/p>\n<p>The lower the Hash Target, the more complicated it will be to find the valid block hash. To find the right combination the miners must take into account data such as the version, the\u00a0<strong>Merkle Root<\/strong>, the previous block hash, the timestamp of the block and the difficulty of the network and the nonce generated by the miner. With all of them the miner will start\u00a0<strong>the Block ID generation process<\/strong>. This is another process in which the Nonce is crucial.<\/p>\n<p>In case the miner generates a decimal hash value different from the one marked by the Target,\u00a0<strong>it will have to start the process again<\/strong>\u00a0by generating a\u00a0<strong>new Nonce<\/strong>\u00a0and recalculating the rest of the data. This means calculating a\u00a0<strong>new hash<\/strong>\u00a0until the correct solution is found. Billions of\u00a0<strong>Nonces<\/strong>\u00a0can be calculated in the process. Once the correct one has been found, the miner will be able to access\u00a0<strong>the block reward<\/strong>.<\/p>\n<p>Although the nonce has contributed to this whole process constantly, its work is not yet finished. Once the\u00a0<strong>miner<\/strong>\u00a0has solved the problem, this\u00a0<strong>solution<\/strong>\u00a0is passed to the network with all its data, including the Nonce. When the nodes receive all the\u00a0<strong>information<\/strong>, they are in charge of\u00a0<strong>verifying<\/strong>\u00a0if the miner\u2019s solution is really\u00a0<strong>valid<\/strong>\u00a0for the problem posed by the network.<\/p>\n<p>In this case, performing the verification will only take\u00a0<strong>a second<\/strong>, as it is a\u00a0<strong>very simple<\/strong>\u00a0procedure. This is due to the\u00a0<strong>Nonce<\/strong>\u00a0generated. With this number it is very easy to\u00a0<strong>check the validity<\/strong>\u00a0of the new hash.<\/p>\n<div id=\"image_1179091950\" class=\"img has-hover x md-x lg-x y md-y lg-y\">\n<div class=\"img-inner dark\"><img fetchpriority=\"high\" decoding=\"async\" class=\"attachment-large size-large lazyloaded\" src=\"https:\/\/www.bitnovo.com\/blog\/wp-content\/uploads\/2021\/06\/Que%CC%81-es-el-nu%CC%81mero-Nonce.jpg\" sizes=\"(max-width: 768px) 100vw, 768px\" srcset=\"https:\/\/www.bitnovo.com\/blog\/wp-content\/uploads\/2021\/06\/Que\u0301-es-el-nu\u0301mero-Nonce.jpg 768w, https:\/\/www.bitnovo.com\/blog\/wp-content\/uploads\/2021\/06\/Que\u0301-es-el-nu\u0301mero-Nonce-300x205.jpg 300w\" alt=\"Que\u0301 es el nu\u0301mero Nonce\" width=\"768\" height=\"526\" data-srcset=\"https:\/\/www.bitnovo.com\/blog\/wp-content\/uploads\/2021\/06\/Que\u0301-es-el-nu\u0301mero-Nonce.jpg 768w, https:\/\/www.bitnovo.com\/blog\/wp-content\/uploads\/2021\/06\/Que\u0301-es-el-nu\u0301mero-Nonce-300x205.jpg 300w\" data-src=\"https:\/\/www.bitnovo.com\/blog\/wp-content\/uploads\/2021\/06\/Que\u0301-es-el-nu\u0301mero-Nonce.jpg\" data-sizes=\"(max-width: 768px) 100vw, 768px\" \/><\/div>\n<\/div>\n<div class=\"is-divider divider clearfix\"><\/div>\n<div class=\"is-divider divider clearfix\"><\/div>\n<h2><span class=\"ez-toc-section\" id=\"nonce_on_the_blockchain\"><\/span><strong>Nonce on the Blockchain<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>The nonce also\u00a0<strong>plays an important role in the blockchains<\/strong>\u00a0of cryptocurrencies derived from Bitcoin, including\u00a0<strong>Dash or\u00a0<a href=\"https:\/\/www.bitnovo.com\/blog\/en\/what-is-litecoin\/\">Litecoin<\/a>.<\/strong><\/p>\n<p>This is because these cryptocurrencies use Nonce in their programming. It should be noted that any system that employs the\u00a0<a href=\"https:\/\/www.bitnovo.com\/blog\/en\/what-is-proof-of-work-the-bitcoin-consensus-protocol\/\">Proof of Work<\/a>\u00a0consensus mechanism\u00a0<strong>will use Nonce in its operation<\/strong>.<\/p>\n<p>However, blockchains other than those using Proof of Work (PoW) may also employ Nonce. Blockchains that include the\u00a0<a href=\"https:\/\/www.bitnovo.com\/blog\/en\/what-is-proof-of-stake-and-how-does-it-work\/\">Proof of Stake<\/a>\u00a0(PoS) protocol also use it. Examples include\u00a0<a href=\"https:\/\/www.bitnovo.com\/blog\/en\/what-is-stellar-2\/\">Stellar<\/a>,\u00a0<a href=\"https:\/\/www.bitnovo.com\/blog\/en\/what-is-neo-all-about-the-asian-giant\/\">NEO<\/a>\u00a0and Waves. There are not only PoS or PoW blockchains.<\/p>\n<p>Blockchains using protocols such as<strong>\u00a0Proof of Elapsed Time (PoET) or Proof of Authority (PoA)<\/strong>\u00a0also add to their use.<\/p>\n<p>It should be noted that Nonce is used in PoS, PoET or PoA protocols for other\u00a0<strong>purposes<\/strong>, since the computational difficulty is<strong>\u00a0lower<\/strong>\u00a0than in protocols such as Proof of Work.<\/p>\n<p>However, the procedure is still to generate a random number that guarantees a\u00a0<strong>high level of cryptographic security<\/strong>\u00a0in the blockchain.<\/p>\n<p>Nonce is a\u00a0<strong>key<\/strong>\u00a0number in both blockchain technology and\u00a0<strong>cryptography<\/strong>. Thanks to this random number, the actions we perform on blockchains are much more\u00a0<strong>secure<\/strong>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p><span class=\"span-reading-time rt-reading-time\" style=\"display: block;\"><span class=\"rt-label rt-prefix\">Tiempo de lectura:<\/span> <span class=\"rt-time\"> 3<\/span> <span class=\"rt-label rt-postfix\">minutos<\/span><\/span>One of the most important topics in the world of cryptocurrency cryptography is the \u201cNonce\u201c. In this article we will explain what exactly it is and what is its function in the world of cryptocurrencies. The nonce is characterized as\u00a0a random, single use number. It is used in\u00a0cryptographic\u00a0systems, specifically in the so called\u00a0authentication\u00a0protocols. These numbers [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":9767,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[185],"tags":[],"class_list":["post-9766","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blockchain-en"],"_links":{"self":[{"href":"https:\/\/www.bitnovo.com\/blog\/wp-json\/wp\/v2\/posts\/9766","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.bitnovo.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.bitnovo.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.bitnovo.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.bitnovo.com\/blog\/wp-json\/wp\/v2\/comments?post=9766"}],"version-history":[{"count":2,"href":"https:\/\/www.bitnovo.com\/blog\/wp-json\/wp\/v2\/posts\/9766\/revisions"}],"predecessor-version":[{"id":24711,"href":"https:\/\/www.bitnovo.com\/blog\/wp-json\/wp\/v2\/posts\/9766\/revisions\/24711"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.bitnovo.com\/blog\/wp-json\/wp\/v2\/media\/9767"}],"wp:attachment":[{"href":"https:\/\/www.bitnovo.com\/blog\/wp-json\/wp\/v2\/media?parent=9766"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.bitnovo.com\/blog\/wp-json\/wp\/v2\/categories?post=9766"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.bitnovo.com\/blog\/wp-json\/wp\/v2\/tags?post=9766"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}