Position: Home page » Bitcoin » Cracking the encryption algorithm of bitcoin

Cracking the encryption algorithm of bitcoin

Publish: 2021-05-11 02:26:33
1. First of all, let's talk about the background. The basic principle of bitcoin "account" is key public key address. You can roughly understand it as "key box box number". Now is to start from the box number or box to crack the key
there are basically two kinds of attacks, one is dictionary attack, the other is brute force attack
dictionary attack is to use common passwords and their simple variants as keys one by one. As long as your pass phrase is not hard enough, the possibility of successful attack is very high. So if you want to use this, you need to popularize the knowledge of cryptography first, and don't think it's very safe to add a long password
if you don't use the wallet generated by pass phrase, you can only crack it violently, which is equivalent to enumerating all the possible keys. At present, this is impossible, even if the electronic computer is becoming more and more powerful. However, quantum computer can do it theoretically, but don't worry too much. If such a powerful quantum computer comes out, it will not only endanger bitcoin
at the same time, bitcoin has a second layer of protection: if an address only accepts bitcoin but does not output it, its public key is confidential, that is to say, no one else can see the box, only the box number. At present, the process of decing the box from the box number can't even be done by quantum computer. In other words, if there is a quantum computer, bitcoin has a last line of Defense: it's temporarily safe to transfer your money to a new address
finally, some time ago, the wallet generated by the Android client was attacked because of a bug in the underlying random number generator. In fact, this function is not random securerandom, which Google quickly admitted and fixed. It's hard to say whether this kind of thing will happen again, but I don't think we need to worry too much.
2. Do you know how many digits the password is, or do you have keywords? I can give you a try
3. Caibi tix is good. It can be said that caibi tix is the first potential virtual currency in 2018. Many people buy it, and its appreciation is fast.
4. Theoretically, it can be cracked, but it's just a time-consuming problem. If you think about the cost of mining, you should know the difficulty of cracking. To protect bitcoin by means of encryption must make the cracker pay a much higher price than mining, otherwise everyone can get it by cracking rather than mining
5. Try Tencent computer housekeeper killing, physical examination speed is very fast, Trojan horse killing ability is not weak at all, for virus Trojan horse, high-risk vulnerabilities, system abnormalities will not be a mistake. Although the interface is smaller, but the function is not discounted, it is still very powerful, and the killing rate of Trojan samples in the evaluation process is 100%
the physical examination and repair of the pioneer version of computer housekeeper are very fast. It can quickly remove Trojans and fix loopholes without a long wait and has no impact on the running speed of the computer.
6.

there are about three kinds of currency in currency speculation. one is the base currency, which is similar to the representative of money. CNY and usdt Basic goods with value). One is the mainstream token, BTC, ETH (because of the national restrictions, the exchange can only trade in token, that is, take one kind of virtual currency to buy another kind of virtual currency, I don't know why.) The other is a variety of virtual currencies (commodities)

the purchase process is to first go to the exchange platform to find a personal seller with RMB to exchange for usdt, In the process of using usdt to exchange for the mainstream token BTC or eth used in purchasing various virtual coins, and finally using eth to purchase various virtual coins

A. base currency: CNY, usdt (exchangeable, need to be exchanged in good faith transactions with indivial buyers) B. mainstream token: BTC, ethc, virtual currency: all kinds of money, such as profit, need to be exchanged into usdt again, and then sold into CNY. Learn more about the coin circle

< blockquote >

sharing area network ~ learn more about the coin circle

< / blockquote >

experience: 1. Buy mainstream currency if you can't buy it. 2. If the new currency is not fried in January, it may become a banker to harvest leeks. 3. Just learned an experience, chasing up and killing down, meaning up do not buy, buy must be cut leeks If you have strength and value, you can hold it and wait for salted fish to turn over. 5. If the company is strong, the team is strong, and the executives are strong, you can pay more attention to it. Note: I don't understand the K line at all, and I don't understand the professional words, so I can only make a tentative decision on these purchase principles based on logical thinking

7. CTB locker, a new form of rogue software, uses despicable means to send a virus email to the victim. Only when the victim opens it, the ward will invade the victim's personal computer and encrypt the victim's specific files (JPEG image is a popular target). If the victim wants to retrieve the files, he must pay a ransom in bitcoin

for people, the best way is to prevent the source of infection, do not open or run the unknown installation package, install a safe prevention attachment - bitcoin house

the best way to remove is to re install a system.
8. Abstract: in a small laboratory in a secluded village 50 miles north of New York City, intricate pipelines and electronic equipment are wound under the ceiling. This seemingly haphazard pile of devices is a computer. It is different from any computer in the world, but it is a milestone device in the history --- quantum computer

on May 3, 2017, a big news in science and technology circles: the world's first optical quantum computer surpassing the early classical computer was born. This "world's first" is a genuine "made in China" and is the result of a breakthrough made by Professor Pan Jianwei and his colleagues of the University of science and technology of China and Professor Wang Haohua of Zhejiang University
if the speed of traditional computer is bicycle, the speed of quantum computer is just like airplane. In the past few months, IBM and Intel have announced that they have built 50 and 49 qubit quantum computers, respectively. Some experts point out that within ten years, the computing power of quantum computer may catch up with and surpass the current supercomputer

at the American Physics Annual Meeting held in Los Angeles on March 5, 2018, Julian Kelly, a research scientist at Google quantum AI laboratory, reported that he was leading the Google team to test a 72 qubit universal quantum computer. However, this is only 72 qubits. At this rate of development, the magic power of quantum computer will soon be terrifying
then, why do we say that quantum computers can easily crack bitcoin? What's the matter
it takes 600000 years to crack an RSA cryptosystem, but it takes less than three hours to use a quantum computer with considerable storage function! In other words, with the leap from electronic computer to quantum computer, the computing power and the ability to process big data of the whole mankind will be improved for tens of thousands or even hundreds of millions of times. In front of the quantum computer, the traditional electronic computer we used to be proud of is equivalent to the previous abacus, which is bulky and old

although the bitcoin protocol uses asymmetric cryptocurrency, the corresponding public key is used to verify the transactions signed by the private key to ensure that bitcoin can only be used by legitimate owners. It is not feasible to force the private key to be consistent with the public key by using the currently available computer, but quantum computer can solve the problem of asymmetric cryptocurrency
in addition, the rule of bitcoin is that the more processed block will be added to the blockchain, and the other block will be voided. For example, it's like 51 people in an account book say that you have saved 100 yuan in the bank, while 49 people say that you have saved 50 yuan. In this case, the minority of blockchain algorithm is subordinate to the majority, and the bank thinks that you have saved 100 yuan is true, and that you have saved 50 yuan is false. So once a miner has 51% of the computing power, other subsequent miners will not be able to continue to get bitcoin

Andersen Cheng, co-founder of a network security company in the UK, says bitcoin will come to an end the day quantum computers come into use. What's your opinion?
9. Bitcoin can only be cracked by computing power, but the cost of cracking is too high. So no one is going to crack it.
10.

Note: because I'm not sure whether the mobile client can view the pictures in the answer, so the owner had better use the computer web version


[portal] is a purple vortex. Similar to the portal in world of Warcraft, the portal in Guild Wars 2 is used to transfer players from one area to another. In the main city, you can see the intercity portal. In the largest main city: Lion arch, besides intercity portal, you can also see battlefield portal


the above are the common icons on the map in Guild Wars 2


there are also some icons, for example, one is the same as the icon of the portal, but the color is green. This icon is the progress point of the mainline task. In addition, like a white scroll, there is a star icon on the scroll, which is the messenger. You can only see the messenger in the main city. The messenger's role is to tell you what's going on on the maps around here

Hot content
Inn digger Publish: 2021-05-29 20:04:36 Views: 341
Purchase of virtual currency in trust contract dispute Publish: 2021-05-29 20:04:33 Views: 942
Blockchain trust machine Publish: 2021-05-29 20:04:26 Views: 720
Brief introduction of ant mine Publish: 2021-05-29 20:04:25 Views: 848
Will digital currency open in November Publish: 2021-05-29 19:56:16 Views: 861
Global digital currency asset exchange Publish: 2021-05-29 19:54:29 Views: 603
Mining chip machine S11 Publish: 2021-05-29 19:54:26 Views: 945
Ethereum algorithm Sha3 Publish: 2021-05-29 19:52:40 Views: 643
Talking about blockchain is not reliable Publish: 2021-05-29 19:52:26 Views: 754
Mining machine node query Publish: 2021-05-29 19:36:37 Views: 750