Position: Home page » Bitcoin » Bitcoin encryption algorithm vulnerability

Bitcoin encryption algorithm vulnerability

Publish: 2021-04-25 08:18:46
1. bitcoin is a consensus network, contributing to a new payment system and a fully digital currency. It is the first decentralized peer-to-peer payment network, which is controlled by its users without a central management organization or middleman. From the user's point of view, bitcoin is much like Internet cash. Bitcoin can also be regarded as the most outstanding three style bookkeeping system

anyone can run software on specialized hardware and become a bitcoin miner. mining software monitors transaction broadcast through P2P network and performs appropriate tasks to process and confirm these transactions. Bitcoin miners can earn transaction fees paid by users to speed up transaction processing and additional bitcoin issued according to fixed formula
new transactions need to be included in a block with mathematical workload proof before they can be confirmed. This kind of proof is hard to generate because it can only be generated by trying billions of calculations per second. Miners need to run these calculations before their blocks are accepted and rewarded. As more people start mining, the difficulty of finding effective blocks will be automatically increased by the network to ensure that the average time to find a block remains at 10 minutes. Therefore, the competition for mining is very fierce, and no indivial miner can control the content contained in the block chain
workload proof is also designed to rely on previous blocks, which forces the time sequence of block chain. This design makes it extremely difficult to cancel previous transactions, because the workload proof of all subsequent blocks needs to be recalculated. When two blocks are found at the same time, the miner will process the first block received, and once the next block is found, it will be transferred to the longest block chain. This ensures that the mining process maintains a global consistency based on processing capacity
bitcoin miners can neither increase their rewards by cheating, nor deal with the fraulent transactions that destroy the bitcoin network, because all bitcoin nodes will reject the blocks containing invalid data that violate the bitcoin protocol rules. Therefore, even if not all bitcoin miners can be trusted, the bitcoin network is still secure

sha256 is an encryption algorithm.
2. First of all, let's talk about the background. The basic principle of bitcoin "account" is key public key address. You can roughly understand it as "key box box number". Now is to start from the box number or box to crack the key
there are basically two kinds of attacks, one is dictionary attack, the other is brute force attack
dictionary attack is to use common passwords and their simple variants as keys one by one. As long as your pass phrase is not hard enough, the possibility of successful attack is very high. So if you want to use this, you need to popularize the knowledge of cryptography first, and don't think it's very safe to add a long password
if you don't use the wallet generated by pass phrase, you can only crack it violently, which is equivalent to enumerating all the possible keys. At present, this is impossible, even if the electronic computer is becoming more and more powerful. However, quantum computer can do it theoretically, but don't worry too much. If such a powerful quantum computer comes out, it will not only endanger bitcoin
at the same time, bitcoin has a second layer of protection: if an address only accepts bitcoin but does not output it, its public key is confidential, that is to say, no one else can see the box, only the box number. At present, the process of decing the box from the box number can't even be done by quantum computer. In other words, if there is a quantum computer, bitcoin has a last line of Defense: it's temporarily safe to transfer your money to a new address
finally, some time ago, the wallet generated by the Android client was attacked because of a bug in the underlying random number generator. In fact, this function is not random securerandom, which Google quickly admitted and fixed. It's hard to say whether this kind of thing will happen again, but I don't think we need to worry too much.
3. Theoretically, it can be cracked, but it's just a time-consuming problem. If you think about the cost of mining, you should know the difficulty of cracking. To protect bitcoin by means of encryption must make the cracker pay a much higher price than mining, otherwise everyone can get it by cracking rather than mining
4.

there are about three kinds of currency in currency speculation. one is the base currency, which is similar to the representative of money. CNY and usdt Basic goods with value). One is the mainstream token, BTC, ETH (because of the national restrictions, the exchange can only trade in token, that is, take one kind of virtual currency to buy another kind of virtual currency, I don't know why.) The other is a variety of virtual currencies (commodities)

the purchase process is to first go to the exchange platform to find a personal seller with RMB to exchange for usdt, In the process of using usdt to exchange for the mainstream token BTC or eth used in purchasing various virtual coins, and finally using eth to purchase various virtual coins

A. base currency: CNY, usdt (exchangeable, need to be exchanged in good faith transactions with indivial buyers) B. mainstream token: BTC, ethc, virtual currency: all kinds of money, such as profit, need to be exchanged into usdt again, and then sold into CNY. Learn more about the coin circle

< blockquote >

sharing area network ~ learn more about the coin circle

< / blockquote >

experience: 1. Buy mainstream currency if you can't buy it. 2. If the new currency is not fried in January, it may become a banker to harvest leeks. 3. Just learned an experience, chasing up and killing down, meaning up do not buy, buy must be cut leeks If you have strength and value, you can hold it and wait for salted fish to turn over. 5. If the company is strong, the team is strong, and the executives are strong, you can pay more attention to it. Note: I don't understand the K line at all, and I don't understand the professional words, so I can only make a tentative decision on these purchase principles based on logical thinking

5. Brief introction: Zhengzhou Zhongyi Mining Machinery Co., Ltd. (formerly state-owned Henan mining machinery factory) is a high-tech enterprise which is engaged in the development, development, proction and sales of urban construction waste treatment equipment. Its headquarters is located in Zhengzhou City, Henan Province, with a plant area of 15000 square meters. In 2010, the sales exceeded 100 million yuan, of which 10 million yuan was exported. Since its establishment, the company adheres to the scientific management method of modern enterprises, keeps improving, keeps innovating, and develops rapidly. It has become a new star in China's mining machinery instry. On September 8, 2006, it successfully developed and proced the first set of domestic mobile and construction waste treatment equipment, which has been successfully applied in Kunming City, Yunnan Province, There are construction waste treatment demonstration sites in more than 10 provinces in China. Zhongyi mining machinery has become the leading demonstration enterprise of mining machinery instry in Central Plains in response to the requirements of national environmental protection, which has been inspected by provincial and municipal leaders
legal representative: Liu Yongqiang
time of establishment: October 18, 2010
registered capital: RMB 5.18 million
Instrial and commercial registration number: 410183000011904
enterprise type: limited liability company (invested or controlled by natural person)
address: sanlizhuang, xingmi Road, Xingyang City
6. There are mainly two kinds of bitcoin algorithms, which are elliptic curve digital signature algorithm and sha256 hash algorithm

elliptic curve digital signature algorithm is mainly used in the generation process of bitcoin public key and private key, which is the cornerstone of bitcoin system. SHA-256 hash algorithm is mainly used in the workload proof mechanism of bitcoin

the principle of bitcoin generation is the special solution generated by complex operation, and mining is the process of finding the special solution. However, the total number of bitcoin is only 21 million, and with the continuous mining of bitcoin, the more difficult it will be to proce bitcoin, and the cost of acquiring bitcoin may be higher than the price of bitcoin itself

the bitcoin block consists of a block header and the transaction list contained in the block. The size of the block header is 80 bytes, which is composed of 4-byte version number, 32 byte hash value of the previous block, 32 byte Merkle root hash, 4-byte timestamp (current time), 4-byte current difficulty value and 4-byte random number. A block header with a fixed length of 80 bytes is the input string used to prove the workload of bitcoin. Constantly change the random number in the block header, that is, the value of nonce, and do double sha256 operation on the block header after each change, and compare the result value with the target value of the current network. If it is less than the target value, the problem is solved successfully, and the workload is proved to be complete

the essence of bitcoin is actually the unique solution of a set of equations generated by a bunch of complex algorithms. Bitcoin is the first distributed virtual currency in the world, which has no specific distribution center. The network of bitcoin is composed of all users, because there is no center to ensure the security of data.
7. CTB locker, a new form of rogue software, uses despicable means to send a virus email to the victim. Only when the victim opens it, the ward will invade the victim's personal computer and encrypt the victim's specific files (JPEG image is a popular target). If the victim wants to retrieve the files, he must pay a ransom in bitcoin

for people, the best way is to prevent the source of infection, do not open or run the unknown installation package, install a safe prevention attachment - bitcoin house

the best way to remove is to re install a system.
8.

on the evening of October 23, Beijing time, the 150th anniversary edition of Nature magazine published a paper claiming that Google has successfully achieved "quantum hegemony" this event named "Hello world" in the quantum field immediately occupied the front page of the mainstream media, and the description of "quantum computing in 200 seconds = 10000 years of the most powerful supercomputer on earth" in the paper has become a hot topic of the whole Internet

at present, many cryptography and quantum cryptography experts are advocating the establishment of financial security system as soon as possible, except that the encryption currency projects such as TaiFang and quantum chain focus on quantum resistance. According to William tooton, a reporter from Bloomberg technology, on twitter last month, the National Security Bureau has been committed to the research of related technologies. Therefore, unless the threat of quantum computing suddenly erupts, bitcoin still has time to deal with its arrival“ Bitcoin is alive, consensus is there, currency is there, if not upgraded, it will not disappear because of algorithms or vulnerabilities. But the problem of quantum resistance has not been solved. With the continuous development of quantum computers and the arrival of more qubit chips, this will still be the sword of Damocles hanging on the head of cryptocurrency. "< br />

9. You are talking about the chemical elements in silicon steel sheet
firstly, silicon steel must contain silicon, 0.8% - 0.48%, generally about 3%. Secondly, phosphorus, aluminum and copper are the main impurity elements. Tin and antimony are surface active elements, which can rece the iron loss and increase the magnetic inction strength of silicon steel ring final annealing.
Hot content
Inn digger Publish: 2021-05-29 20:04:36 Views: 341
Purchase of virtual currency in trust contract dispute Publish: 2021-05-29 20:04:33 Views: 942
Blockchain trust machine Publish: 2021-05-29 20:04:26 Views: 720
Brief introduction of ant mine Publish: 2021-05-29 20:04:25 Views: 848
Will digital currency open in November Publish: 2021-05-29 19:56:16 Views: 861
Global digital currency asset exchange Publish: 2021-05-29 19:54:29 Views: 603
Mining chip machine S11 Publish: 2021-05-29 19:54:26 Views: 945
Ethereum algorithm Sha3 Publish: 2021-05-29 19:52:40 Views: 643
Talking about blockchain is not reliable Publish: 2021-05-29 19:52:26 Views: 754
Mining machine node query Publish: 2021-05-29 19:36:37 Views: 750