Position: Home page » Bitcoin » The difference of bitcoin algorithm

The difference of bitcoin algorithm

Publish: 2021-04-25 18:43:34
1. What is a Leyte coin? To put it simply, litecoin (LTC)
was released on October 7, 2011. It is currently the highest market value counterfeit coin, about 1% of BTC's market value, or US $1000W. Compared with BTC, LTC is faster, with an average of 2.5 minutes and 6 confirmations per block in 15 minutes. In addition, the number of LTCs is four times that of BTCs, with a total of 8400w. At present, LTC uses scrypt algorithm, which needs a lot of memory support. The professional mining machine on the market can not be used for LTC mining, only the graphics card
what is the difference between lightcoin and bitcoin
1. Transaction: easier to use, larger volume and greater appreciation potential. The block confirmation time is shorter, which is four times faster than bitcoin. For example, pizza owners are more willing to accept LTC payment to save transaction time< Mining:

special algorithm creates the unique charm of LTC, which is also the key to stand out from Shanzhai coins. Scrypt algorithm uses sha256 as its subroutine, and scrypt itself needs a lot of memory, each hash is used as the input seed, and then needs a lot of memory to store another seed pseudo-random sequence, Generate pseudo-random points of sequence and output hash value. The key is that scrypt algorithm needs a lot of memory while sha256 algorithm does not. So in this era when BTC mining of graphics card is coming to an end, LTC mining is about to usher in a golden period of development. Because of the high cost of memory, any ASIC or FPGA has no advantage over graphics card mining. LTC has advantages, at least in the foreseeable future
3. The biggest threat of bitcoin is 51% attack:
some shanzhais are killed by 51% attack. To be honest, LTC is a worry for the development of LTC and BTC, of course. However, the specific problems they face are different: BTC can avoid 51% attack through technology upgrading (such as end block reconstruction, careful node upgrading, and calculation difficulty), However, there is no way to evade LTC technology. However, e to the scattered computing power of graphics card mining and the increasing difficulty, this problem needs to be paid attention to, but don't worry too much. With the use of ASIC in BTC, the risk of 51% attack is increasing. I hope BTC development team can solve this problem as soon as possible.
2.

The earliest is a kind of network virtual currency. It is characterized by decentralization, anonymity, and can only be used in the digital world. It does not belong to any country or financial institution, and is not subject to geographical restrictions. It can be exchanged anywhere in the world. Therefore, it is used as a money laundering tool by some criminals. In 2013, the U.S. government recognized the legal status of bitcoin, making the price of bitcoin soar

< H2 > extended information:

bitcoin is e-cash similar to e-mail. Both parties need "bitcoin wallet" similar to e-mail and "bitcoin address" similar to e-mail address. Just like sending and receiving e-mail, the remitter pays bitcoin directly to the other party through a computer or smart phone according to the recipient's address

starting from the essence of bitcoin, the essence of bitcoin is actually a special solution generated by a bunch of complex algorithms. A special solution is one of the infinite (in fact, bitcoin is finite) solutions that can be obtained from the equations. Every particular solution can solve the equation and is unique

many websites for technology players have begun to accept bitcoin transactions. Websites such as mtgox and btcchina, as well as some Taobao stores, can even accept services such as bitcoin exchange for us dollars and euro. There is no doubt that bitcoin has become a real currency in circulation, rather than a virtual currency like Tencent Q coin

3. In order to understand the technical principle of bitcoin, we need to understand two important cryptographic techniques: hash code: it converts a long string into a fixed length string, and its conversion is irreversible, that is, it is impossible to guess the original string from hash code. Sha256 is mainly used in bitcoin protocol
public key system: corresponds to a public key and a private key, keeps the private key in the application and publishes the public key. When Party A transmits information to Party B, it can use Party A's private key to encrypt the information, and Party B can use Party A's public key to decrypt the information, so as to ensure that the third party cannot impersonate Party A to send the information; At the same time, when Party A transmits information to Party B, it is encrypted with Party B's public key and sent to Party B, and then Party B decrypts it with his own private key, so as to ensure that the third party cannot eavesdrop on the communication between the two people. RSA is the most common public key system, but the lliptic curve digital signature algorithm is used in bitcoin protocol. What's the difference between cash and bank account? Bitcoin is an electronic currency in BTC. In this article, it is also used to refer to the whole bitcoin system. Like opening an account in a bank, the corresponding concept in bitcoin is address. Everyone can have one or more bitcoin addresses, which are used to pay and collect money. Each address is a string that starts with 1. For example, I have two bitcoin accounts, and. A bitcoin account is uniquely determined by a pair of public key and private key. To save the account, you only need to save the private key file. Unlike bank accounts, banks keep all transaction records and maintain the book balance of each account, while bitcoin's transaction records are jointly maintained by the whole P2P network through a pre agreed protocol. How much money is in my account address? Although the current account balance can be seen by bitcoin software, unlike banks, there is no place to maintain the book balance of each address. It can only calculate the account balance in real time through all historical transactions. How do I pay? When I pay from address a to address B of the other party, the payment amount is e. at this time, both parties will announce the transaction information to each network node, telling address a to pay to address B, and the payment amount is e. In order to prevent the third party from forging the transaction information, the transaction information will be encrypted with the private key of address A. at this time, the network node receiving the transaction information can use the public key of address a to verify that the transaction information is indeed sent by address a. Of course, trading software will help us do these things, we just need to input the relevant parameters in the software. What will the network node do after receiving the transaction information? This is the most important part of the bitcoin system, which needs to be elaborated. For the sake of simplicity, only bitcoin protocol has been implemented. In the current version, each network node will save all transaction information synchronously. There are two kinds of transaction information in history, one is & quot; Verified & quot; The transaction information, that is, the verified transaction information, is stored in a series of "blocks". Each & quot; block" Is the previous & quot; bock" The ID of each block is the hash code of the hash code of the block and the new transaction information (see an actual block). The other category refers to those who also & quot; Unverified & quot; The transaction information just paid above belongs to this category. When a network node receives new unverified transaction information (possibly more than one), it can calculate the book balance of each address at that time because the node keeps all the transaction information in history, so it can calculate whether the transaction information is valid, that is, whether there is enough balance in the payment account. After eliminating the invalid transaction information, it first takes out the last & quot; block" Then, the unverified transaction information is combined with the ID, and a verification code is added to form a new "block". It needs a lot of calculation to build a new block, because it needs to calculate the verification code, so that the above combination becomes a block, that is, the first several bits of the hash code of the block are 1. At present, the first 13 bits need to be 1 (generally, the specific method is uncertain), which means that if the block is generated by enumeration method, the average number of enumerations is 16 ^ 13. Using CPU resources to generate a block is called "gold mining", because the proction of the block will get a certain reward, and the reward information has been included in the block. When a network node generates a new block, it will broadcast to other network nodes. However, this network block may not be accepted by the network, because it is possible that other network nodes have proced the block earlier. Only the earliest block or the block with the largest number of subsequent blocks is valid, and the remaining blocks are no longer used as the initial blocks of the next block. How does the other party confirm that the payment is successful? When the payment information is distributed to the network node, the network node begins to calculate whether the transaction is valid (that is, whether the account balance is enough to pay), and attempts to generate blocks containing the transaction information. When six blocks (one direct block and five subsequent blocks) contain the transaction information, the transaction information is considered "verified", so that the transaction is formally confirmed, and the other party can confirm the successful payment. A possible problem is that I will pay the balance of address a to address B, and at the same time pay to address C. If I only verify that the single comparison transaction is valid. At this point, my way of cheating is to generate six blocks including B to B and six blocks including C to C before the truth is revealed. Because I need a very long CPU time to generate a block, compared with the whole network, the probability of my cheating success is very small. What is the motivation of network nodes to proce blocks? As can be seen from the above description, in order to make the transaction information effective, the network node needs to generate 1 and 5 subsequent blocks to contain the transaction information, and such block generation is very CPU intensive. How to let other network nodes help to proce blocks as soon as possible? The answer is very simple. The agreement stipulates that BTC will be rewarded for the address where the block is proced, as well as the Commission promised by both parties. At present, the reward for procing a block is 50btc, which will be halved every four years in the future. For example, the reward will be 25btc from 2013 to 2016. Is the transaction anonymous? Yes, and No. All bitcoin transactions are visible. We can check all transaction records of each account, such as mine. But what's different from the banking monetary system is that everyone's account itself is anonymous, and everyone can open many accounts. In general, anonymity is not as good as it claims. But bitcoin has another advantage in doing black market trading: it can't be frozen. Even if the police trace a bitcoin address, there is nothing they can do unless they trace the computer used by the exchange based on the Internet address. How to ensure that bitcoin does not depreciate? Generally speaking, in the case of equivalent trading activities, the value of money is inversely proportional to the amount of money issued. Unlike the traditional money market, the central bank can determine the amount of money issued. Bitcoin does not have a central issuing institution. Only by procing blocks can we get a certain amount of BTC currency. Therefore, bitcoin's new amount of money depends on: 1. The speed of procing blocks: bitcoin's agreement stipulates that the difficulty of procing blocks is fixed at an average of 2016 every two weeks, about 10 minutes. Moore's law of doubling CPU speed every 18 months will not speed up the proction of block. 2. The number of rewards for block proction: at present, 50 BTC is awarded for each block proced, which is halved every four years. In 2013, 25 BTC is awarded, and in 2017, 12.5 BTC is awarded. Considering the above two factors, bitcoin's currency issuing speed is not controlled by any single node in the network. Its protocol makes the currency stock known in advance, and the maximum stock is only 21 million BTC
4. On October 7, 2011, a network organization announced the release of a new P2P virtual currency, called lightcoin (LTC)

litecoin is short for LTC, and its English name is litecoin. Litecoin stands for lightweight. The meaning behind litecoin is lightweight currency
1. Bitcoin generates a block every 10 minutes, while lightcoin LTC generates a block every 2.5 minutes. This means that lightcoin has faster transaction confirmation efficiency. Bitcoin transfer sometimes takes 1 hour or even longer to arrive at the account, but lightcoin generally takes less than 20 minutes to confirm

2. Since the LTC speed of lightcoin is four times that of bitcoin, and the reward of each block is the same as bitcoin, the total amount of money is four times that of bitcoin, which is 84 million lightcoins, which is higher than that of bitcoin<

3. Bitcoin adopts sha256 encryption algorithm, and lightcoin adopts script encryption algorithm. Compared with bitcoin, lightcoin LTC has a slightly lower computational load, which makes it easier to mine and more suitable for graphics card
(GPU) operation. At the same time, FPGA (field programmable gate array) and ASIC (application specific integrated circuit) implemented for script are better than sha256 used for bitcoin, More expensive.
5. There are mainly two kinds of bitcoin algorithms, which are elliptic curve digital signature algorithm and sha256 hash algorithm

elliptic curve digital signature algorithm is mainly used in the generation process of bitcoin public key and private key, which is the cornerstone of bitcoin system. SHA-256 hash algorithm is mainly used in the workload proof mechanism of bitcoin

the principle of bitcoin generation is the special solution generated by complex operation, and mining is the process of finding the special solution. However, the total number of bitcoin is only 21 million, and with the continuous mining of bitcoin, the more difficult it will be to proce bitcoin, and the cost of acquiring bitcoin may be higher than the price of bitcoin itself

the bitcoin block consists of a block header and the transaction list contained in the block. The size of the block header is 80 bytes, which is composed of 4-byte version number, 32 byte hash value of the previous block, 32 byte Merkle root hash, 4-byte timestamp (current time), 4-byte current difficulty value and 4-byte random number. A block header with a fixed length of 80 bytes is the input string used to prove the workload of bitcoin. Constantly change the random number in the block header, that is, the value of nonce, and do double sha256 operation on the block header after each change, and compare the result value with the target value of the current network. If it is less than the target value, the problem is solved successfully, and the workload is proved to be complete

the essence of bitcoin is actually the unique solution of a set of equations generated by a bunch of complex algorithms. Bitcoin is the first distributed virtual currency in the world, which has no specific distribution center. The network of bitcoin is composed of all users, because there is no center to ensure the security of data.
6.
  1. bitelement was born in January 2014 and upgraded to the second generation bitelement in September 2014, with an initial total release of 200 million. The second generation bitelement has made great innovations in algorithm, function and security, especially in mining and trading under the mechanism of multi signature and short message verification, providing effective security protection for users' virtual currency assets, which may be the first in the world<

    multi signature:
    the new bitcoin wallet introces the multi signature mechanism of bitcoin and redefines a new storage method, so as to achieve a higher security level. This is the core content of this update wallet, which makes payment and mining very safe

    under the multi signature mechanism, a bit element address has two private keys. To transfer money from this address, the two private keys need to be co signed before the transaction can be completed. There is a private key in the client's bitelement wallet, and the second private key is stored in the server of bitelement official website (or other trusteeship organization) (only the user's password can be decrypted and can be used only by SMS verification). The hacker must attack the two computers at the same time and obtain the password used by the user to decrypt the server's private key, so as to steal the user's virtual currency, The difficulty is greatly increased

  2. bitcoin (bitcoin: bitcoin) is a kind of network virtual currency, which can buy real-life goods. It is characterized by decentralization, anonymity, and can only be used in the digital world. It does not belong to any country or financial institution, and is not subject to geographical restrictions. It can be exchanged anywhere in the world. Therefore, it is used as a money laundering tool by some criminals< br />

7.

Bitcoin is a virtual encrypted digital currency in the form of P2P

the concept of bitcoin was first proposed by Nakamoto on November 1, 2008, and was officially born on January 3, 2009. According to the idea of Nakamoto, the open source software is designed and released, and the P2P network on it is constructed

unlike all currencies, bitcoin does not rely on specific currency institutions. It is generated by a large number of calculations based on specific algorithms. Bitcoin economy uses the distributed database composed of many nodes in the whole P2P network to confirm and record all transactions, and uses the design of cryptography to ensure the security of all aspects of currency circulation

extended data

features of bitcoin:

1. Circulation around the world: bitcoin can be managed on any computer connected to the Internet. No matter where you are, anyone can dig, buy, sell or collect bitcoin

2. Exclusive ownership: private key is needed to control bitcoin, which can be stored in any storage medium in isolation. No one can get it except the user himself

3. Low transaction cost: bitcoin can be remitted free of charge, but a transaction fee of about 1 bitfen will be charged for each transaction to ensure faster transaction execution

8. Self driving: Jingmi Road: from Jingmi road to Kuliushu Island, north to Baima Road, 6 km west, north to the road. Airport Expressway: the terminal point of airport expressway is northward to Shunping Road, northward to Kuliushu Huan, others are the same as above. Beijing Chengde Expressway direction: Beijing Chengde Expressway White Road exit to the East, the fifth traffic lights turn north, 200 meters north road is north http://blog.sina.com.cn/s/blog_ 7d985ae80100uf5f.html
Hot content
Inn digger Publish: 2021-05-29 20:04:36 Views: 341
Purchase of virtual currency in trust contract dispute Publish: 2021-05-29 20:04:33 Views: 942
Blockchain trust machine Publish: 2021-05-29 20:04:26 Views: 720
Brief introduction of ant mine Publish: 2021-05-29 20:04:25 Views: 848
Will digital currency open in November Publish: 2021-05-29 19:56:16 Views: 861
Global digital currency asset exchange Publish: 2021-05-29 19:54:29 Views: 603
Mining chip machine S11 Publish: 2021-05-29 19:54:26 Views: 945
Ethereum algorithm Sha3 Publish: 2021-05-29 19:52:40 Views: 643
Talking about blockchain is not reliable Publish: 2021-05-29 19:52:26 Views: 754
Mining machine node query Publish: 2021-05-29 19:36:37 Views: 750