Bitcoin workload algorithm
the feature of sha256 algorithm used in bitcoin is that it's easy to verify the known answers correctly, but it's very troublesome to get the answers, and you need to try them one by one. The miner who got the answer first was recognized by everyone as having snatched the right to keep accounts, and the reward was given to him. Let's continue to grab the bookkeeping right of the next question
simply speaking, the significance of these calculations only lies in ensuring the stability and security of the whole system, and has no more significance. It is not comprehensive to regard bitcoin as a by-proct of computing. The generation and issuance of bitcoin, all the transactions and circulation in the bitcoin chain, and the stability of the bitcoin system are all the purposes of computing. Of course, in addition to maintaining the system, it does not proce other value and procts. This is also a black spot where bitcoin is accused of not being environmentally friendly and wasting resources
in general, bitcoin, as a milestone blockchain digital currency, comes from the huge value of a large amount of computing power investment and user trust. There is no doubt about that.
anyone can run software on specialized hardware and become a bitcoin miner. Mining software monitors transaction broadcast through P2P network and performs appropriate tasks to process and confirm these transactions. Bitcoin miners can earn transaction fees paid by users to speed up transaction processing and additional bitcoin issued according to fixed formula
new transactions need to be included in a block with mathematical workload proof before they can be confirmed. This kind of proof is hard to generate because it can only be generated by trying billions of calculations per second. Miners need to run these calculations before their blocks are accepted and rewarded. As more people start mining, the difficulty of finding effective blocks will be automatically increased by the network to ensure that the average time to find a block remains at 10 minutes. Therefore, the competition for mining is very fierce, and no indivial miner can control the content contained in the block chain
workload proof is also designed to rely on previous blocks, which forces the time sequence of block chain. This design makes it extremely difficult to cancel previous transactions, because the workload proof of all subsequent blocks needs to be recalculated. When two blocks are found at the same time, the miner will process the first block received, and once the next block is found, it will be transferred to the longest block chain. This ensures that the mining process maintains a global consistency based on processing capacity
bitcoin miners can neither increase their rewards by cheating, nor deal with the fraulent transactions that destroy the bitcoin network, because all bitcoin nodes will reject the blocks containing invalid data that violate the bitcoin protocol rules. Therefore, even if not all bitcoin miners can be trusted, the bitcoin network is still secure
sha256 is an encryption algorithm.
renrenfu financial and business school tells you that every bitcoin node will collect all unconfirmed transactions and gather them into a data block, which will be integrated with the previous data block. The miner node will attach a random adjustment number and calculate the SHA-256 hash value of the previous data block. The mining node keeps trying again and again until it finds the random adjustment number so that the generated hash value is lower than a specific target
because hash operation is irreversible, it is very difficult to find the required random adjustment number, which requires a continuous trial and error process that can predict the total number. At this time, the workload proof mechanism will play a role. When a node finds a satisfactory solution, it can broadcast its results to the whole network. Other nodes can receive the new data block and check whether it meets the specification. If other nodes do meet the requirements by calculating the hash value, then the data block is valid, and other nodes will accept the data block and attach it to their own chain
bitcoin mining uses SHA-256 hash value operation. This algorithm will carry out a large number of 32-bit integer circular right shift operations
exhaustive verification until it finds a data that meets the requirements. This meaningless data is a dollar
for example, the value of sha256 of 041665464 (random number) is: (hexadecimal) 0ffffffff... (if)
it does not meet the requirement of less than 00ffffff, so it is not a block
the value of sha256 of 041665465 (random number) is: (hexadecimal) 000ffffff... (if)
it meets the requirement of less than 00ffffff, so it is a block
in fact, it is very difficult to find a random number less than a hash value, which is the principle of workload proof
the value to be less than (00ffff...) is variable (difficulty), which varies with time and computing power.
like the theory of evolution, the main chain is obtained through continuous screening consensus, and the accumulated amount of computation is high. If you want to forge the main chain, you must pay a higher price (half of the computing power of the whole network). For example, the electricity consumption of bitcoin mining is equal to that of Singapore. You have to pay half of Singapore's electricity if you want to fake it
