Position: Home page » Blockchain » Blockchain in encryption

Blockchain in encryption

Publish: 2021-04-19 12:07:03
1. blockchain encryption algorithm
asymmetric encryption algorithm is a function that converts the original plaintext file or data into a series of unreadable ciphertext codes by using an encryption key. The encryption process is irreversible. Only holding the corresponding decryption key can the encrypted information be decrypted into readable plaintext. Encryption enables private data to be transmitted through the public network under the condition of low risk, and protects the data from being stolen and read by the third party
the core advantage of blockchain technology is decentralization, which can realize point-to-point transaction, coordination and cooperation based on decentralized credit in a distributed system without mutual trust by means of data encryption, time stamp, distributed consensus and economic incentive, so as to solve the high cost and low cost of centralized institutions Low efficiency and data storage insecurity provide solutions
the application fields of blockchain include digital currency, token, finance, anti-counterfeiting traceability, privacy protection, supply chain, entertainment, etc. with the popularity of blockchain and bitcoin, many related top domain names have been registered, which has a great impact on the domain name instry.
2.

1.1. Introction

practitioners in the computer instry should be very familiar with the word hash. Hash can realize the mapping of data from one dimension to another, and hash function is usually used to realize this mapping. Generally, y = hash (x) is used in the instry. The hash function can calculate a hash value y by calculating X
hash function characteristics in blockchain:

< UL >
  • function parameters are string type

  • fixed size output

  • is computationally efficient

  • collision free means that the conflict probability is small: X= y => hash(x) != Hash (y)

    hide the original information: for example, the verification of transactions between nodes in the blockchain only needs to verify the information entropy of the transaction, and does not need to compare the original information. The nodes do not need to transmit the original data of the transaction, only the hash of the transaction, Common algorithms include Sha series and MD5

  • 1.2. Hash is widely used in blockchain. One of them is called hash pointer
    hash pointer, which means that the value of the variable is calculated from the actual data and points to the actual data location, That is, it can not only represent the actual data content, but also the storage location of the actual data. The figure below shows the schematic diagram of hash pointer


    < / UL >
    3. Blockchain is a technical solution to maintain a reliable database collectively through centralization and distrust in the past. This technical solution mainly allows any number of nodes in the participating system to generate a series of data blocks by using cryptographic methods. Each data block contains all the information exchange data of the system in a certain period of time, and generates a data fingerprint to verify the validity of its information and link to the next database block
    blockchain technology originates from bitcoin, and its essence is to create a decentralized digital currency system by using computer algorithm and cryptography technology, so as to realize the functions of currency issuance and transaction
    characteristics of blockchain Technology:
    1. Decentralized: there is no centralized hardware or management organization in the whole network, the rights and obligations of any node are equal, and the damage or loss of any node will not affect the operation of the whole system. Therefore, it can also be considered that the blockchain system has excellent robustness

    2. Trustworthiness: there is no need to trust each other when participating in the data exchange between each node in the whole system. The operation rules of the whole system are open and transparent, and all data contents are also open. Therefore, in the specified rule range and time range of the system, nodes can not and cannot cheat other nodes
    3. Collective maintenance: data blocks in the system are jointly maintained by all nodes with maintenance function in the whole system, and these nodes with maintenance function can be participated by anyone
    4. Reliable database: the whole system will enable each participating node to obtain a of the complete database in the form of sub databases. Unless more than 51% of the nodes in the whole system can be controlled at the same time, the modification of the database on a single node is invalid, and the data content on other nodes cannot be affected. Therefore, the more nodes and computing power in the system, the higher the data security in the system
    the other two features are derived from the four features:
    5. Open source: because the operation rules of the whole system must be open and transparent, the whole system must be open source for the program
    6. Anonymity: since there is no need to trust each other between nodes, there is no need to disclose the identity between nodes, and each participating node in the system is anonymous< EGD: e-gold coin, or EGD for short, is a network encrypted digital asset based on peer-to-peer Internet open source protocol, which circulates in a decentralized network system. EGD, as a kind of consumer asset given by global commercial consumers from businesses, is used to replace the points issued by businesses in traditional commercial society, realizing the networking, integration and capitalization of global commercial points
    EGD, namely network gold, is an encrypted digital asset based on decentralized digital encryption technology. EGD was born in January 2014. It was developed by a team of 17 technical experts from seven countries around the world, led by former Microsoft engineers. EGD introces the technology of encrypted digital assets into the field of global business integration points, which enables global consumers to continuously share the profits of commercial society through the circulation and value-added of EGD business points, and create a win-win economic model for businesses and consumers
    features of customized EGD:
    with customized technology, we can easily build all kinds of intelligent assets based on EGD protocol, including stocks, bonds, or various derivative points
    more importantly, customization technology not only expands the application scope of EGD, but also retains the characteristics of clear property rights and decentralization of EGD. Moreover, e to the limited number of customized points, customized points are more scarce.
    4. Jinwowo network believes that privacy protection is the advantage of blockchain. We use cryptography and distributed structure to protect privacy
    jinwowo will use blockchain technology to promote the legalization of big data business. The encryption of blockchain technology can ensure that the privacy of data sources can be better protected while big data is called.
    5. First of all, these two are virtual assets. The price of these two kinds of digital currency, or a specific price of digital currency, is determined according to the market situation
    the details of these two digital assets are as follows
    bitcoin (bitcoin: bitcoin) was originally a kind of network virtual currency, which can buy real-life goods. It is characterized by decentralization, anonymity, and can only be used in the digital world. It does not belong to any country or financial institution, and is not subject to geographical restrictions. It can be exchanged anywhere in the world. Therefore, it is used as a money laundering tool by some criminals
    the full name of NMC is "new media chain", the Chinese name is media chain, and the former domain name currency (also referred to as NMC) is two completely different currencies. NMC is the circulating currency of three decentralized application platforms: coin call [blockchain information community portal], coin search [blockchain network query tool], ncoin [digital currency exchange]. However, the prices of these two kinds of digital currencies will fluctuate with the market, which can not guarantee a development prospect. If the current price is concerned, bitcoin will be a bit higher.
    6. The application of blockchain technology mainly starts from several characteristics of blockchain technology. Blockchain technology has a great feature, that is, the information can not be tampered with. Once the information is verified and added to the blockchain, it will be stored permanently. Unless more than 51% of the nodes in the system can be controlled at the same time, the modification of the database on a single node is invalid. Therefore, the data stability and reliability of blockchain are extremely high. For example, Yingtang Zhongchuang can provide background encryption service with blockchain as the underlying technology, and its encryption technology can fundamentally ensure the security and storage of data.
    7. The problem of power consumption is caused by many factors. The main reason is that some applications can't exit normally and run in the background all the time. Please go to settings - power to see which apps consume too much power. You can press the home key on the desktop to clear the programs that don't need to run in the background, which can significantly rece the power consumption.
    8. Because YKC is a new type of digital currency, its encryption technology is reflected in the identity protection and information dissemination will not be modified.
    Hot content
    Inn digger Publish: 2021-05-29 20:04:36 Views: 341
    Purchase of virtual currency in trust contract dispute Publish: 2021-05-29 20:04:33 Views: 942
    Blockchain trust machine Publish: 2021-05-29 20:04:26 Views: 720
    Brief introduction of ant mine Publish: 2021-05-29 20:04:25 Views: 848
    Will digital currency open in November Publish: 2021-05-29 19:56:16 Views: 861
    Global digital currency asset exchange Publish: 2021-05-29 19:54:29 Views: 603
    Mining chip machine S11 Publish: 2021-05-29 19:54:26 Views: 945
    Ethereum algorithm Sha3 Publish: 2021-05-29 19:52:40 Views: 643
    Talking about blockchain is not reliable Publish: 2021-05-29 19:52:26 Views: 754
    Mining machine node query Publish: 2021-05-29 19:36:37 Views: 750