Blockchain in encryption
asymmetric encryption algorithm is a function that converts the original plaintext file or data into a series of unreadable ciphertext codes by using an encryption key. The encryption process is irreversible. Only holding the corresponding decryption key can the encrypted information be decrypted into readable plaintext. Encryption enables private data to be transmitted through the public network under the condition of low risk, and protects the data from being stolen and read by the third party
the core advantage of blockchain technology is decentralization, which can realize point-to-point transaction, coordination and cooperation based on decentralized credit in a distributed system without mutual trust by means of data encryption, time stamp, distributed consensus and economic incentive, so as to solve the high cost and low cost of centralized institutions Low efficiency and data storage insecurity provide solutions
the application fields of blockchain include digital currency, token, finance, anti-counterfeiting traceability, privacy protection, supply chain, entertainment, etc. with the popularity of blockchain and bitcoin, many related top domain names have been registered, which has a great impact on the domain name instry.
1.1. Introction
practitioners in the computer instry should be very familiar with the word hash. Hash can realize the mapping of data from one dimension to another, and hash function is usually used to realize this mapping. Generally, y = hash (x) is used in the instry. The hash function can calculate a hash value y by calculating X
hash function characteristics in blockchain:
function parameters are string type
fixed size output
is computationally efficient
collision free means that the conflict probability is small: X= y => hash(x) != Hash (y)
hide the original information: for example, the verification of transactions between nodes in the blockchain only needs to verify the information entropy of the transaction, and does not need to compare the original information. The nodes do not need to transmit the original data of the transaction, only the hash of the transaction, Common algorithms include Sha series and MD5
1.2. Hash is widely used in blockchain. One of them is called hash pointer
hash pointer, which means that the value of the variable is calculated from the actual data and points to the actual data location, That is, it can not only represent the actual data content, but also the storage location of the actual data. The figure below shows the schematic diagram of hash pointer

blockchain technology originates from bitcoin, and its essence is to create a decentralized digital currency system by using computer algorithm and cryptography technology, so as to realize the functions of currency issuance and transaction
characteristics of blockchain Technology:
1. Decentralized: there is no centralized hardware or management organization in the whole network, the rights and obligations of any node are equal, and the damage or loss of any node will not affect the operation of the whole system. Therefore, it can also be considered that the blockchain system has excellent robustness
2. Trustworthiness: there is no need to trust each other when participating in the data exchange between each node in the whole system. The operation rules of the whole system are open and transparent, and all data contents are also open. Therefore, in the specified rule range and time range of the system, nodes can not and cannot cheat other nodes
3. Collective maintenance: data blocks in the system are jointly maintained by all nodes with maintenance function in the whole system, and these nodes with maintenance function can be participated by anyone
4. Reliable database: the whole system will enable each participating node to obtain a of the complete database in the form of sub databases. Unless more than 51% of the nodes in the whole system can be controlled at the same time, the modification of the database on a single node is invalid, and the data content on other nodes cannot be affected. Therefore, the more nodes and computing power in the system, the higher the data security in the system
the other two features are derived from the four features:
5. Open source: because the operation rules of the whole system must be open and transparent, the whole system must be open source for the program
6. Anonymity: since there is no need to trust each other between nodes, there is no need to disclose the identity between nodes, and each participating node in the system is anonymous< EGD: e-gold coin, or EGD for short, is a network encrypted digital asset based on peer-to-peer Internet open source protocol, which circulates in a decentralized network system. EGD, as a kind of consumer asset given by global commercial consumers from businesses, is used to replace the points issued by businesses in traditional commercial society, realizing the networking, integration and capitalization of global commercial points
EGD, namely network gold, is an encrypted digital asset based on decentralized digital encryption technology. EGD was born in January 2014. It was developed by a team of 17 technical experts from seven countries around the world, led by former Microsoft engineers. EGD introces the technology of encrypted digital assets into the field of global business integration points, which enables global consumers to continuously share the profits of commercial society through the circulation and value-added of EGD business points, and create a win-win economic model for businesses and consumers
features of customized EGD:
with customized technology, we can easily build all kinds of intelligent assets based on EGD protocol, including stocks, bonds, or various derivative points
more importantly, customization technology not only expands the application scope of EGD, but also retains the characteristics of clear property rights and decentralization of EGD. Moreover, e to the limited number of customized points, customized points are more scarce.
jinwowo will use blockchain technology to promote the legalization of big data business. The encryption of blockchain technology can ensure that the privacy of data sources can be better protected while big data is called.
the details of these two digital assets are as follows
bitcoin (bitcoin: bitcoin) was originally a kind of network virtual currency, which can buy real-life goods. It is characterized by decentralization, anonymity, and can only be used in the digital world. It does not belong to any country or financial institution, and is not subject to geographical restrictions. It can be exchanged anywhere in the world. Therefore, it is used as a money laundering tool by some criminals
the full name of NMC is "new media chain", the Chinese name is media chain, and the former domain name currency (also referred to as NMC) is two completely different currencies. NMC is the circulating currency of three decentralized application platforms: coin call [blockchain information community portal], coin search [blockchain network query tool], ncoin [digital currency exchange]. However, the prices of these two kinds of digital currencies will fluctuate with the market, which can not guarantee a development prospect. If the current price is concerned, bitcoin will be a bit higher.