Position: Home page » Blockchain » Thousands of dollars of blockchain encryption celebrities

Thousands of dollars of blockchain encryption celebrities

Publish: 2021-04-25 13:48:32
1. Li Xiaolai, Bao Erye, sun Yuchen, Xiaoju (ran Jiali)
2. blockchain encryption algorithm
asymmetric encryption algorithm is a function that converts the original plaintext file or data into a series of unreadable ciphertext codes by using an encryption key. The encryption process is irreversible. Only holding the corresponding decryption key can the encrypted information be decrypted into readable plaintext. Encryption enables private data to be transmitted through the public network under the condition of low risk, and protects the data from being stolen and read by the third party
the core advantage of blockchain technology is decentralization, which can realize point-to-point transaction, coordination and cooperation based on decentralized credit in a distributed system without mutual trust by means of data encryption, time stamp, distributed consensus and economic incentive, so as to solve the high cost and low cost of centralized institutions Low efficiency and data storage insecurity provide solutions
the application fields of blockchain include digital currency, token, finance, anti-counterfeiting traceability, privacy protection, supply chain, entertainment, etc. with the popularity of blockchain and bitcoin, many related top domain names have been registered, which has a great impact on the domain name instry.
3.

1.1. Introction

practitioners in the computer instry should be very familiar with the word hash. Hash can realize the mapping of data from one dimension to another, and hash function is usually used to realize this mapping. Generally, y = hash (x) is used in the instry. The hash function can calculate a hash value y by calculating X
hash function characteristics in blockchain:

< UL >
  • function parameters are string type

  • fixed size output

  • is computationally efficient

  • collision free means that the conflict probability is small: X= y => hash(x) != Hash (y)

    hide the original information: for example, the verification of transactions between nodes in the blockchain only needs to verify the information entropy of the transaction, and does not need to compare the original information. The nodes do not need to transmit the original data of the transaction, only the hash of the transaction, Common algorithms include Sha series and MD5

  • 1.2. Hash is widely used in blockchain. One of them is called hash pointer
    hash pointer, which means that the value of the variable is calculated from the actual data and points to the actual data location, That is, it can not only represent the actual data content, but also the storage location of the actual data. The figure below shows the schematic diagram of hash pointer


    < / UL >
    4.

    Osmanthus fragrans doesn't belong to Osmanthus fragrans. Cigui, also known as Huaye tree, mouse thorn; It is a plant of Ilex family. Evergreen shrubs or small trees, landscaping tree species. It is mainly distributed in the middle and lower reaches of the Yangtze River in China

    There are four groups of Osmanthus fragrans, namely Dangui, Jingui, Yingui and sijigui. Among them, Osmanthus fragrans, Osmanthus fragrans and Osmanthus fragrans all bloom in autumn and are collectively called August osmanthus. Generally, it takes at least 10 years for Osmanthus fragrans seedlings to bloom in open field. For newly transplanted seedlings, it is not allowed to apply fertilizer too early. Sowing seedlings, after two years of cultivation, the next spring can be transplanted, flowering period in ten years

    5. First of all, these two are virtual assets. The price of these two kinds of digital currency, or a specific price of digital currency, is determined according to the market situation
    the details of these two digital assets are as follows
    bitcoin (bitcoin: bitcoin) was originally a kind of network virtual currency, which can buy real-life goods. It is characterized by decentralization, anonymity, and can only be used in the digital world. It does not belong to any country or financial institution, and is not subject to geographical restrictions. It can be exchanged anywhere in the world. Therefore, it is used as a money laundering tool by some criminals
    the full name of NMC is "new media chain", the Chinese name is media chain, and the former domain name currency (also referred to as NMC) is two completely different currencies. NMC is the circulating currency of three decentralized application platforms: coin call [blockchain information community portal], coin search [blockchain network query tool], ncoin [digital currency exchange]. However, the prices of these two kinds of digital currencies will fluctuate with the market, which can not guarantee a development prospect. If the current price is concerned, bitcoin will be a bit higher.
    6. Blockchain is the underlying technology of bitcoin, like a database ledger, recording all transaction records. Because of its safety and convenience, this technology has graally attracted the attention of the banking and financial instry
    there is no legal person in blockchain, and blockchain is a technology. Now many people are focusing on blockchain technology. Blockchain technology is the underlying protocol of bitcoin, Ruitai coin, Weimeng coin and other digital currencies.
    7. Think too much... Take sha256 for example, the probability that you will collide with the private key is probably equivalent to finding a special atom from all the observable atoms in the universe. It is equivalent to winning millions of grand prizes in a row. This has nothing to do with IQ. This encryption method is barbaric and effective, not high-tech
    in the future, blockchain encryption can be said to be cracked. Of course, it's not the current computer system, it's the quantum computer. Once this thing is mass proced, the blockchain will be abandoned.
    Hot content
    Inn digger Publish: 2021-05-29 20:04:36 Views: 341
    Purchase of virtual currency in trust contract dispute Publish: 2021-05-29 20:04:33 Views: 942
    Blockchain trust machine Publish: 2021-05-29 20:04:26 Views: 720
    Brief introduction of ant mine Publish: 2021-05-29 20:04:25 Views: 848
    Will digital currency open in November Publish: 2021-05-29 19:56:16 Views: 861
    Global digital currency asset exchange Publish: 2021-05-29 19:54:29 Views: 603
    Mining chip machine S11 Publish: 2021-05-29 19:54:26 Views: 945
    Ethereum algorithm Sha3 Publish: 2021-05-29 19:52:40 Views: 643
    Talking about blockchain is not reliable Publish: 2021-05-29 19:52:26 Views: 754
    Mining machine node query Publish: 2021-05-29 19:36:37 Views: 750