Papers on cryptocurrency
Publish: 2021-05-01 15:17:55
1. There are many advantages of encrypted digital currency. Here are two
1. Secure
transaction of cryptocurrency on the decentralized platform of blockchain, the E-wallet used by it is authorized to send and receive cryptocurrency by the cryptosystem using the unique public key and private key. And the account does not need to be identified by a third party, so outsiders can not know the identity of the trader
2. Tamper proof
after the transaction on the blockchain is confirmed, it is tamper proof, and this kind of data is traceable, so the illegal elements can't cheat by deleting or modifying the records
you can learn about cryptocurrency through some media platforms, so I won't go into details here.
1. Secure
transaction of cryptocurrency on the decentralized platform of blockchain, the E-wallet used by it is authorized to send and receive cryptocurrency by the cryptosystem using the unique public key and private key. And the account does not need to be identified by a third party, so outsiders can not know the identity of the trader
2. Tamper proof
after the transaction on the blockchain is confirmed, it is tamper proof, and this kind of data is traceable, so the illegal elements can't cheat by deleting or modifying the records
you can learn about cryptocurrency through some media platforms, so I won't go into details here.
2.
3. In market economic activities, money not only acts as the medium of commodity circulation, but also as the representative of property, becoming the tool of credit activities. A series of economic activities related to money revenue and expenditure, such as transactions and lending, are financial activities. The earliest commodity exchange in human history is direct barter, Barter. Barter without money often takes a lot of trouble. If Party A needs Party B's goods, but Party B doesn't need Party A's goods, they can't conclude a deal. Its disadvantages become more and more obvious with the expansion of the scope of commodity exchange. 1. Money performs the function of medium of exchange. In the practice of exchange, people graally get used to using some kind of goods that are easy to be accepted by everyone as the basis of commodity exchange; Middleman;, Second, currency performs the function of valuation unit, which is to give a certain price to the commodity. There are tens of millions of commodities in the market, and the evaluation of the same commodity's utility varies greatly, Therefore, it is often difficult for people to understand the exchange ratio of various commodities, and the transaction is naturally difficult to be fair. Because the currency that can be obtained after a commodity is sold is the price of the commodity, once the commodity has formed a widely accepted price in the market transaction, people no longer need to remember the exchange ratio of various commodities one by one, As long as you look at the price, you can see at a glance. Money has gone through the evolution process from physical money to metal money, and then from metal money to paper money, Accounting currency in the form of bill and various kinds of electronic currency in recent years have replaced some paper money for circulation. Money can be easily exchanged for a variety of goods and finance at any time. Therefore, in addition to performing the functions of exchange medium and valuation unit in commodity exchange, money itself has also become the representative of property, Not only can it be stored as future purchasing power, but also it can realize value-added by transferring to others for interest. Transferring the right to use currency for a period of time is money lending activities. In the lending activities of transferring the right to use currency, the relationship between the two parties is a kind of creditor's right and debt relationship. The creditor temporarily transfers the right to use currency for a period of time, The user of money (debtor) has the obligation to return after a certain period of time and pay a certain amount of interest
4. What is money? Money is the medium for the exchange of goods (including services). Now our currency is issued by a reputable bank, which is basically guaranteed by its reputation. As long as the users agree, then we can use it to trade. Currency has a certain value preserving property. After I change my labor / services / all my goods into currency, the bank guarantees that I can exchange it for something of almost equal value one day in the future. The premise of this guarantee is that banks will not issue new currencies indiscriminately and that everyone will trust it
in the past, we used precious metals as currency. Because precious metal proction is not high, the speed of new money increase is limited, and the economy is growing, the market needs more money to let the goods flow as much as possible. There is value when there is demand. In this sense, the value of precious metals in making other things is secondary. The economy needs money to circulate goods, and this demand is the main one. However, if the proction of precious metals is limited, and the precious metal currencies in circulation will withdraw from the market for various reasons, then even the newly made precious metal currencies have the same or even higher value
why does bitcoin keep its value? BTC (short for bitcoin) exists in a huge P2P network. Bitcoin group has recognized an algorithm. Under current conditions, only about 6 new BTCs will be generated per hour. At present, there are 50 new BTCs in each group. That is to say, in this world, only about 300 BTCs are generated per hour. This output will also be limited by the difficulty automatically adjusted by the network. You can't speed up money proction by modifying everyone's client algorithm and parameters (client is open source). Counterfeit currency will be discarded by the network (unless you can control most of the network nodes)
what is the value of BTC itself
the value of BTC is the trading channel itself. A new set of BTCs provides a mathematical guarantee to transfer old BTCs from one account to another. The price behind this security guarantee is a lot of computing power. It takes a lot of energy to proce such a safe passage, so the whole BTC user group will reward the mint (currently 50 BTC), which will become 25 BTC after December 2012, and it will be halved every four years
to put it simply, my understanding is that all BTCs in the world are generated by the energy of running computers. Their total value (up to now, there are about 12W groups of BTCs proced, 50 in each group, and the market price is about US $7.3), should be less than the total market value of consumed energy. However, I think most of the energy used to proce BTC is wasted resources< br />4
in the past, we used precious metals as currency. Because precious metal proction is not high, the speed of new money increase is limited, and the economy is growing, the market needs more money to let the goods flow as much as possible. There is value when there is demand. In this sense, the value of precious metals in making other things is secondary. The economy needs money to circulate goods, and this demand is the main one. However, if the proction of precious metals is limited, and the precious metal currencies in circulation will withdraw from the market for various reasons, then even the newly made precious metal currencies have the same or even higher value
why does bitcoin keep its value? BTC (short for bitcoin) exists in a huge P2P network. Bitcoin group has recognized an algorithm. Under current conditions, only about 6 new BTCs will be generated per hour. At present, there are 50 new BTCs in each group. That is to say, in this world, only about 300 BTCs are generated per hour. This output will also be limited by the difficulty automatically adjusted by the network. You can't speed up money proction by modifying everyone's client algorithm and parameters (client is open source). Counterfeit currency will be discarded by the network (unless you can control most of the network nodes)
what is the value of BTC itself
the value of BTC is the trading channel itself. A new set of BTCs provides a mathematical guarantee to transfer old BTCs from one account to another. The price behind this security guarantee is a lot of computing power. It takes a lot of energy to proce such a safe passage, so the whole BTC user group will reward the mint (currently 50 BTC), which will become 25 BTC after December 2012, and it will be halved every four years
to put it simply, my understanding is that all BTCs in the world are generated by the energy of running computers. Their total value (up to now, there are about 12W groups of BTCs proced, 50 in each group, and the market price is about US $7.3), should be less than the total market value of consumed energy. However, I think most of the energy used to proce BTC is wasted resources< br />4
5. Application of information encryption in network security
Abstract: e to the development of network technology, affecting all aspects of people's lives, people's network activities are more and more frequent, followed by higher and higher security requirements, and higher and higher confidentiality requirements for their own network activities, Ensure that people in the network activities of their own information and some related information confidentiality requirements, to ensure the security and confidentiality of the network. Through the introction of information encryption technology, this paper puts forward an idea of improving RSA algorithm, lists some examples of applying information encryption technology, and emphasizes the importance of information encryption technology in maintaining network security< Key words: information encryption technology, network security, RSA, encryption algorithm
1. Introction
information encryption technology is the core technology of information security. Especially in today's e-commerce, e-cash, digital currency, network banking and other network business rapid rise. How to protect the information security from being stolen, tampered or destroyed has been paid more and more attention. The key to solve this problem is information encryption technology. The so-called encryption is the process of converting the readable information called "plaintext" into "ciphertext"; Decryption is the process of restoring "ciphertext" to "plaintext". Encryption and decryption should use cryptographic algorithm to achieve. Cryptographic algorithm is a computable process used to hide and reveal information. Generally, the more complex the algorithm is, the more secure the ciphertext is. In the encryption technology, the key is essential, the key is to make the cipher algorithm run in a specific way and proce a specific ciphertext value[ 1] The use of encryption algorithm can protect information security from theft, tampering or destruction
2. Information encryption technology
2.1 encryption mode
encryption algorithm can be regarded as a complex function transformation, x = (y, K) x represents ciphertext, that is, the character sequence obtained after encryption, y represents plaintext, that is, the character sequence to be encrypted, and K represents the key. After encryption is completed, the ciphertext can be sent to the receiver through an unsafe channel, Only the receiver with the decryption key can decrypt the ciphertext, that is, the plaintext can be obtained by inverse transformation[ 2]
2.2 encryption algorithm
symmetric algorithm is sometimes called the traditional cryptographic algorithm, that is, the encryption key can be calculated from the decryption key, and vice versa. In most symmetric algorithms, the encryption / decryption key is the same. These algorithms are also called secret key or single key algorithms, which require the sender and receiver to agree on a key before secure communication. The security of symmetric algorithm depends on the key, and revealing the key means that anyone can encrypt / decrypt the message. As long as the communication needs to be kept secret, the key must be kept secret. Therefore, symmetric algorithm means that the encryption and decryption processes use the same key, such as DES, 3DES, AES and other algorithms belong to symmetric algorithm
asymmetric algorithm is also called public key algorithm. The key used for encryption is different from the key used for decryption, and the decryption key cannot be calculated according to the encryption key (at least for a reasonably long time). The reason why it is called public key algorithm is that the encryption key can be made public, that is, the stranger can encrypt the information with the encryption key, but only with the corresponding decryption key can the information be decrypted. But it is difficult to derive the private key from the public key. RSA [1], DSA and other algorithms are asymmetric algorithms, among which RSA is the most widely used, which can not only be used for encryption but also digital signature[ 3]
2.3 an improvement on the asymmetric encryption algorithm RSA
generally, the security of the asymmetric encryption algorithm RSA mainly depends on the large number, but whether it is equal to the decomposition of large number has not been proved in theory, because it is necessary to decompose large number to crack RSA without proof. Therefore, the most obvious attack method is to decompose molus 10, so people choose molus greater than 10100 for security, which undoubtedly reces the event complexity of the algorithm for calculating public key and key< Therefore, based on RSA algorithm, a variant of RSA algorithm is proposed. The specific ideas are as follows:
generation of public encryption transformation ex and secret decryption transformation DX of user X: (1) randomly select n prime numbers P1, P2... PN 2) Calculate NX = P1 * P2... * PN, Ф( nx)=(p1-1)*(p2-1)*……*(rj-1)( 3) Randomly select the integer ex to satisfy (ex, Ф( nx)) =1;( 4) The Euclidean algorithm is used to calculate DX, which satisfies ex * DX ≡ 1 mod Ф( nx);( 5) Disclose NX, ex as ex, and record as ex = & lt; nx,ex>, Confidential P1, P2,..., PN, Ф( Nx) as DX, DX = & lt; p1,p2,……,pn ,dx, Ф( nxj) > Encryption algorithm: C = ex (m) = mex (MOD NX), decryption algorithm: M = DX (c) = CDX (MOD NX). In RSA algorithm, there are two keys: encryption key PK and decryption key SK, and the encryption key is public
the speed of computing 8*8 in binary case is obviously greater than that of 2*2*2*2*2*2 by proving that the speed of the algorithm is higher than that of 2*2*2*2*2*2. This proves the advanced nature of the RSA algorithm. Because of the variant of RSA algorithm or the encryption algorithm based on the original algorithm, the algorithm can be proved by mathematical inction, which basically does not violate the RSA algorithm's Wuan nature. Therefore, the security of RSA algorithm variant is guaranteed
3. Information encryption technology ensures network security
3.1 The Application of information encryption technology in e-commerce
e-commerce is changing people's life and the development process of the whole society, and network trade will cause people's comprehensive innovation in management mode, work and life style, and even business management thinking mode. At the same time, a stable network security environment is crucial to the healthy and sustainable development of e-commerce. The security of e-commerce is mainly the security of network platform and transaction information. The security of transaction information refers to the protection of both sides of the transaction from being damaged and divulged, and the confirmation of the identity of both sides of the transaction[ 4] Therefore, the application of data encryption, digital signature, digital certificate, SSL, set security protocol in e-commerce to ensure the security of e-commerce transaction information, the combination of e-commerce and information encryption technology will promote the stable development of e-commerce
3.2 encrypt anti-virus and anti-virus software. Once the encryption program itself is infected with computer virus, it will not check whether the program or data is encrypted or has digital signature. Every time you start to execute the encryption program, you should check whether it is infected by the virus, and you should also check the files that need to be encrypted and decrypted. This checking mechanism should be confidential. Therefore, encryption technology is also used in some anti-virus or antivirus software[ 5]
3.3 encryption of network database
the public channel and computer storage system in transmission are very fragile. As long as you use a PC to access the Internet, you can steal many other people's useful information, even all kinds of passwords, so it is necessary to take measures to protect the data. Users need to protect the key data effectively. Because the traditional way of database protection is realized by setting password and access rights. The key to solve this problem is to encrypt the data itself, so that even if the data is unfortunately leaked or lost, it is difficult to be deciphered by a third party. The running platform of large database management system is usually windows nt or UNIX, and the security level of these operating systems is usually C1 and C2. They have the security functions of user registration, user identification, arbitrary access control and auditing. Although DBMS adds many security measures on the basis of OS, OS and DBMS still lack effective protection measures for database files. It can be seen that data encryption is necessary for the external or internal security management of the system[ 6]
3.4 the combination of information encryption technology and VPN
nowadays, more and more companies are moving towards collectivization. A company may have subsidiaries or offices in different regions, and each organization has its own LAN, but LAN users want to connect these LANs together to form a WAN. The application of VPN technology can solve this problem, In fact, many companies have done this, but they usually use leased private lines to connect these LANs. Their concern is the security and confidentiality of file transmission. Now routers with information encryption function are everywhere, which makes it possible for people to connect these LANs through the Internet, When the data leaves the local area network where the sender is located, the data is first encrypted by the router connected to the VPN by the client. The data is transmitted in the form of ciphertext on the Internet. When the router reaches the destination local area network, the router will decrypt the data, so that the users in the destination local area network can see the plaintext< This paper introces the related concepts of information encryption technology, gives a simple statement of various encryption algorithms, and puts forward their own improvement suggestions for RSA algorithm. However, e to the limited personal ability, it is insufficient to give a thorough demonstration of the improved RSA algorithm. It also lists several examples of using information encryption technology to maintain network harmony, discusses the importance of information encryption technology to maintain network security, and proves that information encryption technology is an indispensable part of network security.
Abstract: e to the development of network technology, affecting all aspects of people's lives, people's network activities are more and more frequent, followed by higher and higher security requirements, and higher and higher confidentiality requirements for their own network activities, Ensure that people in the network activities of their own information and some related information confidentiality requirements, to ensure the security and confidentiality of the network. Through the introction of information encryption technology, this paper puts forward an idea of improving RSA algorithm, lists some examples of applying information encryption technology, and emphasizes the importance of information encryption technology in maintaining network security< Key words: information encryption technology, network security, RSA, encryption algorithm
1. Introction
information encryption technology is the core technology of information security. Especially in today's e-commerce, e-cash, digital currency, network banking and other network business rapid rise. How to protect the information security from being stolen, tampered or destroyed has been paid more and more attention. The key to solve this problem is information encryption technology. The so-called encryption is the process of converting the readable information called "plaintext" into "ciphertext"; Decryption is the process of restoring "ciphertext" to "plaintext". Encryption and decryption should use cryptographic algorithm to achieve. Cryptographic algorithm is a computable process used to hide and reveal information. Generally, the more complex the algorithm is, the more secure the ciphertext is. In the encryption technology, the key is essential, the key is to make the cipher algorithm run in a specific way and proce a specific ciphertext value[ 1] The use of encryption algorithm can protect information security from theft, tampering or destruction
2. Information encryption technology
2.1 encryption mode
encryption algorithm can be regarded as a complex function transformation, x = (y, K) x represents ciphertext, that is, the character sequence obtained after encryption, y represents plaintext, that is, the character sequence to be encrypted, and K represents the key. After encryption is completed, the ciphertext can be sent to the receiver through an unsafe channel, Only the receiver with the decryption key can decrypt the ciphertext, that is, the plaintext can be obtained by inverse transformation[ 2]
2.2 encryption algorithm
symmetric algorithm is sometimes called the traditional cryptographic algorithm, that is, the encryption key can be calculated from the decryption key, and vice versa. In most symmetric algorithms, the encryption / decryption key is the same. These algorithms are also called secret key or single key algorithms, which require the sender and receiver to agree on a key before secure communication. The security of symmetric algorithm depends on the key, and revealing the key means that anyone can encrypt / decrypt the message. As long as the communication needs to be kept secret, the key must be kept secret. Therefore, symmetric algorithm means that the encryption and decryption processes use the same key, such as DES, 3DES, AES and other algorithms belong to symmetric algorithm
asymmetric algorithm is also called public key algorithm. The key used for encryption is different from the key used for decryption, and the decryption key cannot be calculated according to the encryption key (at least for a reasonably long time). The reason why it is called public key algorithm is that the encryption key can be made public, that is, the stranger can encrypt the information with the encryption key, but only with the corresponding decryption key can the information be decrypted. But it is difficult to derive the private key from the public key. RSA [1], DSA and other algorithms are asymmetric algorithms, among which RSA is the most widely used, which can not only be used for encryption but also digital signature[ 3]
2.3 an improvement on the asymmetric encryption algorithm RSA
generally, the security of the asymmetric encryption algorithm RSA mainly depends on the large number, but whether it is equal to the decomposition of large number has not been proved in theory, because it is necessary to decompose large number to crack RSA without proof. Therefore, the most obvious attack method is to decompose molus 10, so people choose molus greater than 10100 for security, which undoubtedly reces the event complexity of the algorithm for calculating public key and key< Therefore, based on RSA algorithm, a variant of RSA algorithm is proposed. The specific ideas are as follows:
generation of public encryption transformation ex and secret decryption transformation DX of user X: (1) randomly select n prime numbers P1, P2... PN 2) Calculate NX = P1 * P2... * PN, Ф( nx)=(p1-1)*(p2-1)*……*(rj-1)( 3) Randomly select the integer ex to satisfy (ex, Ф( nx)) =1;( 4) The Euclidean algorithm is used to calculate DX, which satisfies ex * DX ≡ 1 mod Ф( nx);( 5) Disclose NX, ex as ex, and record as ex = & lt; nx,ex>, Confidential P1, P2,..., PN, Ф( Nx) as DX, DX = & lt; p1,p2,……,pn ,dx, Ф( nxj) > Encryption algorithm: C = ex (m) = mex (MOD NX), decryption algorithm: M = DX (c) = CDX (MOD NX). In RSA algorithm, there are two keys: encryption key PK and decryption key SK, and the encryption key is public
the speed of computing 8*8 in binary case is obviously greater than that of 2*2*2*2*2*2 by proving that the speed of the algorithm is higher than that of 2*2*2*2*2*2. This proves the advanced nature of the RSA algorithm. Because of the variant of RSA algorithm or the encryption algorithm based on the original algorithm, the algorithm can be proved by mathematical inction, which basically does not violate the RSA algorithm's Wuan nature. Therefore, the security of RSA algorithm variant is guaranteed
3. Information encryption technology ensures network security
3.1 The Application of information encryption technology in e-commerce
e-commerce is changing people's life and the development process of the whole society, and network trade will cause people's comprehensive innovation in management mode, work and life style, and even business management thinking mode. At the same time, a stable network security environment is crucial to the healthy and sustainable development of e-commerce. The security of e-commerce is mainly the security of network platform and transaction information. The security of transaction information refers to the protection of both sides of the transaction from being damaged and divulged, and the confirmation of the identity of both sides of the transaction[ 4] Therefore, the application of data encryption, digital signature, digital certificate, SSL, set security protocol in e-commerce to ensure the security of e-commerce transaction information, the combination of e-commerce and information encryption technology will promote the stable development of e-commerce
3.2 encrypt anti-virus and anti-virus software. Once the encryption program itself is infected with computer virus, it will not check whether the program or data is encrypted or has digital signature. Every time you start to execute the encryption program, you should check whether it is infected by the virus, and you should also check the files that need to be encrypted and decrypted. This checking mechanism should be confidential. Therefore, encryption technology is also used in some anti-virus or antivirus software[ 5]
3.3 encryption of network database
the public channel and computer storage system in transmission are very fragile. As long as you use a PC to access the Internet, you can steal many other people's useful information, even all kinds of passwords, so it is necessary to take measures to protect the data. Users need to protect the key data effectively. Because the traditional way of database protection is realized by setting password and access rights. The key to solve this problem is to encrypt the data itself, so that even if the data is unfortunately leaked or lost, it is difficult to be deciphered by a third party. The running platform of large database management system is usually windows nt or UNIX, and the security level of these operating systems is usually C1 and C2. They have the security functions of user registration, user identification, arbitrary access control and auditing. Although DBMS adds many security measures on the basis of OS, OS and DBMS still lack effective protection measures for database files. It can be seen that data encryption is necessary for the external or internal security management of the system[ 6]
3.4 the combination of information encryption technology and VPN
nowadays, more and more companies are moving towards collectivization. A company may have subsidiaries or offices in different regions, and each organization has its own LAN, but LAN users want to connect these LANs together to form a WAN. The application of VPN technology can solve this problem, In fact, many companies have done this, but they usually use leased private lines to connect these LANs. Their concern is the security and confidentiality of file transmission. Now routers with information encryption function are everywhere, which makes it possible for people to connect these LANs through the Internet, When the data leaves the local area network where the sender is located, the data is first encrypted by the router connected to the VPN by the client. The data is transmitted in the form of ciphertext on the Internet. When the router reaches the destination local area network, the router will decrypt the data, so that the users in the destination local area network can see the plaintext< This paper introces the related concepts of information encryption technology, gives a simple statement of various encryption algorithms, and puts forward their own improvement suggestions for RSA algorithm. However, e to the limited personal ability, it is insufficient to give a thorough demonstration of the improved RSA algorithm. It also lists several examples of using information encryption technology to maintain network harmony, discusses the importance of information encryption technology to maintain network security, and proves that information encryption technology is an indispensable part of network security.
Hot content