Position: Home page » Ethereum » Ethereum public key length

Ethereum public key length

Publish: 2021-04-22 07:26:38
1.

Ethernet mining tutorial

1. Create a new folder on the hard disk, which is better than C: eth. Then all the mining software is stored here

2. Download the following software

1) geth -- select geth win download and unzip

2) ethernet -- download and unzip to the same folder and rename it as "miner"

3) Ethereum wallet -- Download the win Ethereum wallet and unzip it and rename it as "wallet"

install all the software

3 Open the command prompt (click win and R at the same time, or click Start menu and enter CMD). The command prompt is a command line parser that allows you to execute command input software in the operating system

After

, you will have Ethereum wallet. But there is no balance, so next you need to build an ethminer. It's time to minimize your wallet

Mining

2.

BTC bitcoin

bitcoin is the first distributed digital asset platform created. Since its launch in 2009, it has proven to be not only the most popular, but also the largest market capital value. In addition, it is also the most expensive, with a value of $10710 per coin on February 17, 2018. Bitcoin introces the first blockchain distributed ledger dedicated to recording all transactions, and gets rid of the function that users need a central authority to process or verify transactions

its goal is to provide a platform for users to conct cross-border transactions without any intermediary, which is what we call decentralization. The platform's largest money (BTC) supply is about 21 million. Of this figure, about 16.5 million have been mined and are now in circulation. It is mined all the time around the world to ensure the circulation of coins

Advantages:

1. Its distributed system provides users with great freedom

2. High portability

This is a secure network

disadvantages:

1

2. The user may lose the key

eth Ethereum

Ethereum is also a distributed platform, which was created by Network Programmer vitalik buterin in July 2015. Ethereum aims to enable users to create and deploy smart contracts. One of the main functions of smart contracts is to allow the creation of encrypted assets or tokens running on Ethereum networks. Ethereum token is used to purchase various functions such as cloud storage space. These tokens are stored in a digital wallet compatible with Ethereum blockchain

Ethereum's digital currency ether serves as the medium for executing smart contracts. At present, about 98 million ether coins have been mined and circulated, and the circulation supply increases by about 18 million every year. Ethernet coin is created to run on the Ethereum network. It can be used to compensate the participant nodes or transfer from one user to another

advantages:

1

2

The safety was very high

disadvantages: large circulation

< H2 > extended data:

generation principle:

starting from the essence of bitcoin, the essence of bitcoin is actually a special solution generated by a bunch of complex algorithms. A special solution is one of the finite solutions of a system of equations. Every particular solution can solve the equation and is unique

in the metaphor of banknotes, bitcoin is the number of the top word of a banknote. The number of the top word on a banknote owns the banknote. The process of mining is to constantly seek the special solution of the equation system through huge amount of calculation. The equation system is designed to have only 21 million special solutions, so the upper limit of bitcoin is 21 million

to mine bitcoin, you can download the special bitcoin computing tools, register various cooperation websites, fill the registered user name and password into the computing program, and then click the operation to officially start

after completing the installation of bitcoin client, you can directly obtain a bitcoin address. When others pay, you only need to post the address to others, and you can pay through the same client

after installing the bitcoin client, it will assign a private key and a public key. You need to back up the wallet data containing your private key to ensure that your property is not lost. Unfortunately, if the hard disk is completely formatted, personal bitcoin will be completely lost

3. At the top of Ethereum is DAPP. It exchanges with the smart contract layer through Web3. JS. All smart contracts run on EVM (Ethereum virtual machine) and use RPC calls. Below EVM and RPC are the four core contents of Ethereum, including: blockchain, consensus algorithm, mining and network layer. Except DAPP, all other parts are in the Ethereum client. The most popular Ethereum client is geth (go Ethereum)
4.

in terms of cloth storage and mining, I recommend Heshu hardware wallet and jiajiabao intelligent home miner. The core advantage of the proct is safety

take sum hardware wallet as an example. The advantages of sum hardware wallet are as follows:

1. The private key seed is encrypted layer by layer, physically isolated and never touched the Internet.

firstly, when creating the wallet, the seed password is generated and stored in the local encryption chip, and the 10 bit payment password is required

then, the transaction is made in the wallet. At this time, the user needs to enter the payment password to obtain the private key to digitally sign the transaction, and the transaction is completed. In addition, the private key seed is permanently stored in the chip, which is physically isolated and never touches the Internet. There is no need to worry about my password being stolen by hackers

Second, the bank system verifies the financial level motherboard and encryption chip

uses the bank system to verify the financial level motherboard, and the private key seed is stored in the chip. If the proct is stolen or lost, and destroyed by malicious violence, the chip will trigger a self destruct circuit, and immediately permanently and irrecoverably delete all the information in the area

Third, it supports the withdrawal of global bitcoin ATM, which is convenient and fast

the reason why digital assets attract the attention of many fields in the world is that it is creating a global fast circulation, and the larger the circulation field is, the wider the scope is, and the higher its use value is. The core of digital assets is the medium it acts on among currencies. The Heshu wallet has built-in many mainstream exchanges in the world. It can trade digital assets anytime and anywhere. With one machine in hand, it can walk around the world without worry, and no longer have to worry about exchanging foreign currency

Different from conventional digital wallets, multi signature wallets need the authorization of multiple key holders to transfer digital currency, so the security of multi signature wallets is higher. Ordinary Wallet: a wants to transfer a bitcoin to X. A only needs his signature (using the private key) to complete the transaction. Sum Wallet: if a wants to transfer a bitcoin to x, a multi signature verification is set (at least two signatures of Abc3 indivials are required to transfer the money), then a needs B or C to complete the signature (using the private key) when a wants to transfer the money to X. I hope I can help you. Thank you

5.

The digital currency wallet is the hardware wallet, which means that the private key of digital assets is stored in a single chip, isolated from the Internet, plug and play. Hardware wallet can't guarantee 100% security. For example, if a geek gets your hardware wallet and doesn't know your private key, it may be cracked by violence. It's just one of the safest storage methods compared to other storage methods

many block chain entrepreneurs at home and abroad are optimistic about the development of this field, so they begin to build more hardware wallets. In the case of the exchange being stolen a lot of money and the software wallet being stolen from time to time, many investors regard the hardware wallet as the last moat

extended information:

whether the hardware wallet is safe

the hardware wallet can not guarantee 100% security. For example, if a geek obtains your hardware wallet, it may be cracked violently even if it doesn't know your hardware wallet immediately. It's just one of the safest storage methods compared to other storage methods

of course, there are exceptions, such as you have unlimited brain power and never forget. It's better to save it anywhere than in your own mind

6. To create a Genesis configuration file:
first, you need to create a "Genesis" JSON configuration file, which describes some parameters of the genesis block. The following is the content of the file:
{
& quot; coinbase": & quot;& quot;,< br />" config": {< br />" homesteadBlock": 5
},
" difficulty": & quot; 0x20000",< br />" extraData": & quot; 0x",< br />" gasLimit": & quot; 0x2FEFD8",< br />" mixhash": & quot;& quot;,< br />" nonce": & quot; 0x0",< br />" parentHash": & quot; 000000000000000000000000",< br />" timestamp": & quot; 0x00",< br />" alloc": {< br />"& quot;:< br />{
" balance":& quot;& quot;
}
}
} 1234567891011213141516171819

the above code into a text file and name it genesis.json

Genesis!:
in order not to conflict with the data of the main chain, it is recommended to establish your own private chain data folder. On my computer, I built an ethdbspace as the Ethereum experimental work area on disk e, and created a privchain folder as the data storage folder of my first private chain
here, in order to facilitate management, I put genesis.json under the ethdbspace folder
open the windows command line

type the following command
geth -- dataDir & quot; E:\ EthDBSpace\ PrivChain" init " E:\ EthDBSpace\ genesis.json" 1

– the dataDir option is used to specify the data directory of our private chain. On my computer, it's E: &; EthDBSpace\ Privchain
init is the genesis command, followed by our Genesis configuration file path
after clicking enter, the execution result is as follows

at this time, genesis is complete
create an account:
in order to do experiments on the private chain, we also need to create our own account on the private chain
windows command line, type
geth -- dataDir & quot; E:\ EthDBSpace\ PrivChain" Console1

we have successfully created the world, so when we enter the client for the second time, we do not need to specify the genesis.json file path again, but directly – dataDir to indicate the private link data path
the console command is used to open the command line of geth
after clicking enter, the client will be initialized for a while. After the command prompt appears, it means that you have entered the geth console

type
personal. Newaccount (& #) in the geth command line; Your Password') 1

the personal.newaccount function is used to create an account, in which the parameter is the account password.
after clicking enter, the account creation address will be listed in green below the command, that is, the public key of the account.
we can check the account balance first, In the geth command line, type:
My = eth. Accounts [0]
eth. Getbalance (my) 12

My = eth. Accounts [0]. The purpose of this sentence is to assign the account address we just created to my variable. This can simplify the subsequent account address input. Among them, eth.accounts records the addresses of all accounts on this machine. Since we created an account for the first time, there is only one account on the computer at present. So here we use eth. Accounts [0] to extract the first account address. The eth.getbalance function is used to obtain the account balance, and the parameters are filled in the account address. The my variable here records the address of the first account

I hope my answer can help you
7. If it's lost, it's better to post the lost advertisement
8. The issue of bitcoin is determined by the block height, that is, the distance from the No. 0 block of Genesis. Now when the number is reached, the total amount of bitcoin should be limited. After this village, there will be no store. If the miners dig a block but don't receive the reward of the block, the bitcoin will be destroyed forever

coinbase transaction is a special transaction that generates bitcoin "out of thin air". Only miners can write this kind of transaction, and the number of generated bitcoin is limited by rules (new currency reced by half for every 210000 blocks + transaction fee for this block)

however, the rules do not stipulate that the miner must take away all the rewards that can be taken, and can choose not to take them

therefore, a mine pool connected with the RSK side chain has made a bug before, forgetting to take away the reward and occupying a pit in a block for nothing, which is equivalent to destroying the corresponding amount of bitcoin, making the total amount of bitcoin decrease a little bit permanently

in addition, to spend a bitcoin, you only need to specify the transaction ID and output serial number

as like as two peas in multiple blocks repeatedly write identical coinbase transactions, the transaction ID is also repeated.

therefore, this kind of situation also occupies the pit of a block in vain, and permanently destroys the corresponding amount of bitcoin

it seems to me that this is still a security vulnerability, so the new version of bitcoin software later banned the writing of repeated coinbase transactions. But until now, there has been no ban on miners not getting their e rewards

generally speaking, a coin is controlled by a private key. If a coin is transferred to an address where no one knows the private key, it will be destroyed

if the owner does a good job in security, and the private key is not disclosed and cannot be guessed, but he accidentally loses the private key, it is equivalent to destroying all the coins he owns

there are only some special circumstances that require intentional destruction of coins

one is irreversibly converted into another kind of currency, such as the contract currency XCP attached to bitcoin and wormhole cash WHC attached to BCH

the second is to save certificates and data on the chain, such as the time stamp: panbiao.com/2013/08 /

and the crowd funding of the original Ethereum founding team: zhuanlan.hu.com/p/29

the private key is essentially a big number. Whoever knows this number can control the currency on the corresponding address. So the private key must be generated with reliable random number, otherwise it may be guessed and stolen

compared with the token, the address is the hash of the public key. There is no way to judge whether an address has a corresponding public key and private key (even if the public key is known, the corresponding private key cannot be known). Therefore, even if it is explicitly the address of "burned" token, the system does not prohibit the transfer in

strictly speaking, what locks the currency is a small program (script). This program takes the input as the public key and digital signature. First, check whether the public key hash is consistent, and then check whether the digital signature is valid. If it is valid, it will be verified and transfer is allowed; Otherwise, it will be judged that the transaction is illegal and refuse to package into the chain

it is the whole node software that explains and executes this program. It can be said that the software code of the whole node specifically defines a coin

however, the current situation is very embarrassing. Most miners do not run the whole node, only a few mines are running. The vast majority of users do not run the whole node, even if they run the whole node, they can only perform verification, no computing power, no block.
9. Kushen digital currency wallet guarantees that the user's private key will never touch the Internet. Its core function is to construct the transaction process offline in Kushen wallet and sign the transaction digitally
at the same time, Kushen users can set seed password and payment password to strengthen the multiple protection of Kushen wallet
the layered certainty of Kushen digital currency wallet allows users to manage multiple bitcoin addresses with a single seed password
Kushen digital currency wallet is easy to use. Kushen users can set service charges and multiple target bitcoin address book on the wallet to facilitate the management of multi account digital assets
Kushen digital currency wallet has only one screen as a single output device and only one camera as a single input device. He communicates with Kushen Internet app through two-dimensional code communication.
10. I use token pocket wallet
blockchain wallet is a container containing public key (address) and private key, which is used to keep our digital assets safely. The public key (address) is the authority to view the wallet, which is equivalent to the address of the bank card, while the private key is the authority to operate the wallet, which is equivalent to the password of the bank card. Similar to the private key, there are mnemonic words and wallet file + password. As long as you master one of the three, you will have the ownership of the wallet
the most important feature of blockchain wallet is that it can't be tampered with and anonymous, so we must keep the private key well, otherwise the security of assets can't be guaranteed I the private key in several small paper books and store them separately to prevent loss.)
public key is used to receive or transfer out digital currency, which can tell others. It is equivalent to email address
tokenpocket wallets have various wallets based on ten bottom layers, including EOS, Iost, Ethereum, Tron, binance, BOS, cosmos, Moke, Jingtong, and en. Next, bitcoin wallets will be opened
haha, Xiao has a look at so many unfamiliar words - the ability to support so many people at the bottom is e to the powerful technology.
Hot content
Inn digger Publish: 2021-05-29 20:04:36 Views: 341
Purchase of virtual currency in trust contract dispute Publish: 2021-05-29 20:04:33 Views: 942
Blockchain trust machine Publish: 2021-05-29 20:04:26 Views: 720
Brief introduction of ant mine Publish: 2021-05-29 20:04:25 Views: 848
Will digital currency open in November Publish: 2021-05-29 19:56:16 Views: 861
Global digital currency asset exchange Publish: 2021-05-29 19:54:29 Views: 603
Mining chip machine S11 Publish: 2021-05-29 19:54:26 Views: 945
Ethereum algorithm Sha3 Publish: 2021-05-29 19:52:40 Views: 643
Talking about blockchain is not reliable Publish: 2021-05-29 19:52:26 Views: 754
Mining machine node query Publish: 2021-05-29 19:36:37 Views: 750