What is the virtual currency key
the private key is like your bank card password
the address of bitcoin wallet is like your bank card
as long as you have the bank card and password, anyone can withdraw money from ATM
the address of bitcoin wallet is public, which means that everyone else has your bank card, so your bank card password (private key) becomes very important at this time
once your key is disclosed, others can transfer your bitcoin
Internet search: "sister coin teaches you bitcoin" or "sister coin" find me, share more exquisite content ~!
1. The mail cabinet is stolen (the database is stolen)
2. The key is stolen (the private key is stolen)
3. Knowing my home address (the public key is stolen), the lock of the mail cabinet is opened violently (the private key is cracked violently).
please accept if you are satisfied
1. Key is a parameter, which is input in the algorithm of converting plaintext to ciphertext or converting ciphertext to plaintext. The key is divided into symmetric key and asymmetric key
There are two kinds of key: symmetric key and asymmetric key Symmetric key encryption, also known as private key encryption or session key encryption algorithm, means that the sender and receiver of information use the same key to encrypt and decrypt data. Its biggest advantage is that the encryption / decryption speed is fast, and it is suitable for encrypting large amounts of data, but the key management is difficult Asymmetric key encryption system, also known as public key encryption. It needs to use different keys to complete the encryption and decryption operations, one is public key, the other is private key5. For normal symmetric cryptography, encryption and decryption use the same key. Usually, the symmetric encryption algorithm is simple and efficient, the key is short, and it is extremely difficult to decipher. Because the security of the system mainly depends on the security of the key, it is a serious problem to transmit and keep the key safely on the open computer network
Proct key is the proof of proct authorization. It is a random number generated by a certain algorithm (such as ellipse algorithm)
when the user enters the key, the proct will judge whether the corresponding algorithm is satisfied according to the key, so as to confirm the user's identity and permission
public key encryption technology uses a pair of matching keys to encrypt and decrypt. Each key performs a one-way processing of data. The function of each key is just opposite to the other key. When one key is used for encryption, the other key is used for decryption
the public key is made public by its owner, while the private key must be kept secret. In order to send a confidential message, the sender must use the receiver's public key to encrypt the data. Once encrypted, only the receiver can decrypt it with his private key
source: network proct key
unlike some encryption technologies that use the same key to encrypt and decrypt data, public key encryption technology uses a pair of matching keys to encrypt and decrypt data. Each key performs a one-way processing of data. The function of each key is just opposite to the other key. When one key is used for encryption, the other key is used for decryption. The public key is made public by its owner, while the private key must be kept secret. In order to send a confidential message, the sender must use the receiver's public key to encrypt the data. Once encrypted, only the receiver can decrypt it with his private key. On the contrary, users can process data with their own private key. In other words, the key pair can work in any direction. This provides & quot; Digital Signature & quot; If you want a user to process the data with his private key, others can process the data with his public key. Because only the owner knows the private key, the processed message forms an electronic signature - a document that no one else can generate. The digital certificate contains the public key information, which confirms the identity of the user who owns the key pair
unlike some encryption technologies that use the same key to encrypt and decrypt data, public key encryption technology uses a pair of matching keys to encrypt and decrypt data. Each key performs a one-way processing of data. The function of each key is just opposite to the other key. When one key is used for encryption, the other key is used for decryption. The public key is made public by its owner, while the private key must be kept secret. In order to send a confidential message, the sender must use the receiver's public key to encrypt the data. Once encrypted, only the receiver can decrypt it with his private key. On the contrary, users can process data with their own private key. In other words, the key pair can work in any direction. This provides & quot; Digital Signature & quot; If you want a user to process the data with his private key, others can process the data with his public key. Because only the owner knows the private key, the processed message forms an electronic signature - a document that no one else can generate.
READ MORE