Position: Home page » Virtual » What is the virtual currency key

What is the virtual currency key

Publish: 2021-04-27 14:06:22
1. In order to make it easier for new people to understand, sister coin will use some metaphors. Although she is not strict, she will understand better
the private key is like your bank card password
the address of bitcoin wallet is like your bank card
as long as you have the bank card and password, anyone can withdraw money from ATM
the address of bitcoin wallet is public, which means that everyone else has your bank card, so your bank card password (private key) becomes very important at this time
once your key is disclosed, others can transfer your bitcoin

Internet search: "sister coin teaches you bitcoin" or "sister coin" find me, share more exquisite content ~!
2. I'll give you my address (address). You can find my zip code (public key). You can write to me with my zip code (public key) + address. The mail will be sent to my mail cabinet. I'll open the mail cabinet (private key) with the key I have. The key of express cabinet is stored in my wallet (wallet)
1. The mail cabinet is stolen (the database is stolen)
2. The key is stolen (the private key is stolen)
3. Knowing my home address (the public key is stolen), the lock of the mail cabinet is opened violently (the private key is cracked violently).
3. Connecting with the wallet on the first floor is equivalent to calling LTC to him. It's really bad. It's a cheat for novices
please accept if you are satisfied
4. A kind of Shanzhai currency is true only if it's not a money runner. It's just that there's no value to buy and there's no room for appreciation.
5.

1. Key is a parameter, which is input in the algorithm of converting plaintext to ciphertext or converting ciphertext to plaintext. The key is divided into symmetric key and asymmetric key

There are two kinds of key: symmetric key and asymmetric key

Symmetric key encryption, also known as private key encryption or session key encryption algorithm, means that the sender and receiver of information use the same key to encrypt and decrypt data. Its biggest advantage is that the encryption / decryption speed is fast, and it is suitable for encrypting large amounts of data, but the key management is difficult

Asymmetric key encryption system, also known as public key encryption. It needs to use different keys to complete the encryption and decryption operations, one is public key, the other is private key

5. For normal symmetric cryptography, encryption and decryption use the same key. Usually, the symmetric encryption algorithm is simple and efficient, the key is short, and it is extremely difficult to decipher. Because the security of the system mainly depends on the security of the key, it is a serious problem to transmit and keep the key safely on the open computer network

6.

Proct key is the proof of proct authorization. It is a random number generated by a certain algorithm (such as ellipse algorithm)

when the user enters the key, the proct will judge whether the corresponding algorithm is satisfied according to the key, so as to confirm the user's identity and permission

public key encryption technology uses a pair of matching keys to encrypt and decrypt. Each key performs a one-way processing of data. The function of each key is just opposite to the other key. When one key is used for encryption, the other key is used for decryption

the public key is made public by its owner, while the private key must be kept secret. In order to send a confidential message, the sender must use the receiver's public key to encrypt the data. Once encrypted, only the receiver can decrypt it with his private key

source: network proct key

7. Key
unlike some encryption technologies that use the same key to encrypt and decrypt data, public key encryption technology uses a pair of matching keys to encrypt and decrypt data. Each key performs a one-way processing of data. The function of each key is just opposite to the other key. When one key is used for encryption, the other key is used for decryption. The public key is made public by its owner, while the private key must be kept secret. In order to send a confidential message, the sender must use the receiver's public key to encrypt the data. Once encrypted, only the receiver can decrypt it with his private key. On the contrary, users can process data with their own private key. In other words, the key pair can work in any direction. This provides & quot; Digital Signature & quot; If you want a user to process the data with his private key, others can process the data with his public key. Because only the owner knows the private key, the processed message forms an electronic signature - a document that no one else can generate. The digital certificate contains the public key information, which confirms the identity of the user who owns the key pair
8. Key
unlike some encryption technologies that use the same key to encrypt and decrypt data, public key encryption technology uses a pair of matching keys to encrypt and decrypt data. Each key performs a one-way processing of data. The function of each key is just opposite to the other key. When one key is used for encryption, the other key is used for decryption. The public key is made public by its owner, while the private key must be kept secret. In order to send a confidential message, the sender must use the receiver's public key to encrypt the data. Once encrypted, only the receiver can decrypt it with his private key. On the contrary, users can process data with their own private key. In other words, the key pair can work in any direction. This provides & quot; Digital Signature & quot; If you want a user to process the data with his private key, others can process the data with his public key. Because only the owner knows the private key, the processed message forms an electronic signature - a document that no one else can generate.
9.

READ MORE
Hot content
Inn digger Publish: 2021-05-29 20:04:36 Views: 341
Purchase of virtual currency in trust contract dispute Publish: 2021-05-29 20:04:33 Views: 942
Blockchain trust machine Publish: 2021-05-29 20:04:26 Views: 720
Brief introduction of ant mine Publish: 2021-05-29 20:04:25 Views: 848
Will digital currency open in November Publish: 2021-05-29 19:56:16 Views: 861
Global digital currency asset exchange Publish: 2021-05-29 19:54:29 Views: 603
Mining chip machine S11 Publish: 2021-05-29 19:54:26 Views: 945
Ethereum algorithm Sha3 Publish: 2021-05-29 19:52:40 Views: 643
Talking about blockchain is not reliable Publish: 2021-05-29 19:52:26 Views: 754
Mining machine node query Publish: 2021-05-29 19:36:37 Views: 750