Position: Home page » Equipment » Quantum computer mining

Quantum computer mining

Publish: 2021-04-15 21:08:46
1. In order to understand the technical principle of bitcoin, we need to understand two important cryptographic techniques: hash code: it converts a long string into a fixed length string, and its conversion is irreversible, that is, it is impossible to guess the original string from hash code. Sha256 is mainly used in bitcoin protocol
public key system: corresponds to a public key and a private key, keeps the private key in the application and publishes the public key. When Party A transmits information to Party B, it can use Party A's private key to encrypt the information, and Party B can use Party A's public key to decrypt the information, so as to ensure that the third party cannot impersonate Party A to send the information; At the same time, when Party A transmits information to Party B, it is encrypted with Party B's public key and sent to Party B, and then Party B decrypts it with his own private key, so as to ensure that the third party cannot eavesdrop on the communication between the two people. RSA is the most common public key system, but the lliptic curve digital signature algorithm is used in bitcoin protocol. What's the difference between cash and bank account? Bitcoin is an electronic currency in BTC. In this article, it is also used to refer to the whole bitcoin system. Like opening an account in a bank, the corresponding concept in bitcoin is address. Everyone can have one or more bitcoin addresses, which are used to pay and collect money. Each address is a string that starts with 1. For example, I have two bitcoin accounts, and. A bitcoin account is uniquely determined by a pair of public key and private key. To save the account, you only need to save the private key file. Unlike bank accounts, banks keep all transaction records and maintain the book balance of each account, while bitcoin's transaction records are jointly maintained by the whole P2P network through a pre agreed protocol. How much money is in my account address? Although the current account balance can be seen by bitcoin software, unlike banks, there is no place to maintain the book balance of each address. It can only calculate the account balance in real time through all historical transactions. How do I pay? When I pay from address a to address B of the other party, the payment amount is e. at this time, both parties will announce the transaction information to each network node, telling address a to pay to address B, and the payment amount is e. In order to prevent the third party from forging the transaction information, the transaction information will be encrypted with the private key of address A. at this time, the network node receiving the transaction information can use the public key of address a to verify that the transaction information is indeed sent by address a. Of course, trading software will help us do these things, we just need to input the relevant parameters in the software. What will the network node do after receiving the transaction information? This is the most important part of the bitcoin system, which needs to be elaborated. For the sake of simplicity, only bitcoin protocol has been implemented. In the current version, each network node will save all transaction information synchronously. There are two kinds of transaction information in history, one is & quot; Verified & quot; The transaction information, that is, the verified transaction information, is stored in a series of "blocks". Each & quot; block" Is the previous & quot; bock" The ID of each block is the hash code of the hash code of the block and the new transaction information (see an actual block). The other category refers to those who also & quot; Unverified & quot; The transaction information just paid above belongs to this category. When a network node receives new unverified transaction information (possibly more than one), it can calculate the book balance of each address at that time because the node keeps all the transaction information in history, so it can calculate whether the transaction information is valid, that is, whether there is enough balance in the payment account. After eliminating the invalid transaction information, it first takes out the last & quot; block" Then, the unverified transaction information is combined with the ID, and a verification code is added to form a new "block". It needs a lot of calculation to build a new block, because it needs to calculate the verification code, so that the above combination becomes a block, that is, the first several bits of the hash code of the block are 1. At present, the first 13 bits need to be 1 (generally, the specific method is uncertain), which means that if the block is generated by enumeration method, the average number of enumerations is 16 ^ 13. Using CPU resources to generate a block is called "gold mining", because the proction of the block will get a certain reward, and the reward information has been included in the block. When a network node generates a new block, it will broadcast to other network nodes. However, this network block may not be accepted by the network, because it is possible that other network nodes have proced the block earlier. Only the earliest block or the block with the largest number of subsequent blocks is valid, and the remaining blocks are no longer used as the initial blocks of the next block. How does the other party confirm that the payment is successful? When the payment information is distributed to the network node, the network node begins to calculate whether the transaction is valid (that is, whether the account balance is enough to pay), and attempts to generate blocks containing the transaction information. When six blocks (one direct block and five subsequent blocks) contain the transaction information, the transaction information is considered "verified", so that the transaction is formally confirmed, and the other party can confirm the successful payment. A possible problem is that I will pay the balance of address a to address B, and at the same time pay to address C. If I only verify that the single comparison transaction is valid. At this point, my way of cheating is to generate six blocks including B to B and six blocks including C to C before the truth is revealed. Because I need a very long CPU time to generate a block, compared with the whole network, the probability of my cheating success is very small. What is the motivation of network nodes to proce blocks? As can be seen from the above description, in order to make the transaction information effective, the network node needs to generate 1 and 5 subsequent blocks to contain the transaction information, and such block generation is very CPU intensive. How to let other network nodes help to proce blocks as soon as possible? The answer is very simple. The agreement stipulates that BTC will be rewarded for the address where the block is proced, as well as the Commission promised by both parties. At present, the reward for procing a block is 50btc, which will be halved every four years in the future. For example, the reward will be 25btc from 2013 to 2016. Is the transaction anonymous? Yes, and No. All bitcoin transactions are visible. We can check all transaction records of each account, such as mine. But what's different from the banking monetary system is that everyone's account itself is anonymous, and everyone can open many accounts. In general, anonymity is not as good as it claims. But bitcoin has another advantage in doing black market trading: it can't be frozen. Even if the police trace a bitcoin address, there is nothing they can do unless they trace the computer used by the exchange based on the Internet address. How to ensure that bitcoin does not depreciate? Generally speaking, in the case of equivalent trading activities, the value of money is inversely proportional to the amount of money issued. Unlike the traditional money market, the central bank can determine the amount of money issued. Bitcoin does not have a central issuing institution. Only by procing blocks can we get a certain amount of BTC currency. Therefore, bitcoin's new amount of money depends on: 1. The speed of procing blocks: bitcoin's agreement stipulates that the difficulty of procing blocks is fixed at an average of 2016 every two weeks, about 10 minutes. Moore's law of doubling CPU speed every 18 months will not speed up the proction of block. 2. The number of rewards for block proction: at present, 50 BTC is awarded for each block proced, which is halved every four years. In 2013, 25 BTC is awarded, and in 2017, 12.5 BTC is awarded. Considering the above two factors, bitcoin's currency issuing speed is not controlled by any single node in the network. Its protocol makes the currency stock known in advance, and the maximum stock is only 21 million BTC
2. < UL >
  • in the current situation, quantum computers can't help with bitcoin mining.
  • turning to quantum computers will not affect the mining speed, because with the soaring price, the difficulty of mining will increase.
  • indeed, The introction of quantum algorithm will put the traditional cryptocurrency system at risk
  • < / UL >

    the influence of quantum computer on the mining of special currency

    at present, we do not have such quantum algorithm, but what should we do if we find it in the future? As we all know, bitcoin aims to identify the speed of mining, and also increases the difficulty of mining. It means that the difficulty of finding the algorithm will become more complex

    in fact, it is impossible to mine with ordinary computers, so miners use ASIC chips to dig bitcoin. At present, there are two kinds of cryptocurrency, RSA and elliptic curve cryptocurrency. In fact, these two cryptocurrency methods are vulnerable to quantum computer attacks. According to Anastasia, we only need 2500 cubits to interrupt algoant, interrupt EC, and about 4000 cubits to interrupt RSA

    Hackers can identify bitcoin wallet addresses

    in the current situation, hard forking is impossible because many users have lost their wallet addresses and coins. Now, the worry is that quantum computers can easily help track lost wallets, and hackers can use them to decrypt and retrieve such lost coins

    However, the main focus is the research of quantum computer. The entry of such computer system will make the cryptocurrency system face risks. The system could be the destroyer of bitcoin

    3. In fact, the threat of quantum computers to bitcoin is not mining, but trading attacks. We know that the transaction of bitcoin is completed by decentralized cryptography authentication, and the core of this authentication method is hash algorithm. If there is a quantum computer, it can create collisions (Grover algorithm, polynomial acceleration) to forge transactions for profit. Because the core algorithm of bitcoin has been fixed, if the algorithm is not changed, the key length cannot be increased, and this attack cannot be resisted. However, if there is a practical quantum computer, what can we do is better than this kind of attack...
    please accept
    4. Soon after the quantum computer comes out, bitcoin will be worthless
    5. The probability of asking such a question is just like a chicken in the air. In the current mine, your equipment is a little rubbish and doesn't look up to you at all. You can just disconnect it and dig it with a mature quantum computer. It's almost worth making a lot of money, but it's a pity that you don't have it now
    6. Quantum mechanics reveals that particles have volatility and uncertainty. Two particles appearing in the same event have ghostly entanglement. Scientists have realized long-distance transmission of particles by using quantum entanglement. How far is it from our long-distance transmission? At present, this technology is not mature. But quantum mechanics also has other potential value, that is, what is the difference between the quantum computer we are studying and have initially realized and our ordinary computer? How powerful is its computing power? Absolutely beyond you<

    photon long distance transmission

    how quantum computer works
    scientist Nouri uses a new method to try to use quantum mechanics<

    internal structure of quantum computer

    this is the internal structure of a quantum computer. The precision parts made of these golden brass parts are completely different from the computers we see in our daily life, but the operation core of quantum computer still uses binary code

    binary code

    binary code is a computer language composed of 0 and 1, that is, bits. The smallest unit in the information set is bits. The computer simply breaks the information into the smallest combination, and then transforms them very quickly. Quantum computers also use bits, But different from the traditional bit, it can be converted to 0 or 1 at any time, because quantum is a superposition state, which can be either 0 or 1. Quantum bit is more flexible

    flexibility of electrons

    when electrons are mixed together, they rotate clockwise or anticlockwise continuously, which means that qubits are also mixed together, one represents 0 and the other represents 1, so qubits can complete many phase tasks at the same time! This means that we can accomplish computing tasks that we couldn't have imagined before. In theory, we can use anything to make qubits, such as electrons or atoms. Qubits are at the core of computers. They are super concting circuits made by quantum technology and can run in two directions at the same time. Because qubits have such excellent multitasking characteristics, if we can find a way to make them come together to solve problems, then our computer power will be multiplied
    why can quantum computers have such powerful capabilities
    If a person is trapped in a maze, what he has to do is to find a way out as soon as possible, but the problem is that there are too many forks and too many dead ends! We have to go to every road, as soon as possible to find a way out, through too many detours, encounter too many dead ends, finally lucky to find a way out, this is the way of traditional computer computing! Not a good try! Although they deal with it very quickly, they can only deal with one task at a time, just like people in a maze can only explore one way at a time!
    7. Yes, this is true of most systems that rely on cryptography, including traditional banking systems. But quantum computers don't exist, and maybe not in the near future. When quantum computing is really about to become a threat of bitcoin, we can use the post quantum algorithm to update the bitcoin protocol. Based on the importance of this update, it is reasonable to believe that developers will review it repeatedly and finally accept it for all bitcoin users
    8. January 13) is a milestone for cryptocurrency. 16.8 million bitcoins, or 80% of the total bitcoin supply, have now been mined. This means that the mining of bitcoin miners has become more and more difficult. What's more, governments of many countries have taken the opportunity to strengthen the crackdown on bitcoin "mines"
    the total number of bitcoins is 21 million. As of January 13, 2018, 16.8 million bitcoins have been mined in the world, with 20% left, that is, 4.2 million bitcoins are waiting for everyone to excavate, facing the situation of "more than enough"
    in November 2012, the new issue speed of bitcoin was reced to 25 bitcoins per block
    bitcoin mining relies on the use of computer chips to calculate specific encryption algorithms. With the increasing scarcity of remaining bitcoin resources, the mining cost of a single bitcoin is also increasing. As long as the function of supercomputer is completely based on a specific encryption mathematical algorithm. Changes in bitcoin are soon over. And the time is very short.
    9. In fact, the threat of quantum computers to bitcoin is not mining, but trading attacks. We know that the transaction of bitcoin is completed by decentralized cryptography authentication, and the core of this authentication method is hash algorithm. If there is a quantum computer, it can create collisions (Grover algorithm, polynomial acceleration) to forge transactions for profit. Because the core algorithm of bitcoin has been fixed, if the algorithm is not changed, the key length cannot be increased, and this attack cannot be resisted. However, if there is a practical quantum computer, what is better than this kind of attack...
    please be satisfied~~
    Hot content
    Inn digger Publish: 2021-05-29 20:04:36 Views: 341
    Purchase of virtual currency in trust contract dispute Publish: 2021-05-29 20:04:33 Views: 942
    Blockchain trust machine Publish: 2021-05-29 20:04:26 Views: 720
    Brief introduction of ant mine Publish: 2021-05-29 20:04:25 Views: 848
    Will digital currency open in November Publish: 2021-05-29 19:56:16 Views: 861
    Global digital currency asset exchange Publish: 2021-05-29 19:54:29 Views: 603
    Mining chip machine S11 Publish: 2021-05-29 19:54:26 Views: 945
    Ethereum algorithm Sha3 Publish: 2021-05-29 19:52:40 Views: 643
    Talking about blockchain is not reliable Publish: 2021-05-29 19:52:26 Views: 754
    Mining machine node query Publish: 2021-05-29 19:36:37 Views: 750