In addition to Weibo, there is also WeChat
Please pay attention
WeChat public account
Shulou
2025-02-28 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Internet Technology >
Share
Shulou(Shulou.com)06/01 Report--
This article mainly introduces "what technologies are quoted in the blockchain". In the daily operation, I believe that many people have doubts about what technical problems are quoted in the blockchain. The editor consulted all kinds of materials and sorted out simple and easy-to-use operation methods. I hope it will be helpful to answer the doubts of "what technologies are cited in the blockchain?" Next, please follow the editor to study!
1. Hash algorithm
The Hash algorithm maps a binary value of any length to a shorter fixed-length binary value, which is called a hash value. A hash is the only and extremely compact numerical representation of a piece of data. Hash algorithm is an one-way cryptosystem, that is, an irreversible mapping from plaintext to ciphertext, with only encryption process and no decryption process. Because of the certainty and high efficiency of this operation, decentralized computing can be realized. Because of the sensitivity to input and the difficulty of finding the mapping inverse function (antigen attack), this block chain encryption algorithm is of great help to the security of the block chain system.
2. The concept of symmetric encryption
Symmetric encryption: an encryption algorithm that uses the same key for encryption and decryption. In the symmetric encryption algorithm, the data sender transmits the plaintext (original data) and the encryption key into complex encrypted ciphertext after being processed by a special encryption algorithm.
After receiving the ciphertext, if the recipient wants to interpret the original text, it needs to use the encryption key and the inverse algorithm of the same algorithm to decrypt the ciphertext in order to restore it to readable plaintext. In the symmetric encryption algorithm, there is only one key, which is used by both sender and receiver to encrypt and decrypt the data, which requires the decryptor to know the encryption key in advance.
3. Asymmetric encryption algorithm
Asymmetric encryption algorithm (Asymmetric Cryptography) requires a public-private key encryption pair. The public key is used for encryption and the private key is used for decryption. The public key is public, while the private key is held by an individual and cannot be obtained by others. The public key is generated by the private key, so the private key can derive the public key, but the public key cannot derive the private key. The advantage of this block chain encryption algorithm is high security, but relatively slow encryption and decryption speed. Specific representative algorithms include RSA, ElGamal, elliptic curve algorithm and so on.
Characteristics of asymmetric encryption
The security of asymmetric encryption algorithm depends on algorithm and key, and its complex algorithm strength makes encryption and decryption faster and more efficient than symmetrical encryption and decryption.
But it is based on this principle that the information is more secure and more confidential, and it eliminates the need for end-users to exchange keys. For the security problems exposed to the lack of privacy protection on the Internet, it will make our personal privacy difficult to be violated, corporate secrets and other important data will be better protected.
4. Zero knowledge proof
Zero knowledge proof (Zero-Knowledge Proof) means that the prover can make the verifier believe that a certain conclusion is correct without providing any useful information to the verifier. In the process of zero-knowledge proof, there are two participants, one is called the verifier and the other is called the verifier. According to an agreement, through interaction, the verifier will finally draw a conclusion about whether the prover knows or has a certain message. The advantage of this block chain encryption algorithm is its security and privacy.
5. Series algorithm
Rearrangement and combination has always been the most commonly used method of innovation and invention. Soon, some people are not satisfied with using a single Hash function. In July 2013, quark coin (Quark) released, the first to use multiple rounds of Hash algorithm, seemingly high-end, in fact very simple, is to operate on the input data nine times hash function, the results of the previous round of operation as the input of the next round of operation.
These nine rounds of Hash use a total of six encryption algorithms, namely BLAKE, BMW, GROESTL, JH, KECCAK and SKEIN, which are recognized as secure Hash algorithms, and there is already a ready-made implementation code. This kind of multi-round Hash gives people an intuitive feeling of security and power as soon as it appears, and there are countless followers. DASH (formerly Dark Coin, Darkcoin), which is still strong today, took the lead in using 11 encryption algorithms (BLAKE, BMW, GROESTL, JH, KECCAK, SKEIN, LUFFA, CUBEHASH, SHAVITE, SIMD, ECHO), known as X11, and then the X13Mague X15 series was developed. S-series algorithm is actually a series of ideas, as long as one of the algorithms is cracked, the whole algorithm is cracked, like a chain, interlinked, as long as one of the links is broken, the whole chain is divided into two.
6. Parallel algorithm
Some people connected in series, others connected in parallel, Heavycoin (HVC) took the lead in trying. Now unknown in China, at that time it was still famous for the first time to achieve a chain game, the author is a Russian, and later unfortunately died young, causing a burst of regret in the currency circle.
Details of HVC algorithm:
a. First run a HEFTY1 (a Hash algorithm) operation on the input data, and get the result D1.
b. Taking D1 as the input, the SHA256, KECCAK512, GROESTL512 and BLAKE512 operations are carried out in turn, and the output d2, d3, d4 and d5 are obtained respectively.
c. The first 64 bits of d2-d5 are extracted respectively, and the final 256-bit Hash result is formed after confusion, which is used as the block ID.
The reason for the first round of HEFTY1 hashing is that HEFTY1 is extremely difficult to calculate, and its resistance to mining machines is much better than that of SCRYPT. But like SCRYPT, security has not been demonstrated by an official organization, so the following four security algorithms have been recognized to enhance security. Compared with series and parallel methods, Quark, X11 and X13 use a variety of HASH functions, but these algorithms simply connect a variety of HASH functions together, careful consideration, in fact, does not improve the overall anti-collision, its security is supported by the weakest algorithm because of the bucket effect, any of the Hash functions encounter collision attacks, will endanger the security of the monetary system.
HVC extracts 64 bits from each of the above algorithms and fuses them into the final result. In fact, it is a parallel connection of the four algorithms. The cracking of one algorithm will only endanger the 64 bits, while the simultaneous cracking of the four algorithms will endanger the security of the monetary system. Bitcoin uses only one Hash algorithm, which can be changed if SHA256 is proved to be no longer secure in the future, but considering that today's "hard bifurcations are fiercer than tigers", unrest is inevitable, but if you use parallel algorithms, you can strive for a calm hard bifurcation transition time.
At this point, the study of "what technologies are referenced by the blockchain" is over. I hope to be able to solve your doubts. The collocation of theory and practice can better help you learn, go and try it! If you want to continue to learn more related knowledge, please continue to follow the website, the editor will continue to work hard to bring you more practical articles!
Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.
Views: 0
*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.
Continue with the installation of the previous hadoop.First, install zookooper1. Decompress zookoope
"Every 5-10 years, there's a rare product, a really special, very unusual product that's the most un
© 2024 shulou.com SLNews company. All rights reserved.