In addition to Weibo, there is also WeChat
Please pay attention
WeChat public account
Shulou
2025-02-23 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Internet Technology >
Share
Shulou(Shulou.com)06/01 Report--
This article mainly introduces "how the encryption technology of the block chain works". In the daily operation, I believe that many people have doubts about how the encryption technology of the block chain works. The editor consulted all kinds of data and sorted out the simple and easy-to-use operation methods. I hope it will be helpful to answer the doubts about "how the encryption technology of the block chain works". Next, please follow the editor to study!
Introduction of encryption Technology
Encryption algorithms are generally divided into symmetric encryption and asymmetric encryption. Asymmetric encryption refers to the encryption technology integrated into the block chain to meet the security requirements and ownership verification requirements. Asymmetric encryption usually uses two asymmetric passwords, called public key and private key, in the process of encryption and decryption. The asymmetric key pair has two characteristics: first, after encrypting the information with one of the keys (public key or private key), only the other corresponding key can be unlocked. Second, the public key can be made public to others, while the private key is kept secret, and others cannot calculate the corresponding private key through the public key.
How does asymmetric encryption work?
Asymmetric encryption has a sender and a receiver, both of which receive a key set. Before sending any data, the sender will first encrypt the data with its private key. Once the recipient receives the message, he will decrypt it with his public key. To use this type of encryption, the forex documentary www.gendan5.com should use a method to discover the public key. One way is to use digital certificates in the client-server communication model.
The certificate must contain information such as the user's e-mail address and country, the name of the organization, the organization that issued the certificate, and the user's public key, which will be used to identify the server and the user. When clients and servers need secure encrypted communication, they both send queries to each other over the network. Once they receive it, a copy of the certificate will be sent back. The certificate contains the sender's public key, which the receiver can use. Asymmetric encryption is an important part of the block chain, especially in the Bitcoin protocol, as evidence of bitcoin mining. The Bitcoin protocol uses the Elliptic Curve Digital signature algorithm (ECDSA), which is used to create public and private keys. These are used to ensure that digital transactions are legal.
In mining, people who use the "SHA256 hash value function" will find it in a specific block before adding it to the block chain in a specific situation after encryption. The number of zeros in each hash value changes when inserted into the blockchain. Asymmetric encryption makes it difficult for anyone to change what has been added to the blockchain.
Asymmetric encryption and decryption process
In the blockchain network, the collection address is equivalent to the public key, and the process of entering the password signature is equivalent to the signature of the private key. When miners receive a transaction, they enter their private key or signature to check whether they have received the account. Unlike everyday passwords, the public key, as a public address, corresponds to the private key one by one, and is generally very long. This is because there are more nodes and blocks in the centralized network. It is also the requirement of asymmetric encryption technology, which ensures the decentralization of distributed storage and block chain.
Can asymmetric encryption be cracked?
Asymmetric encryption uses both public and private keys. For example, when AB and AB exchange information, AB will encrypt the message with each other's public key. After receiving the message, you can use the corresponding private key of AB to open it. In this way, the information will not be leaked, because the encryption of the public key exists, even if the public keys of An and B are completely public, it is very difficult to crack the private key. If there are no hundreds of millions of attempts after limiting the number of attempts, it is very difficult to crack. Asymmetric encryption technology, even after violent cracking, the information obtained may be a piece of garbled code; and in the block chain network information transfer speed is very fast, it is difficult for ordinary people to complete multiple asymmetric encryption work.
The digital signature algorithm is the digital signature technology used in the block chain technology to verify the integrity and authenticity of the information. the basic process is that the sender hashes the original data that needs to be signed. then the summary information is encrypted with the private key and transmitted to the receiver together with the original data.
The receiver can decrypt the encrypted summary information only with the sender's public key, and then use the same hash function to generate a summary message for the received original text.
If it is the same as the decrypted summary information, it means that the received information is complete and has not been modified in the process of transmission, otherwise the information has been modified, so the digital signature can verify the integrity of the information.
In addition, the information sender has the private key and is not public, so only the sender can construct the signature information based on his private key to ensure the authenticity of the signature.
The asymmetric encryption algorithm has certain advantages, because it contains two keys, and only the public key can be made public, and the receiver needs to use the private key to decrypt it. In this way, the security problems caused by the key in the transmission process can be well avoided. The private key of the SHA256 algorithm used in the block chain can reach 2256, and the generation process of the public key is irreversible, so it is difficult to enumerate the private key through the public key under the existing computing power, so as to ensure the data security of the block chain.
At this point, the study on "how the block chain encryption technology works" is over. I hope to be able to solve your doubts. The collocation of theory and practice can better help you learn, go and try it! If you want to continue to learn more related knowledge, please continue to follow the website, the editor will continue to work hard to bring you more practical articles!
Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.
Views: 0
*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.
Continue with the installation of the previous hadoop.First, install zookooper1. Decompress zookoope
"Every 5-10 years, there's a rare product, a really special, very unusual product that's the most un
© 2024 shulou.com SLNews company. All rights reserved.