当前位置:网站首页>Development of block hash game guessing system (mature code)
Development of block hash game guessing system (mature code)
2022-06-24 16:48:00 【Development weixin-xtkf556】
The four core technologies of blockchain are cryptography 、 Distributed ledger 、 Consensus mechanisms and smart contracts . Cryptography is one of the most important parts , It can be said to be the cornerstone of blockchain , Other technologies are high-rise buildings that build blockchain based on cryptography . There are two main cryptographic algorithms used in blockchain :
One is hash algorithm ,
Second, asymmetric encryption .
First , It's decentralized . The database originally maintained by one party , It has become a database maintained by many parties . Everyone writes data together by consensus , No one can control the data alone .
secondly , It allows everyone to change from a separate account to a joint account , This brings consistency and transparency to the data .
in addition , Blockchain is only allowed to write data , Deleting and modifying... Are not allowed , It can prevent data from being tampered with secretly . Simply speaking , Hash algorithm is a special function . No matter how long the string is entered , You can get a fixed length output value through this function . It's like the ID number , Always the 18th , It is also the only one in China . The output value of hash algorithm is called hashing value . Hash algorithm has three characteristics .
The first characteristic of hash algorithm is anti-collision ability . The so-called collision , Is to enter two different data , You end up with the same input . It's like we hit the shirt when we were shopping , The pit collision is that most of the inputs can get the only output . In the world of blockchain , The address of any transaction or account is completely generated by the hash algorithm . This also ensures the uniqueness of the transaction or account address in the blockchain network . The second feature is that it is unidirectional . for example , If you enter a string of data , You can get a hash value through the hash algorithm , But there is no way to invert the hash value to get the input data string . It's one-way , Based on that , Blockchain effectively protects the security of our information . The third characteristic of hash algorithm is anti tamper ability . For any input , Even small changes , The hash value can also vary greatly . This feature plays a key role in the connection between blocks . Each block of the blockchain is marked by the hash value of the previous block . Unless someone can crack all the hash values in the whole chain , Otherwise, once the data is recorded on the chain , It's impossible to tamper . Hash property :
(1) One way .Thatis,givenaninputnumber,itiseasytocalculateitshashvalue,butgivenahashvalue,theoriginalinputnumbercannotbeobtainedaccordingtothesamealgorithm.
(2) Weak anti-collision .Thatis,givenaninputnumber,itiscomputationallyinfeasibletofindanotherhashvaluetogetagivennumberwhenusingthesamemethod.
(3) Strong collision resistance .Thatis,foranytwodifferentinputnumbers,itisnotfeasibletocalculatethesamehashvalueaccordingtothesamealgorithm.
Simple explanation : Hash (Hash) Algorithm , Hash function . It's a one-way cryptosystem , That is, it is an irreversible mapping from plaintext to ciphertext , Only the encryption process , No decryption process . meanwhile , Hash function can change the input of any length to get fixed length output . This one-way feature of the hash function and the fixed length of the output data make it possible to generate messages or data .
边栏推荐
- ClassNotFoundException v/s NoClassDefFoundError
- 重新定义存储架构,华为用了不止5颗“芯”
- Go path customized project path package dependency
- Applet - use of template
- Ps\ai and other design software pondering notes
- The mystery of redis data migration capacity
- Comparison of jmeter/k6/locust pressure measuring tools (not completed yet)
- Heavy release! Tencent cloud ASW workflow, visual orchestration cloud service
- What is the difference between optical fiber jumper and copper wire
- Kubernetes popular series: getting started with container Foundation
猜你喜欢
![[go] concurrent programming channel](/img/6a/d62678467bbc6dfb6a50ae42bacc96.jpg)
[go] concurrent programming channel

Applet - use of template
![[leetcode108] convert an ordered array into a binary search tree (medium order traversal)](/img/e1/0fac59a531040d74fd7531e2840eb5.jpg)
[leetcode108] convert an ordered array into a binary search tree (medium order traversal)

Problems encountered in the work of product manager

A survey on dynamic neural networks for natural language processing, University of California

A survey of training on graphs: taxonomy, methods, and Applications

A survey on model compression for natural language processing (NLP model compression overview)

Applet wxss

Cognition and difference of service number, subscription number, applet and enterprise number (enterprise wechat)

Ps\ai and other design software pondering notes
随机推荐
Nonholonomic constrained robot
Problems encountered in the work of product manager
Kubernetes popular series: getting started with container Foundation
[web] what happens after entering the URL from the address bar?
05. Tencent cloud IOT device side learning -- mqtt protocol client implementation
Week7 weekly report
让UPS“印象派用户”重新认识可靠性
[tke] analysis of CLB loopback in Intranet under IPVS forwarding mode
[security] graphical CSRF injection of Web Security (II)
TRTC web end imitation Tencent conference microphone mute detection
Experience and suggestions on cloud development database
Kubernetes 1.20.5 setting up Sentinel
zblog系统实现前台调用当天发布文章数量的教程
IBM:以现代化架构支撑AI与多云时代的企业数字化重塑
[go] concurrent programming channel
Coding's first closed door meeting on financial technology exchange was successfully held
集体突破之后,中国公有云的下一步落在哪里?
If only 2 people are recruited, can the enterprise do a good job in content risk control?
How to collect and define project requirements in the early stage of EDI project implementation?
Tencent on the other hand, I was puzzled by the "horse race" problem