当前位置:网站首页>01 BTC cryptology principle
01 BTC cryptology principle
2022-07-27 11:10:00 【Yan riyu】
Catalog
The principle of cryptography in bitcoin
Preface
Learn from teacher Xiao Zhen's 《 Blockchain technology and Application 》 Open class notes , For learning reference .
The principle of cryptography in bitcoin
1. Hash
- Hash function used in cryptography (crypotographic hash function)
The hash function used in cryptography has two important properties
- collision resistance( Anti collision )
collision Refers to hash collision :x≠y H(x)=H(y) Two different inputs , The output is equal . Because the input space is always larger than the output space , Therefore, it is inevitable . Unless violence solves , It's hard to base on x find y.
It has been proved by people's practical experience , Hash collisions are not human made .
- hiding( Irreversible )
The calculation process of hash function is unidirectional and irreversible . The premise of this property is that the input space is large enough , More evenly distributed .
The above two properties are combined , Can be realized digital commitment ( Also known as digital equivalent of a sealed envelope):
The predicted results X Enter the calculated hash value Y, Publish hash value Y, Finally X. In the process X Cannot be tampered with .
- Hash function used in bitcoin
The hash function used in bitcoin adds a property on the basis of cryptography :
puzzle friendly ( unpredictable )
That is, the calculation of hash value is unpredictable
2. Signature
Opening an account in bitcoin is to create a public-private key pair locally (public key ,private key), From asymmetric encryption technology .
In information exchange, public key is used to encrypt and verify signatures , The private key is used to decrypt and sign , Public key and private key are different from each other . When the public key and private key are the same , For symmetric encryption . In asymmetric encryption technology, the public key is like the card number of our bank card , The private key is the password of our bank card , If others transfer money to us, they only need to know our bank card number .
But a good random source is needed when generating public and private keys and signatures , Prevent the generation of the same public and private keys or the disclosure of private keys .
边栏推荐
- 树形数据转换
- Based on the open source stream batch integrated data synchronization engine Chunjun data restore DDL parsing module actual combat sharing
- Li Hongyi_ Machine learning_ Assignment 4 (detailed explanation)_ HW4 Classify the speakers
- GEE中下载过程中出现 Error: Image.clipToBoundsAndScale, argument 'input'
- Edata base, a secondary development project based on spark packaging, is introduced
- Application scenarios, key technologies and network architecture of communication perception integration
- Solved syntaxerror: (Unicode error) 'Unicode scape' codec can't decode bytes in position 2-3: truncated
- C language 2: find the maximum value of three numbers, find the middle value of three numbers, and write program steps
- Redis+caffeine two-level cache enables smooth access speed
- 迭代次数的差异与信息熵
猜你喜欢

Solved syntaxerror: (Unicode error) 'Unicode scape' codec can't decode bytes in position 2-3: truncated

Shortest moving distance and entropy of morphological complex

发动机悬置系统冲击仿真-瞬时模态动态分析与响应谱分析

Play with the cluster configuration center and learn about the Taier console

Tensorflow notes - basic functions and concepts

Derive the detailed expansion of STO double center kinetic energy integral

How to create a.Net image with diagnostic tools

解决 ImportError: cannot import name 'abs' 导入tensorflow报错

Asustek unparalleled, this may be the best affordable high brush thin notebook on the screen

Customized modification based on jira7.9.2
随机推荐
How to build a data index system is the most effective. It will take you a quick start from 0 to 1
黑白像素分布对迭代次数的影响
Apache22 and opencms9.5 integrated configuration
Tdengine business ecosystem partner recruitment starts
Kangaroo cloud stack based on CBO in spark SQL optimization
荒野觅踪---寻找迭代次数
Overview of radar communication integrated waveform design
A verification test of the relationship between iteration number and entropy
Using skills of word
6 find the smallest letter larger than the target letter
Learning notes - simple server implementation
MySQL index, transaction and storage engine
Maximized array sum after 13 K negations
The second method of calculating overlapping integral
Yonbuilder enables innovation, and the "golden keyboard Award" of the fourth UFIDA developer competition is open!
SQL Server2000数据库错误
Local and overall differences between emergence and morphology
Record of a cross domain problem
Use of parsel
IO stream_ Overview and explanation of data input and output flow