当前位置:网站首页>About fossage 2.0 "meta force meta universe system development logic scheme (details)
About fossage 2.0 "meta force meta universe system development logic scheme (details)
2022-07-01 13:31:00 【User V_ StPv888】
In short, this fossage FORGE The force project is based on the smart contract developed by coin safety chain dapp, Open and transparent ,100% Open source , Players go in and out BUSD, There is no platform currency , There's no set , The project party cannot tamper , The contract shall be executed on a perpetual basis .
Today, I'll show you the true understanding of fossage's force force, You use simple words to make you really understand FOSS ! What is fossage force FORGE? Fosaki force FORCE It is a smart contract deployed on the currency security chain BSC Coin security smart chain is an independent public chain developed based on the cryptocurrency Digital Wallet Coin security smart chain public chain of the world's first exchange coin security network .
FORGE The matrix size used in the circulator is 3×1 and 2×2.3×1 The matrix is very simple in nature , Just fill in three positions .2×2 The matrix starts at two positions on the first level , Then expand to four locations on the second floor . Positions are recruited directly and indirectly Forsage Members to fill in . Once all the positions in the matrix are filled , Just activate the revolving Commission . A new matrix of the same size will also be entered from the position of the matrix .
AES The basic principle of :AES The encryption formula of is c=e(k,p), among k It's the key ,p It's plain text ,c It's ciphertext .AES The process of encrypting plaintext is to group plaintext , Each group 128 Bit length , Then encrypt the plaintext one by one , Until all plaintext is encrypted . The length of the key can be 128、192 or 256 position . In the encryption function e in , Execute one round function , Except for the last function , The previous function is the same . With AES-128 For example , It is suggested that the number of encryption rounds is 10, The former 9 The wheel performs the same operation , The first 10 The wheel performs different operations . The recommended number of encryption rounds is different for different key lengths , As shown in the following table .# When encrypting , Clear text press 128 Groups of units , Each group 16 Bytes , Press from top to bottom 、 The order from left to right is 4*4 Matrix , It is called plaintext matrix .AES The encryption process of is in a 4*4 Size matrix , It's called the state matrix . The initial value of the state matrix is the value of the plaintext matrix . After each round of encryption , The value of the state matrix will change once . After executing the circle function , The value of the state matrix is the value of the ciphertext . Get the ciphertext matrix from the state matrix , Then extract the ciphertext matrix to 128 position .
【 This article is written by Wei 》StPv888 Organize and release , Only as a reference for project development requirements !】
边栏推荐
- IO的几种模型 阻塞,非阻塞,io多路复用,信号驱动和异步io
- 1553B environment construction
- 运行游戏时出现0xc000007b错误的解决方法[通俗易懂]
- Meta再放大招!VR新模型登CVPR Oral:像人一样「读」懂语音
- 9. Use of better scroll and ref
- Detailed explanation of parallel replication examples in MySQL replication
- Investment analysis and prospect prediction report of global and Chinese p-nitrotoluene industry Ⓙ 2022 ~ 2027
- Fiori applications are shared through the enhancement of adaptation project
- 简单的两个圆球loading加载
- Wave animation color five pointed star loader loading JS special effects
猜你喜欢

游戏公会在去中心化游戏中的未来

SVG钻石样式代码

一款Flutter版的记事本

Beidou communication module Beidou GPS module Beidou communication terminal DTU

04-Redis源码数据结构之字典

Qtdeisgner, pyuic detailed use tutorial interface and function logic separation (nanny teaching)

Hardware development notes (9): basic process of hardware development, making a USB to RS232 module (8): create asm1117-3.3v package library and associate principle graphic devices

Fiori applications are shared through the enhancement of adaptation project

研发效能度量框架解读

详细讲解面试的 IO多路复用,select,poll,epoll
随机推荐
nexus搭建npm依赖私库
MySQL Replication中的并行复制示例详解
Example code of second kill based on MySQL optimistic lock
Huawei HMS core joins hands with hypergraph to inject new momentum into 3D GIS
孔松(信通院)-数字化时代云安全能力建设及趋势
啟動solr報錯The stack size specified is too small,Specify at least 328k
Global and Chinese polypropylene industry prospect analysis and market demand forecast report Ⓝ 2022 ~ 2027
Function test process in software testing
启动solr报错The stack size specified is too small,Specify at least 328k
French Data Protection Agency: using Google Analytics or violating gdpr
流量管理技术
MySQL六十六问,两万字+五十图详解!复习必备
终端识别技术和管理技术
SVG钻石样式代码
内容审计技术
Zabbix 6.0 源码安装以及 HA 配置
二传感器尺寸「建议收藏」
Sharing with the best paper winner of CV Summit: how is a good paper refined?
详细讲解面试的 IO多路复用,select,poll,epoll
Reasons for MySQL reporting 1040too many connections and Solutions