为广大币圈朋友提供币圈基础入门专业知识!
当前位置首页 > 区块链知识> 正文

区块链的数据默认加密的原理,区块链上的数据默认加密的

发布时间:2023-12-09-23:14:00 来源:网络 区块链知识 区块   数据

区块链的数据默认加密的原理,区块链上的数据默认加密的

区块链的数据默认加密是一种利用加密技术来保护用户隐私和信息安全的方法,它能够有效地防止黑客攻击和数据泄露。拓展相关关键词:区块链加密技术、加密算法、PKI机制。

区块链加密技术

区块链加密技术是一种基于数字信息加密技术,它能够有效地保护用户的隐私和数据安全。区块链加密技术利用一种叫做“哈希函数”的数学算法,将用户的信息加密成一段特殊的代码,这段代码可以作为用户的身份凭证,保护用户的隐私和数据安全。

加密算法

加密算法是一种用来加密数据的数学算法,它能够有效地保护用户的隐私和数据安全。加密算法利用一种叫做“公钥加密”的技术,将用户的信息加密成一段特殊的代码,这段代码可以作为用户的身份凭证,保护用户的隐私和数据安全。

PKI机制

PKI机制是一种基于数字证书的安全机制,它能够有效地保护用户的隐私和数据安全。PKI机制利用一种叫做“非对称加密”的技术,将用户的信息加密成一段特殊的代码,这段代码可以作为用户的身份凭证,保护用户的隐私和数据安全。此外,PKI机制还可以防止伪造,保护用户的信息不被篡改。


请查看相关英文文档

❶ What is the meaning of blockchain

Blockchain is a shared database. Blockchain is distributed data storage, point-to-point transmission, consensus mechanism, encryption algorithm, etc. New application models of computer technology.

Blockchain does not belong to any industry. Blockchain is a new application model of computer technologies such as distributed data storage, point-to-point transmission, consensus mechanism, and encryption algorithm. In a narrow sense, blockchain is a chained data structure that combines data blocks in a sequential manner in chronological order, and is a cryptographically guaranteed distributed ledger that cannot be tampered with or forged.

Features

Decentralization. Blockchain technology does not rely on additional third-party management agencies or hardware facilities, and there is no central control. In addition to the self-contained blockchain itself, each node realizes self-verification, transmission and management of information through distributed accounting and storage. Decentralization is the most prominent and essential feature of blockchain.

Openness. The foundation of blockchain technology is open source. In addition to the private information of the transaction parties being encrypted, the data of the blockchain is open to everyone. Anyone can query the blockchain data and develop related applications through the public interface. Therefore, the entire System information is highly transparent.

❷ Components of Blockchain

The components of Blockchain are as follows:

Openness: Blockchain The system data is open and transparent, and everyone can participate. For example, when renting a house, you can know the previous rental information of the house and whether there have been any problems. Of course, some personal private information is encrypted.

Autonomy: The blockchain adopts consensus-based specifications and protocols (such as a set of open and transparent algorithms), and then each node operates according to this specification, so that everything is completed by machines , there is no human element. This changes trust in people to trust in machines, and any human intervention has no effect.

The information cannot be tampered with: If the information is stored in the blockchain, it will be saved permanently and there is no way to change it. As for the 51% attack, it is basically impossible to achieve.

Anonymity: There is no personal information on the blockchain, because it is all encrypted and is a string of letters and numbers, so your various ID card information and phone number will not appear. Numbers are being resold.

❸ What are the basic characteristics of blockchain

Answer: The basic characteristics of blockchain

1. Decentralization.
Blockchain technology does not rely on additional third-party management agencies or hardware facilities, and there is no central control. In addition to the self-contained blockchain itself, through distributed accounting and storage, each node realizes self-verification and transmission of information. and management.

2. Openness.

The basis of blockchain technology is open source. In addition to the private information of the transaction parties being encrypted, the data of the blockchain is open to everyone and anyone can use it through the publicOpen interfaces to query blockchain data and develop related applications, so the entire system information is highly transparent.

3. Independence.

Based on consensus specifications and protocols (similar to various mathematical algorithms such as the hash algorithm used by Bitcoin), the entire blockchain system does not rely on other third parties, and all nodes can automatically and securely operate within the system. Verification and exchange of data do not require any human intervention.

4. Security.

As long as you cannot control 51% of all data nodes, you cannot arbitrarily manipulate and modify network data. This makes the blockchain itself relatively safe and avoids subjective and artificial data changes.

5. Anonymity.

Unless there are legal requirements, technically speaking, the identity information of each block node does not need to be disclosed or verified, and information transfer can be done anonymously.

❹ What is the relationship between blockchain and cryptocurrency? What is the difference between blockchain and cryptocurrency?


What is the difference between blockchain and cryptocurrency? Many people are wondering about the difference between blockchain and cryptocurrency. I have heard about blockchain and cryptocurrency in the circle. Many people are confused about the relationship between the two, or they don’t know the relationship between blockchain and cryptocurrency. Let’s take a look at it with the editor. I hope this article can help your turn.
What is Blockchain
Blockchain is a platform that allows cryptocurrencies to function. Blockchain is a technology used as a distributed ledger that constitutes a network, creating a means of transactions and enabling In order to transfer value and information, blockchain is a technology. Blockchain is a distributed ledger technology. Each block package includes information and data that are bundled together and verified. After verification, it is connected to the previous The transactions and information in the block are connected.
What is Cryptocurrency
Cryptocurrencies are the tokens used in these networks to send value and pay for these transactions, compared to blockchain, the use of cryptocurrencies with tokens based on distributed ledger technology Relatedly, you can think of cryptocurrency as a tool in the blockchain. In some cases, it can be used as a resource or practical program function. In other cases, it can be regarded as the value of digital assets.
The difference between blockchain and cryptocurrency
Blockchain is a basic technology, of which cryptocurrency is part of the ecosystem. Generally, encryption is required to conduct transactions on the blockchain. They need to develop together and go hand in hand. , without blockchain, we would have no way to record shipments and transfers of these transactions.

❺ Encryption technology of blockchain

Digital encryption technology is the key to the application and development of blockchain technology. Once the encryption method is cracked, the data security of the blockchain will be challenged, and the tamperability of the blockchain will no longer exist. Encryption algorithms are divided into symmetric encryption algorithms and asymmetric encryption algorithms. Blockchain primarily uses asymmetric encryption algorithms. Public key cryptography systems in asymmetric encryption algorithms are generally divided into three categories according to the problems they are based on: large integer differentiation problems, discrete logarithm problems and elliptic curve problems.question. First, introduce blockchain encryption technology. Encryption algorithms are generally divided into symmetric encryption and asymmetric encryption. Asymmetric encryption refers to encryption technology integrated into the blockchain to meet security requirements and ownership verification requirements. Asymmetric encryption usually uses two asymmetric keys, called public and private keys, in the encryption and decryption process. Asymmetric key pairs have two characteristics: First, after one key (public key or private key) encrypts information, it can only decrypt the other corresponding key. Second, the public key can be disclosed to others, but the private key is kept confidential, and others cannot calculate the corresponding private key through the public key. Asymmetric encryption is generally divided into three main types: large integer differentiation problems, discrete logarithm problems and elliptic curve problems. The problem class of large integer differentiation refers to using the product of two large prime numbers as the encrypted number. Since the appearance of prime numbers is irregular, solutions can only be found through constant trial calculations. The discrete logarithm problem class refers to an asymmetric distributed encryption algorithm based on the difficulty of discrete logarithms and strong one-way hash functions. Elliptic curve refers to the use of flat elliptic curves to calculate a set of asymmetric special values. Bitcoin uses this encryption algorithm. The application scenarios of asymmetric encryption technology in blockchain mainly include information encryption, digital signature and login authentication. (1) In the information encryption scenario, the sender (denoted as A) encrypts the information with the public key of the receiver (denoted as B) and sends it to

B, who uses his own private key Decrypt the information. Encryption of Bitcoin transactions falls into this scenario. (2) In a digital signature scenario, sender A uses its own private key to encrypt the information and sends it to B. B uses A's public key to decrypt the information and then ensures that the information was sent by A. (3) In the login authentication scenario, the client uses the private key to encrypt the login information and sends it to the server. The server then uses the client's public key to decrypt the authenticated login information. Please note the differences between the above three encryption schemes: information encryption is public key encryption and private key decryption, ensuring the security of the information; digital signature is private key encryption and public key decryption, ensuring the ownership of the digital signature. Authenticated private key encryption and public key decryption. Taking the Bitcoin system as an example, its asymmetric encryption mechanism is shown in Figure 1: The Bitcoin system generally generates a 256-bit random number as a private key by calling the random number generator at the bottom of the operating system. The total number of Bitcoin's private keys is large, and it is extremely difficult to traverse all private key spaces to obtain Bitcoin's private keys, so cryptography is safe. In order to facilitate identification, the 256-bit binary Bitcoin private key will be converted through the SHA256 hash algorithm and Base58 to form a 50-character long private key, which is easy for users to identify and write. Bitcoin's public key is a 65-byte random number generated by the private key through the Secp256k1 elliptic curve algorithm. Public keys can be used to generate addresses used in Bitcoin transactions. The generation process is that the public key is first hashed through SHA256 and RIPEMD160 to generate a 20-byte summary result (that is, the result of Hash160), and then converted through the SHA256 hash algorithm and Base58 to form a 33-character Bitcoinaddress. The public key generation process is irreversible, that is, the private key cannot be derived from the public key. Bitcoin’s public and private keys are usually stored in Bitcoin wallet files, with the private key being the most important. Losing the private key means losing all the Bitcoin assets of the corresponding address. In the existing Bitcoin and blockchain systems, multi-private key encryption technology has been derived based on actual application requirements to meet more flexible and complex scenarios such as multi-signatures.

❻ What is the blockchain cryptographic algorithm?

As an emerging technology, blockchain has received more and more widespread attention. It is a new application of traditional technology in the Internet era. , which includes distributed data storage technology, consensus mechanism and cryptography, etc. With the creation of various blockchain research alliances, related research has received more and more funding and personnel support. Hash algorithm, zero-knowledge proof, ring signature and other cryptographic algorithms used in the blockchain:

Hash algorithm

Hash algorithm is the basic technology of the blockchain. The essence of the Hash function is to A set of data of arbitrary length (finite) is mapped into a set of data streams of defined length. If this function satisfies both:

(1) The calculation of the Hash value of any input set of data is very simple;

(2) Think It is computationally difficult to find 2 different data with the same hash value.

Hash functions that satisfy the above two properties are also called cryptographic Hash functions. Unless there is any contradiction, the Hash function usually refers to the cryptographic Hash function. For the Hash function, finding such a value is called a collision. Currently popular Hash functions include MD5, SHA1, SHA2, and SHA3.

Bitcoin uses SHA256, and most blockchain systems use the SHA256 algorithm. So here we will introduce SHA256 first.

1. SHA256 algorithm steps

STEP1: Add padding bits. The message is padded so that the message length is congruent with 448 mod 512 (length = 448 mod 512). The number of padding bits ranges from 1 to 512. The highest bit of the padding bit string is 1 and the remaining bits are 0.

STEP2: Additional length value. Append the bit length of the initial message (before padding) expressed in 64-bit to the result of step 1 (low-order byte first).

STEP3: Initialize the cache. Use a 256-bit cache to store the intermediate and final results of the hash function.

STEP4: Process 512-bit (16 words) message packet sequence. The algorithm uses six basic logic functions and consists of 64 steps of iterative operations. Each step takes a 256-bit cache value as input and then updates the cache content. Each step uses a 32-bit constantNumeric Kt and a 32-bit Wt. Where Wt is the message after grouping, t=1,2,...,16.

STEP5: After all 512-bit packets are processed, the output generated by the last packet of the SHA256 algorithm is a 256-bit message.

2. Ring signature

In 2001, three cryptographers, Rivest, Shamir and Tauman, proposed the ring signature for the first time. It is a simplified group signature, with only ring members and no managers, and does not require cooperation among ring members. In the ring signature scheme, the signer first selects a temporary set of signers, which includes the signer. The signer can then use his own private key and the public keys of others in the signature set to generate signatures independently without the help of others. Members of a set of signers may not be aware that they are included.

The ring signature scheme consists of the following parts:

(1) Key generation. Generate a key pair (public key PKi, private key SKi) for each member in the ring.

(2) Signature. The signer uses his own private key and the public keys of any n ring members (including himself) to generate signature a for message m.

(3) Signature verification. The verifier verifies whether the signature is signed by a member of the ring based on the ring signature and message m. If it is valid, it will be accepted, otherwise it will be discarded.

The properties that ring signatures satisfy:

(1) Unconditional anonymity: The attacker cannot determine which member of the ring generated the signature, even after obtaining the ring member’s private In the case of key, the probability does not exceed 1/n.

(2) Correctness: The signature must be verified by all others.

(3) Unforgeability: Other members in the ring cannot forge the signature of the real signer. Even if an external attacker obtains a valid ring signature, he cannot forge a signature for message m.

3. Comparison between ring signature and group signature

(1) Anonymity. It is a system in which individuals sign on behalf of a group. The verifier can verify that the signature is signed by a member of the group, but cannot know which member, so as to achieve the anonymity of the signer.

(2) Traceability. In group signatures, the existence of the group administrator ensures the traceability of the signature. Group administrators can revoke signatures to reveal the true signer. The ring signature itself cannot reveal the signer unless the signer himself wants to reveal or add additional information to the signature. A verifiable ring signature scheme is proposed. In the scheme, the real signer hopes that the verifier knows his identity. At this time, the real signer can confirm his identity by revealing the secret information he holds.

(3) Management system. Group signatures are managed by the group administrator, ring signatures are not requiredManagement, the signer only needs to select a possible set of signers, obtain its public key, and then publish the set. All members are equal.

The Xueshuo Innovation Blockchain Technology Workstation under Lianqiao Education Online is the only approved "Smart Learning Factory 2020- Xueshuo Innovation Workstation" launched by the School Planning and Construction Development Center of the Ministry of Education of China. "Blockchain Technology Professional" pilot workstation. The professional position is based on providing students with diversified growth paths, promoting the reform of the training model integrating professional degree research, production, and research, and building an applied and compound talent training system.

❼ How does Heshu Software’s blockchain technology achieve digital encryption?

Blockchain refers to a collective process through decentralization and trustlessness. Technical solutions for maintaining a reliable database. This technical solution mainly allows any number of nodes participating in the system to associate and generate a series of data blocks (blocks) using cryptographic methods. Each data block contains all the information exchange data of the system within a certain period of time, and generates The data fingerprint is used to verify the validity of its information and chain to the next database block.
Blockchain technology originated from Bitcoin. Its essence is to use computer algorithms and cryptography to create a decentralized digital currency system to realize the issuance and transaction functions of currency.
Characteristics of blockchain technology:
1. Decentralized: The entire network has no centralized hardware or management organization, and the rights and obligations between any nodes are equal, and any The damage or loss of one node will not affect the operation of the entire system. Therefore, the blockchain system can also be considered to have excellent robustness.

2. Trustless: Data exchange between each node participating in the entire system does not require mutual trust. The operating rules of the entire system are open and transparent, and all data contents are also open and transparent. It is public, so within the rule range and time range specified by the system, nodes cannot and cannot deceive other nodes.
3. Collectively maintain: The data blocks in the system are jointly maintained by all nodes with maintenance functions in the entire system, and these nodes with maintenance functions can be participated by anyone.
4. Reliable Database: The entire system will be divided into databases so that each participating node can obtain a copy of the complete database. Unless more than 51% of the nodes in the entire system can be controlled at the same time, modifications to the database on a single node are invalid and cannot affect the data content on other nodes. Therefore, the more nodes and stronger computing power participating in the system, the higher the data security in the system.
The four characteristics will lead to two other characteristics:
5. Open Source): Since the operating rules of the entire system must be open and transparent, for the program, the entire system must be open source.
6. Anonymity: Since nodes do not need to trust each other, there is no need to disclose their identities between nodes. Each participating node in the system is anonymous.

Encrypted digital asset EGD: E-Gold Coin, referred to as EGD, is a network encrypted digital asset based on the peer-to-peer Internet open source protocol. It circulates in a decentralized network system. As a consumer asset that global business consumers receive from merchants, EGD is used to replace the points issued by merchants in traditional commercial society, realizing the network, integration and assetization of global business points.
EGD, Internet gold, is an encrypted digital asset generated based on decentralized digital encryption technology. EGD was born in January 2014 and was developed by a team of 17 technical experts from 7 countries around the world, headed by a former Microsoft engineer. EGD has introduced encrypted digital asset technology into the field of global commercial unified points, allowing global consumers to continue to share the profits of the commercial society through the circulation and value-added of EGD commercial points, creating a win-win economic model for merchants and consumers.
Features of customized EGD:
Using customized technology, we can easily build a variety of smart assets based on the EGD protocol, including stocks, bonds, or various derivative points.
More importantly, while customization technology expands the application scope of EGD, it still retains the characteristics of clear property rights and decentralization of EGD. Moreover, because the number of customization points is limited, customization points are even more scarce.

❽ What is the main way to ensure the security of blockchain?

Blockchain technology is a distributed recording technology that ensures the security of blockchain by encrypting and distributing data. Data security and reliability.
The security of the blockchain is mainly ensured through the following methods:
1. Encryption technology: The blockchain uses symmetric encryption and asymmetric encryption algorithms, which can effectively protect the security of data.
2. Distributed storage: Blockchain data is not stored centrally on a single node, but is stored dispersedly on various nodes in the network, which effectively prevents data tampering and loss.
3. Consensus mechanism: Blockchain usually uses a consensus mechanism to confirm the legitimacy of transactions, which helps prevent malicious transactions from occurring.
4. Contract mechanism: Blockchain can automatically execute transactions through smart contracts, which helps prevent manipulation of transactions.
Blockchain technology also brings some challenges while achieving security. For example, the security of the blockchain can be attacked by vulnerabilities, or assets can be stolen because private keys are leaked. Therefore, when using blockchain technology, you also need to pay attention to issues such as identity authentication and password security to ensure the security of the blockchain.
ThisIn addition, the security of blockchain technology may also be affected by policies, regulations, etc. For example, in some countries and regions, blockchain technology may be subject to censorship and restrictions, which may also have an impact on the security of the blockchain.
In general, the security of blockchain technology is mainly guaranteed through encryption technology, distributed storage, consensus mechanism and contract mechanism, but other challenges and influencing factors need to be paid attention to.

博客主人唯心底涂
男,单身,无聊上班族,闲着没事喜欢研究股票,无时无刻分享股票入门基础知识,资深技术宅。
  • 37726 文章总数
  • 3637288访问次数
  • 3081建站天数