区块链加密私钥是什么,区块链加密私钥有什么用
请查看相关英文文档
1. How to back up the private key of a blockchain wallet?
When you create a blockchain wallet, after the creation is successful, the system will The wallet address, public key, and private key are automatically generated. However, you need to back them up yourself. The wallet will not save them for you. So how should you back up this information? How many methods are there?
First, a wallet with double security, and import the private key into the Armory client (1) for cold storage (2). Users can quickly find it from the cold storage in the client. Another advantage of the required private key is that it facilitates offline transaction transfers without having to re-import the private key every time. At the same time, the computer's operating system requires a password.
Second, the private key and public key of the wallet can be made into an electronic backup and synchronized to the cloud. You can copy and paste them into a document and mark the name. The document can be named in pinyin or garbled, but it must be saved in another document to indicate what the file is used for. However, the result of this is that you may forget which file is stored, so you need to note the information on your mobile phone, and at the same time, you need to arrange the review of the private key as a schedule event that repeats according to time (such as review once every 2 months). When the time is up, your mobile phone or computer will remind you to review. And it’s not just a matter of recalling it a few times. You need to go to the backup and open the wallet that generated the private key, and log in again to see if the private key (and address) is correct.
Third, users can write down the private key and public key and address of the wallet on the document. If you name it, you can understand it yourself. It looks like a broken picture that cannot be opened, or even worse, we can compress the fake picture that cannot be opened into zip format and disguise it as a real picture, and then restore it when needed. The specific modification method can be found online.
Fourth, the above three methods are all electronic backup methods. Another simple and crude method is to hand-copy the private key and public key in a diary to make it look less deliberate and abrupt. , but what everyone needs to pay attention to is that when copying, remember to write in clear and neat fonts to avoid illegible handwriting that may lead to incorrect input of the private key. At the same time, you also need to pay attention to the place where you save it. You can hide it in a private place at home (if possible, you can store it in a bank safe).
There are the above 4 methods for backing up the private key of a blockchain wallet. Of course, if you have a better backup method, you can also share it. You don’t have to use the above backup methods step by step. Finally, a backup suggestion: you can combine the above 2 to 4 methods to back up the private key to avoid forgetting it.
Notes:
(1) Armory client: Armory is a fully functional Bitcoin client that provides many innovative features that other client software does not have! Manage multiple wallets (deterministic and watch-only), print paper backups of your permanent work, import or delete private keys, and more.
(2) Cold storage: the cold storage of Bitcoin wallet. It refers to a method of saving the wallet offline.
2. Private keys and public keys in the blockchain
Public key (public key, referred to as public key) and private key (private key, referred to as private key) are The content of asymmetric encryption algorithms in cryptography. As the name suggests, the public key can be made public, while the private key must be kept securely.
The private key is generated by a random seed, and the public key is derived from the private key through an algorithm. Because the public key is too long, for simplicity and practicality, an "address" appears, and the address is derived from the public key. These derivation processes are one-way and irreversible. That is, the address cannot derive the public key, and the public key cannot derive the private key.
From this we can see that the public key and the private key exist in pairs. Their usefulness can be summarized in 16 words: public key encryption, private key decryption; private key signature, public key signature verification.
Public key encryption, private key decryption. That is, the original data is encrypted with the public key, and only the corresponding private key can decrypt the original data. This prevents the original data from being stolen during transmission on the network and protects privacy.
Private key signature, public key signature verification. Use the private key to sign the original data, and only the corresponding public key can verify that the signature string matches the original data.
Locks and keys can be used as metaphors for public keys and private keys. The lock is used to lock an item, and the key is used to unlock the item. The key owner is the owner of the item. In fact, this is the case. The public and private key pairs establish the ownership of the blockchain's account system and assets (Token, etc.). The blockchain assets are locked on the public key, and the private key is used to unlock the asset and then use it. For example, if I want to transfer assets to you, I use my private key to sign a transaction in which I transfer assets to you (including assets, quantity, etc.) and submit it to the blockchain network. The node will verify the signature and it is correct. Then the assets are unlocked from my public key and locked to your public key.
We have seen the role of the private key. It is as important as the password of the centralized accounting system (Alipay, WeChat Pay, etc.). Having the private key means ownership of the asset, so we must keep it. good private key, cannot be leaked.
3. How to set the private privacy of Jack Ma's blockchain
As a decentralized database technology, the private privacy setting of the blockchain is a very important part. Jack Ma may set up the following aspects of privacy protection on his own blockchain:
1. Identity verification: On Jack Ma’s blockchain, individual users can protect their privacy through identity verification. This means that only authenticated users can access specific information.
2. Encrypted data: Jack Ma can use blockchain technology to encrypt personal data to prevent unauthorized access. This encryption technology protects user privacy by ensuring that only authorized users can access data.
3. Anonymous transactions: An anonymous transaction function can be set up on Jack Ma’s blockchain, allowing users to conduct transactions without exposing their identities. This approach can protect user privacy to the greatest extent.
4. Restrict access rights: Jack Ma can set access limits on the blockchain to only allow specific users or organizations to access specific information. This approach protects user privacy by ensuring that only authorized people have access to sensitive information.
In short, Jack Ma can protect his blockchain privacy through various means such as identity verification, encrypted data, anonymous transactions and restricted access rights. These measures ensure that users’ data and privacy are protected to the greatest extent possible.
4. What you must know is the blockchain digital signature mechanism
The blockchain uses the Hash function to ensure that transaction information and address information cannot be tampered with, ensuring that during data transmission Integrity, but the Hash function cannot achieve non-repudiation of transaction information (also known as denial of repudiation and non-repudiation), which refers to the fact that both parties in network communication are convinced of the true identity of the participants themselves and the information provided during the information interaction process, that is, All participants cannot deny or deny their true identity, as well as the authenticity of the information provided and the completed operations and commitments). Blockchain uses the digital signature mechanism in public key encryption technology to ensure the non-repudiation of information.
Digital signature mainly includes signature algorithm and verification algorithm. In the signature algorithm, the signer uses his private key to perform a signature operation on the electronic file to obtain the signature ciphertext of the electronic file; in the verification algorithm, the verifier uses the signer's public key to verify the signature ciphertext of the electronic file. operation, and determines the legality of the signature file based on the results of the verification algorithm. During the signing process, only the signer knows his or her private key, and any person who does not know his or her private key cannot forge or correctly sign an electronic document; during the verification process, only the legitimate signature electronic fileThe file can effectively pass the verification, and any illegal signature file cannot satisfy its verification algorithm.
Commonly used digital signature algorithms include RSA digital signature, DSA digital signature, ECDSA digital signature, Schnorr digital signature and other algorithms.
We will introduce it with RSA digital signature: People may ask what is the difference between RSA signature and encryption? Encryption and signing are both for security reasons, but are slightly different. People often ask whether to use private keys or public keys for encryption and signatures? In fact, they are all confused about the role of encryption and signature. Simply put, encryption is to prevent information from being leaked, and signature is to prevent information from being tampered with.
Example: After A receives the message from B, it needs to reply "received" - RSA signature process:
First: A generates a pair of keys (public key and private key), the private key is not made public and A keeps it to himself. The public key is public and can be obtained by anyone.
Then: A signs the message with its own private key to form a signature, and passes the signed message and the message itself to B.
Finally: After B receives the message, it obtains A's public key to verify the signature. If the content of the signature is consistent with the message itself, it proves that the message is replied by A.
In this process, there are only two transfer processes. The first time is when A transfers the signed message and the message itself to B, and the second time is when B obtains A's public key, even if both are defeated by the enemy. There is no danger if Party A intercepts the message, because only A's private key can sign the message. Even if the message content is known, a signed reply cannot be forged to B, preventing the message content from being tampered with.
In summary, from books and the Internet, we have an intuitive understanding.
5. How to obtain the blockchain key file
1. A method for retrieving the blockchain system key, which is characterized by including the following steps: Step 1. Create the original key pair; Step 2. Calculate the business key pair based on the original key pair; Step 3. Calculate the address and account based on the business key pair; Step 4. When the business key is lost, perform Step 2. 2. According to the rights The blockchain system key described in requirement 1The retrieval method is characterized in that the original key pair includes an original private key and an original public key. 3. The method for retrieving the blockchain system key according to claim 2, characterized in that in step 1, creating an original key pair includes the following steps: Step 11. Generate an original seed using a random number. ; Step 12: Generate an original key pair from the original seed through an asymmetric encryption algorithm. The original key pair includes an original private key and an original public key. 4. The blockchain system key retrieval method according to claim 1, characterized in that in step 2, the business key pair includes a business private key and a business public key. 5. The method for retrieving the blockchain system key according to claim 4, characterized in that in step 2, specifically, a business seed is generated according to the seed production data, and a business key is generated according to the business seed. Yes, it specifically includes the following steps: Step 21, use the original private key as the encryption key, perform a seed generation operation on the seed production data, and obtain a unique ciphertext as the business seed; Step 22, use the business seed The non-pair encryption algorithm generates a business key pair, which includes a business private key and a business public key. 6. The blockchain system key retrieval method according to claim 5, characterized in that in step 21, the seed production data includes the original public key or any other selected data. 7. The method for retrieving the blockchain system key according to claim 5, characterized in that in the step 21, the seed generation operation includes an hmac encryption algorithm operation, a salted hash encryption algorithm operation, Symmetric encryption algorithm operation or asymmetric encryption algorithm operation. 8. The method for retrieving the blockchain system key according to claim 3 or 5, characterized in that the asymmetric encryption algorithm includes rsa algorithm, ecc algorithm, ecdsa algorithm, sm2 algorithm and sm9 algorithm. Any of them. 9. The method for retrieving the blockchain system key according to claim 5, characterized in that if the unique ciphertext is not a hash value, then a hash operation is performed on the ciphertext to obtain The hash value of the ciphertext is used as the service seed; if the ciphertext is a hash value, it can be directly used as the service seed, or the hash operation can be performed again or multiple times, and the obtained hash value is used as the service seed. 10. The method for retrieving the blockchain system key according to claim 7, characterized in that the symmetric encryption algorithm includes des algorithm, 3des algorithm, rc2 algorithm, rc4 algorithm, rc5 algorithm, aes algorithm, Any one of the sm1 algorithm, sm4 algorithm, sm7 algorithm and zuc algorithm.
6. Blockchain encryption technology
Digital encryption technology is the key to the application and development of blockchain technology. Once the encryption method is cracked, the data security of the blockchain will be challenged, and the tamperability of the blockchain will no longer exist. Encryption algorithms are divided into symmetric encryption algorithms and asymmetric encryption algorithms. Blockchain primarily uses asymmetric encryption algorithms. The public key cryptography system in the asymmetric encryption algorithm is based on theProblems are generally divided into three categories: large integer differentiation problems, discrete logarithm problems and elliptic curve problems. First, introduce blockchain encryption technology. Encryption algorithms are generally divided into symmetric encryption and asymmetric encryption. Asymmetric encryption refers to encryption technology integrated into the blockchain to meet security requirements and ownership verification requirements. Asymmetric encryption usually uses two asymmetric keys, called public and private keys, in the encryption and decryption process. Asymmetric key pairs have two characteristics: First, after one key (public key or private key) encrypts information, it can only decrypt the other corresponding key. Second, the public key can be disclosed to others, but the private key is kept confidential, and others cannot calculate the corresponding private key through the public key. Asymmetric encryption is generally divided into three main types: large integer differentiation problems, discrete logarithm problems and elliptic curve problems. The problem class of large integer differentiation refers to using the product of two large prime numbers as the encrypted number. Since the appearance of prime numbers is irregular, solutions can only be found through constant trial calculations. The discrete logarithm problem class refers to an asymmetric distributed encryption algorithm based on the difficulty of discrete logarithms and strong one-way hash functions. Elliptic curve refers to the use of flat elliptic curves to calculate a set of asymmetric special values. Bitcoin uses this encryption algorithm. The application scenarios of asymmetric encryption technology in blockchain mainly include information encryption, digital signature and login authentication. (1) In the information encryption scenario, the sender (denoted as A) encrypts the information with the public key of the receiver (denoted as B) and sends it to
B, who uses his own private key Decrypt the information. Encryption of Bitcoin transactions falls into this scenario. (2) In a digital signature scenario, sender A uses its own private key to encrypt the information and sends it to B. B uses A's public key to decrypt the information and then ensures that the information was sent by A. (3) In the login authentication scenario, the client uses the private key to encrypt the login information and sends it to the server. The server then uses the client's public key to decrypt the authenticated login information. Please note the differences between the above three encryption schemes: information encryption is public key encryption and private key decryption, ensuring the security of the information; digital signature is private key encryption and public key decryption, ensuring the ownership of the digital signature. Authenticated private key encryption and public key decryption. Taking the Bitcoin system as an example, its asymmetric encryption mechanism is shown in Figure 1: The Bitcoin system generally generates a 256-bit random number as a private key by calling the random number generator at the bottom of the operating system. The total number of Bitcoin's private keys is large, and it is extremely difficult to traverse all private key spaces to obtain Bitcoin's private keys, so cryptography is safe. In order to facilitate identification, the 256-bit binary Bitcoin private key will be converted through the SHA256 hash algorithm and Base58 to form a 50-character long private key, which is easy for users to identify and write. Bitcoin's public key is a 65-byte random number generated by the private key through the Secp256k1 elliptic curve algorithm. Public keys can be used to generate addresses used in Bitcoin transactions. The generation process is that the public key is first hashed through SHA256 and RIPEMD160 to generate a 20-byte summary result (that is, the result of Hash160), and then is processed through SHA256 hash algorithm and Base58 conversion form a 33-character Bitcoin address. The public key generation process is irreversible, that is, the private key cannot be derived from the public key. Bitcoin’s public and private keys are usually stored in Bitcoin wallet files, with the private key being the most important. Losing the private key means losing all the Bitcoin assets of the corresponding address. In the existing Bitcoin and blockchain systems, multi-private key encryption technology has been derived based on actual application requirements to meet more flexible and complex scenarios such as multi-signatures.
7. How does blockchain ensure data security
In blockchain technology, digital encryption technology is the key, and asymmetric encryption algorithms are generally used, that is, The password for encryption is different from the password for unlocking.
To put it simply, we have an exclusive private key. As long as we protect our private key and give the public key to the other party, the other party will use the public key to encrypt the file to generate ciphertext, and then pass the ciphertext to you, and we will Using the private key to decrypt the plain text can ensure that the transmission content is not seen by others. In this way, the encrypted data is transmitted. At the same time, there are digital signatures that provide us with an extra layer of protection to prove that the document has not been tampered with during the process of sending it to the other party.
As the underlying encryption technology, blockchain encryption technology can effectively ensure data security, change the current situation where data is easily leaked and easily exploited, and allow personal information data to be fully protected. It is also expected to provide benefits to the Internet of Things, big data, and credit It will bring about much-needed changes in areas such as supervision and mobile office.
- 上一篇: 区块链技术相关职业有哪些,区块链技术职业等级认证
- 下一篇: 区块链加股权,区块链股权解决方案