为广大币圈朋友提供币圈基础入门专业知识!
当前位置首页 > 区块链知识> 正文

区块链的密钥丢了可以找回不,区块链密钥丢了怎么办

发布时间:2023-12-17-16:59:00 来源:网络 区块链知识 密钥   区块

区块链的密钥丢了可以找回不,区块链密钥丢了怎么办


请查看相关英文文档

1. Can Bitcoin be recovered if it is stolen?

Bitcoin is at risk of being stolen, and once stolen, it is actually very difficult to retrieve it. Keeping your wallet password safe is key.
Bitcoin is essentially just a string of characters on the blockchain, recording all transaction records since the birth of the Bitcoin. Since the blockchain is a decentralized structure, users can communicate with each other through a public address that only they know. The key is used to declare ownership. To a certain extent, whoever masters this key essentially owns the Bitcoin assets in the corresponding address.
The tamper-proof feature of the blockchain means that the transaction records of Bitcoin cannot be tampered with, but the non-key will not be lost. At the same time, precisely because the blockchain cannot be tampered with, once the key is lost, it also means that it is impossible to get back the Bitcoin by modifying the blockchain record. Therefore, if you lose it, you may really lose it.

Extended information:
The concept of Bitcoin was first proposed by Satoshi Nakamoto on November 1, 2008, and was officially born on January 3, 2009.
The open source software designed and released based on Satoshi Nakamoto’s ideas and the P2P network built on it. Bitcoin is a P2P form of digital currency. Bitcoin’s transaction records are open and transparent. Peer-to-peer transmission means a decentralized payment system.
Unlike most currencies, Bitcoin does not rely on the issuance of a specific currency institution. It is generated through a large number of calculations based on a specific algorithm. The Bitcoin economy uses a distributed database composed of many nodes in the entire P2P network to confirm and record all Transaction behavior, and the use of cryptographic design to ensure the security of all aspects of currency circulation. The decentralized nature of P2P and the algorithm itself ensure that currency value cannot be artificially manipulated by mass production of Bitcoins. Design based on cryptography allows Bitcoin to be transferred or paid only by real owners. This also ensures the anonymity of currency ownership and circulation transactions. The total number of Bitcoins is limited. The currency system once had no more than 10.5 million in 4 years, and the total number will be permanently limited to 21 million thereafter.
In June 2021, El Salvador passed the "El Salvador Bitcoin Law", which makes Bitcoin legal tender in the country. On September 7, Bitcoin officially became El Salvador’s legal tender, becoming the first country in the world to grant legal status to digital currencies.
On September 24, 2021, the People's Bank of China issued a notice to further prevent and deal with the risks of speculation in virtual currency transactions. The notice states that virtual currencies do not have the same legal status as legal tender.
On November 10, 2021, the price of Bitcoin hit a new record high, approaching US$69,000 per coin for the first time.
In January 2022, Bitcoin continued to fall, falling below $42,000, touching a level not seen since September last year.

2. Can the key be retrieved by adding the password to the Little Fox address?

Uninstall the current App and reset the new wallet by importing the mnemonic phrase or private key.password.
Click the icon to enter the MetaMask wallet, import or create a MetaMask wallet. Users who already have a wallet click to import the wallet and import it through the mnemonic phrase.
Users who do not have a wallet click [Create Wallet] to create a new ETH wallet.
The Chinese version of Little Fox Wallet is a very easy-to-use virtual currency encryption wallet, trusted by more than 1 million users around the world. Provides essential storage and trading features for blockchain newbies, token traders, crypto gamers and developers.

3. How to obtain the blockchain key file

1. A method for retrieving the blockchain system key, which is characterized by including the following steps: Step 1. Create the original key pair; Step 2. Calculate the business key pair based on the original key pair; Step 3. Calculate the address and account based on the business key pair; Step 4. When the business key is lost, perform Step 2. 2. According to the rights The method for retrieving a blockchain system key according to claim 1, characterized in that the original key pair includes an original private key and an original public key. 3. The method for retrieving the blockchain system key according to claim 2, characterized in that in step 1, creating an original key pair includes the following steps: Step 11. Generate an original seed using a random number. ; Step 12: Generate an original key pair from the original seed through an asymmetric encryption algorithm. The original key pair includes an original private key and an original public key. 4. The blockchain system key retrieval method according to claim 1, characterized in that in step 2, the business key pair includes a business private key and a business public key. 5. The method for retrieving the blockchain system key according to claim 4, characterized in that in step 2, specifically, a business seed is generated according to the seed production data, and a business key is generated according to the business seed. Yes, it specifically includes the following steps: Step 21, use the original private key as the encryption key, perform a seed generation operation on the seed production data, and obtain a unique ciphertext as the business seed; Step 22, use the business seed The non-pair encryption algorithm generates a business key pair, which includes a business private key and a business public key. 6. The blockchain system key retrieval method according to claim 5, characterized in that in step 21, the seed production data includes the original public key or any other selected data. 7. The method for retrieving the blockchain system key according to claim 5, characterized in that in the step 21, the seed generation operation includes an hmac encryption algorithm operation, a salted hash encryption algorithm operation, Symmetric encryption algorithm operation or asymmetric encryption algorithm operation. 8. The method for retrieving the blockchain system key according to claim 3 or 5, characterized in that the asymmetric encryption algorithm includes rsa algorithm, ecc algorithm, ecdsa algorithm, sm2 algorithm and sm9 algorithm. Any of them. 9. The method for retrieving the blockchain system key according to claim 5, characterized in that if the unique ciphertext is not a hash value, the ciphertext will beHash operation is performed to obtain the hash value of the ciphertext as the business seed; if the ciphertext is a hash value, it can be directly used as the business seed, or the hash operation can be performed again or multiple times, and the obtained hash value is used as the business seed. . 10. The method for retrieving the blockchain system key according to claim 7, characterized in that the symmetric encryption algorithm includes des algorithm, 3des algorithm, rc2 algorithm, rc4 algorithm, rc5 algorithm, aes algorithm, Any one of the sm1 algorithm, sm4 algorithm, sm7 algorithm and zuc algorithm.

4. Can Bitcoin be recovered if it is stolen?

No. The blockchain cannot be tampered with. Once the key is lost, it also means that it is impossible to get back the stolen Bitcoins by modifying the blockchain records. If it is lost, it is really lost.

5. Can the private key be retrieved if the blockchain is lost?

Everyone who plays digital currency knows that everyone’s wallet account has a private key. If the private key is lost, All the property in the wallet will no longer exist, so losing the private key is quite scary for friends who play currency. In addition, the person in charge of a foreign cryptocurrency exchange said: "Only recognizing the private key is not enough." Identifying people is already an iron law in the blockchain world. With the current computing power and technology, it is absolutely impossible to infer the private key from the address. If it is feasible, then all addresses on the entire blockchain will lose their security. The assets on the blockchain will lose their meaning."

6. Dear friends, does anyone know how to retrieve the mnemonic phrase in the blockchain if it is lost?

There is no way to retrieve the mnemonic phrase if it is lost. Why is there no way to retrieve the mnemonic phrase if it is lost?

In the blockchain, all the user’s assets are stored on the blockchain, and the control of the assets on the chain is proven through the private key. Without the private key, you cannot control your assets. . Therefore, the essence of the wallet is a private key management tool. Users can use the wallet to create private keys, keep the private keys, and use the private keys to sign transactions. (Mnemonics are another form of private key. We recommend users to keep mnemonics because they are more convenient to keep and use)

The essence of a wallet created by a user is to randomly generate a The group mnemonic phrase, due to its decentralized nature, does not store the user's wallet private information. Therefore, after generating the mnemonic phrase, the user must keep it by himself. This set of mnemonic words can be used to derive the private key of the wallet, the public key of the wallet can be derived from the private key, and the wallet address can be derived from the public key.

According to the above explanation, if we want to retrieve the mnemonic phrase, we need to know the process of generating the mnemonic phrase: first generate a 128-bit random number, and then check the random number 4 bit, get a 132-bit number, and then divide it into every 11 bits, so that there are 12 binary numbers, and then use each number to look up the word list defined by BIP39, so that 12 mnemonics are obtained. So the question is, is it possible to collide with the mnemonic words through brute force cracking?

Let’s calculate the number of mnemonics that can be generated. The BIP39 mnemonic vocabulary contains a total of 2048 words, and each group of mnemonics has a total of 12 words. According to the formula: n!/( n - r )!, the number can be calculated as 2048!/(2048-12)! = 5. e+39. LJGG+V: sjqsszh

You may have no idea about this number. We can take an example and compare it. The amount of sand on the earth is about 1 followed by 18 zeros. If you can generate one million mnemonics per second, you can generate 1000000*60*60*24*365=3.1536 e+13 mnemonics in one year, and it will take approximately 1.6715937e+26 years to traverse all mnemonics , so brute force cracking is impossible to succeed.

So for users, if the mnemonic phrase and private key are all lost, they cannot be retrieved through brute force cracking. Because of the decentralized nature, they cannot be retrieved. However, if the mnemonic phrase is lost, the private key is still saved and will not affect the use of the wallet.

7. How to retrieve the Bitcoin key if you know it?

1. What should I do if the Bitcoin key is lost? The tool developed by this geek can help you recover it

As Bitcoinist reported on March 16, a programmer released a tool that can use partial key data to recover lost Bitcoins. When wallet data is damaged or destroyed, users can use this program to make the painful process of recovering data very simple. Additionally, there are other tricks that users can use to recover lost funds. Image source: pixabay The mnemonic recovery tool is called "FinderOuter...

Knowledge: Bitcoin

2. Some things about encrypted wallets, learn to improve security awareness< br />
... Some users have doubts: Why can only four letter blocks be stored in one word space? What should I do if it cannot be stored? So when you use the mnemonic secret box to store your mnemonics What should you do if you want to empty your wallet when you are writing a word? Don’t worry, in the imKey hardware wallet, when you enter the first four words, it can help you match the only word. Don’t feel that the words you have backed up are missing. Your Bitcoin. Such as...

Knowledge: Private Key, Wallet, Public Key, Bitcoin Wallet

3. How to use U2F keys to protect your crypto account

… 2FA to be used. Pairing Yubikey with Binance If you’re wondering what to do if your U2F key is lost, damaged, or stolen, many sites let you pair multiple keys so you don’t lose them if you lose them Provides redundancy when keys are provided. Unfortunately, Binance is notone of them. Lose your keys and you will need to initiate Binance's account recovery process, which can take several days to complete and requires backup verification. Every time you log in to Binance,...

Knowledge: Cryptocurrencies, keys, bits, Bitcoin block explorer

4. Understand the need for mnemonics Ci’s ZenGo wallet and threshold signature technology

..., let’s consider the issues of device loss and ZenGo service shutdown respectively. What should I do if my device is lost (or stolen)? When a device is lost (or stolen), the person acquiring it ensures that our funds are not diverted since they do not have our TouchID/FaceID. So how do you get your assets back? ZenGo Wallet provides a solution for backing up the device key: the device key is encrypted and stored in...

Knowledge: Wallet, Blockchain, Digital Currency

5. 3 Bitcoin Wallet Options, How to Choose the Best

… Permission to enter and leave. Whose house is it really? What if this third party loses or steals your keys? In Bitcoin, there is no locksmith, so if you lose your private keys, it's best to say goodbye to your money. Pros Cons Option to recover access password Requires trust in third party Ease of use Shared control over private keys Potential delay in access to funds Financial lack of privacy Risk of funds being stolen Web or app wallet I...

Knowledge: private keys, wallets, cryptocurrency, hardware wallets

6. EOS account design: talk about the similarities and differences between steem and EOS

... method, with With the continuous development of technology, I believe EOS will become increasingly easier to use. The wallet keys of steem and EOS are relatively similar in design. First, let’s talk about the design of steem. There are four kinds of keys in Steemit, namely Owner Key; post key; Active Key; Memo Key. The four types of keys have different permissions and functions. Let’s introduce them one by one...

Knowledge: keys, wallet keys, blockchain performance, wallet

7. What to do if your Bitcoins are lost due to hardware failure

...Hardware wallets have eliminated this danger. But what if you lose your Bitcoin due to hardware wallet failure? There are solutions, but you shouldn't try them. In this emergency situation, you need professional help instead of searching how to fix Windows hard drive problems detected on the Internet. This situation is unique and needs to be treated differently. let us dohave a look. What is a Bitcoin hardware wallet? ...

8. What is a valid address in the currency circle

After creating an ETH wallet, a 42-bit string starting with 0x will be generated, which is the wallet address. One wallet corresponds to one Wallet address, the address is unique and cannot be modified, which means that the transfer and payment addresses of all tokens in a wallet are the same. Therefore, you will find that the payment addresses for ETH-based tokens are all the same.

Since the blockchain is decentralized, all transaction records of the address can be queried. In the previous article "Data can speak, what are the big money in the currency circle thinking?" 》, which takes advantage of this feature. This is also the reason why some cryptocurrencies such as Bitcoin have weak anonymity.

Imagine that in the future you use Bitcoin to pay for a carton of milk in a supermarket, then the supermarket will know that the owner of this address is you. Social engineering hackers have also matched you with your address through some information on the Internet... Of course, this is far from the truth.

2. Password = bank card password

After successfully creating the wallet, you need to set a password. On the one hand, it is needed when transferring money. On the other hand, you need to enter a password when importing the wallet using the officially provided file. The password can generally be changed, but some wallets must provide a private key to change the password.

However, although we have made the above analogy. But having an address and password is not equivalent to having a bank card number and password. Because the former still cannot withdraw the money, but the latter can. If you want to withdraw coins in the former, you will also need your wallet.

3. Private key = bank card + password

When you register a wallet, a private key consisting of 64 character strings will be automatically generated for you. A wallet has only one private key and cannot be modified. In the imported wallet, enter the private key and set a password (no need to enter the original password), you can enter the wallet and have control of the wallet, and you can transfer all the coins in the wallet.

Another noun is involved here: mnemonic. As the name suggests, the mnemonic phrase is mainly used to facilitate you to remember the private key. The string of the private key has no rules, while the mnemonic phrase has certain rules. Generally, the mnemonic phrase has the same function as the private key and needs to be kept properly.

In the real world, if your wallet is lost or the money on your bank card is transferred, it is still possible to get it back. Since the blockchain is decentralized and anonymous, if you lose your wallet and private key, it is almost impossible to retrieve them.

Having said so much, I just want to emphasize the importance of private keys. Generally, private keys should not be placed on cloud servers such as cloud disks or emails, nor should they be sent in chats, or saved on a computer. It is recommended to disconnect and save.

9. What should I do if I forget my blockchain mnemonic?

Lost the digital currency wallet mnemonic is almost equivalent to losing the private key. The mnemonic is just Private key updateAn easy-to-understand form, and losing the private key is almost equivalent to losing the digital currency in the wallet. With current technology, it is impossible to crack it. Therefore, if you forget it, you can only admit defeat, change your wallet, and backup it. Good mnemonics

博客主人唯心底涂
男,单身,无聊上班族,闲着没事喜欢研究股票,无时无刻分享股票入门基础知识,资深技术宅。
  • 39055 文章总数
  • 3637412访问次数
  • 3089建站天数