当前位置:网站首页>Development of block hash game guessing system (mature code)
Development of block hash game guessing system (mature code)
2022-06-24 16:48:00 【Development weixin-xtkf556】
The four core technologies of blockchain are cryptography 、 Distributed ledger 、 Consensus mechanisms and smart contracts . Cryptography is one of the most important parts , It can be said to be the cornerstone of blockchain , Other technologies are high-rise buildings that build blockchain based on cryptography . There are two main cryptographic algorithms used in blockchain :
One is hash algorithm ,
Second, asymmetric encryption .
First , It's decentralized . The database originally maintained by one party , It has become a database maintained by many parties . Everyone writes data together by consensus , No one can control the data alone .
secondly , It allows everyone to change from a separate account to a joint account , This brings consistency and transparency to the data .
in addition , Blockchain is only allowed to write data , Deleting and modifying... Are not allowed , It can prevent data from being tampered with secretly . Simply speaking , Hash algorithm is a special function . No matter how long the string is entered , You can get a fixed length output value through this function . It's like the ID number , Always the 18th , It is also the only one in China . The output value of hash algorithm is called hashing value . Hash algorithm has three characteristics .
The first characteristic of hash algorithm is anti-collision ability . The so-called collision , Is to enter two different data , You end up with the same input . It's like we hit the shirt when we were shopping , The pit collision is that most of the inputs can get the only output . In the world of blockchain , The address of any transaction or account is completely generated by the hash algorithm . This also ensures the uniqueness of the transaction or account address in the blockchain network . The second feature is that it is unidirectional . for example , If you enter a string of data , You can get a hash value through the hash algorithm , But there is no way to invert the hash value to get the input data string . It's one-way , Based on that , Blockchain effectively protects the security of our information . The third characteristic of hash algorithm is anti tamper ability . For any input , Even small changes , The hash value can also vary greatly . This feature plays a key role in the connection between blocks . Each block of the blockchain is marked by the hash value of the previous block . Unless someone can crack all the hash values in the whole chain , Otherwise, once the data is recorded on the chain , It's impossible to tamper . Hash property :
(1) One way .Thatis,givenaninputnumber,itiseasytocalculateitshashvalue,butgivenahashvalue,theoriginalinputnumbercannotbeobtainedaccordingtothesamealgorithm.
(2) Weak anti-collision .Thatis,givenaninputnumber,itiscomputationallyinfeasibletofindanotherhashvaluetogetagivennumberwhenusingthesamemethod.
(3) Strong collision resistance .Thatis,foranytwodifferentinputnumbers,itisnotfeasibletocalculatethesamehashvalueaccordingtothesamealgorithm.
Simple explanation : Hash (Hash) Algorithm , Hash function . It's a one-way cryptosystem , That is, it is an irreversible mapping from plaintext to ciphertext , Only the encryption process , No decryption process . meanwhile , Hash function can change the input of any length to get fixed length output . This one-way feature of the hash function and the fixed length of the output data make it possible to generate messages or data .
边栏推荐
- The mystery of redis data migration capacity
- Edit distance (linear dp+ violence matching)
- 实现TypeScript运行时类型检查
- Object store signature generation
- Mathematics in machine learning -- point estimation (IV): maximum posteriori probability (map)
- Popular explanation [redirection] and its practice
- [playing with Tencent cloud] a solution to the impassability of cross-border access to foreign websites using Tencent cloud CVM
- Pagoda activities, team members can enjoy a lightweight server 1 core 2g5m 28 yuan for two years
- Kubernetes popular series: getting started with container Foundation
- Release! Tencent IOA and Tencent sky screen were selected into the first batch of certified products of domestic digital trusted services
猜你喜欢
![[go] concurrent programming channel](/img/6a/d62678467bbc6dfb6a50ae42bacc96.jpg)
[go] concurrent programming channel
![[leetcode108] convert an ordered array into a binary search tree (medium order traversal)](/img/e1/0fac59a531040d74fd7531e2840eb5.jpg)
[leetcode108] convert an ordered array into a binary search tree (medium order traversal)

Applet - use of template

Daily algorithm & interview questions, 28 days of special training in large factories - the 15th day (string)

A survey of training on graphs: taxonomy, methods, and Applications

Ps\ai and other design software pondering notes

Ui- first lesson

A survey on dynamic neural networks for natural language processing, University of California

Cognition and difference of service number, subscription number, applet and enterprise number (enterprise wechat)

Applet wxss
随机推荐
未来银行需要用明天的思维,来思考今天架构
[playing with Tencent cloud] a solution to the impassability of cross-border access to foreign websites using Tencent cloud CVM
What is thermal data detection?
[go] runtime package for concurrent programming and its common methods
TVP experts talk about geese factory middleware: innovating forward and meeting the future
区块哈希游戏竞猜系统开发(成熟代码)
Introduction to koa (IV) koa operation database
Heavy release! Tencent cloud ASW workflow, visual orchestration cloud service
Release! Tencent IOA and Tencent sky screen were selected into the first batch of certified products of domestic digital trusted services
## Kubernetes集群中流量暴露的几种方案 Kubernetes集群中流量暴露的几种方案
2021 devopsdays Tokyo Station ends perfectly | coding experts are invited to share the latest technical information
Prometheus deployment
What does the router pin mean?
问题有多大,中台就有多大
A troubleshooting of golang memory leak
Greenplum role-based fine-grained permission control
Audio knowledge (I)
Percona Toolkit series - Pt deadlock logger
@There is a free copyright protection service for enterprises in Dawan District
Abnormal dockgeddon causes CPU 100%