当前位置:网站首页>Development of block hash game guessing system (mature code)
Development of block hash game guessing system (mature code)
2022-06-24 16:48:00 【Development weixin-xtkf556】
The four core technologies of blockchain are cryptography 、 Distributed ledger 、 Consensus mechanisms and smart contracts . Cryptography is one of the most important parts , It can be said to be the cornerstone of blockchain , Other technologies are high-rise buildings that build blockchain based on cryptography . There are two main cryptographic algorithms used in blockchain :
One is hash algorithm ,
Second, asymmetric encryption .
First , It's decentralized . The database originally maintained by one party , It has become a database maintained by many parties . Everyone writes data together by consensus , No one can control the data alone .
secondly , It allows everyone to change from a separate account to a joint account , This brings consistency and transparency to the data .
in addition , Blockchain is only allowed to write data , Deleting and modifying... Are not allowed , It can prevent data from being tampered with secretly . Simply speaking , Hash algorithm is a special function . No matter how long the string is entered , You can get a fixed length output value through this function . It's like the ID number , Always the 18th , It is also the only one in China . The output value of hash algorithm is called hashing value . Hash algorithm has three characteristics .
The first characteristic of hash algorithm is anti-collision ability . The so-called collision , Is to enter two different data , You end up with the same input . It's like we hit the shirt when we were shopping , The pit collision is that most of the inputs can get the only output . In the world of blockchain , The address of any transaction or account is completely generated by the hash algorithm . This also ensures the uniqueness of the transaction or account address in the blockchain network . The second feature is that it is unidirectional . for example , If you enter a string of data , You can get a hash value through the hash algorithm , But there is no way to invert the hash value to get the input data string . It's one-way , Based on that , Blockchain effectively protects the security of our information . The third characteristic of hash algorithm is anti tamper ability . For any input , Even small changes , The hash value can also vary greatly . This feature plays a key role in the connection between blocks . Each block of the blockchain is marked by the hash value of the previous block . Unless someone can crack all the hash values in the whole chain , Otherwise, once the data is recorded on the chain , It's impossible to tamper . Hash property :
(1) One way .Thatis,givenaninputnumber,itiseasytocalculateitshashvalue,butgivenahashvalue,theoriginalinputnumbercannotbeobtainedaccordingtothesamealgorithm.
(2) Weak anti-collision .Thatis,givenaninputnumber,itiscomputationallyinfeasibletofindanotherhashvaluetogetagivennumberwhenusingthesamemethod.
(3) Strong collision resistance .Thatis,foranytwodifferentinputnumbers,itisnotfeasibletocalculatethesamehashvalueaccordingtothesamealgorithm.
Simple explanation : Hash (Hash) Algorithm , Hash function . It's a one-way cryptosystem , That is, it is an irreversible mapping from plaintext to ciphertext , Only the encryption process , No decryption process . meanwhile , Hash function can change the input of any length to get fixed length output . This one-way feature of the hash function and the fixed length of the output data make it possible to generate messages or data .
边栏推荐
- What is the difference between optical fiber jumper and copper wire
- Recent progress of ffmpeg go
- Cause analysis of the failure of web page live broadcast on demand RTMP streaming platform easydss streaming live broadcast
- Tencent released "warehouse express" and issued "ID card" for each commodity!
- Swift array map/flatmap/compactmap/filter/reduce/chaining Usage Summary
- Regular expression learning artifact!
- What can Lu yuanjiu Jiao buy?
- 重新定义存储架构,华为用了不止5颗“芯”
- Tencent security officially released the IOT security capability map
- Bypass kernel function pointer integrity check
猜你喜欢

Applet - use of template

Applet wxss

A survey of training on graphs: taxonomy, methods, and Applications

Daily algorithm & interview questions, 28 days of special training in large factories - the 15th day (string)

Ps\ai and other design software pondering notes

A survey on model compression for natural language processing (NLP model compression overview)
![[leetcode108] convert an ordered array into a binary search tree (medium order traversal)](/img/e1/0fac59a531040d74fd7531e2840eb5.jpg)
[leetcode108] convert an ordered array into a binary search tree (medium order traversal)
![[go] concurrent programming channel](/img/6a/d62678467bbc6dfb6a50ae42bacc96.jpg)
[go] concurrent programming channel

Problems encountered in the work of product manager

Cognition and difference of service number, subscription number, applet and enterprise number (enterprise wechat)
随机推荐
Collect tke logs through daemonset CRD
NFT元宇宙源码搭建解析与介绍
FPGA project development: experience sharing of lmk04821 chip project development based on jesd204b (I)
Enterprise service growth path (7): what key factors will affect SaaS' sales performance?
About with admin option and with grant option
Bitwise Operators
What is browser fingerprint recognition?
[tke] whether to configure SNAT when the container accesses services outside the node
重新定义存储架构,华为用了不止5颗“芯”
Druid architecture and Implementation
Go path customized project path package dependency
未来银行需要用明天的思维,来思考今天架构
[tke] analysis of CLB loopback in Intranet under IPVS forwarding mode
06. Tencent cloud IOT device side learning - Introduction to basic functions
A solution for building live video based on open source real-time audio and video webrtc architecture
One Minute! No code! Add [statistical analysis] to the website
How to access tke cluster API interface with certificate or token
Saying "Dharma" Today: the little "secret" of paramter and localparam
How to use the national standard streaming media server to view the video stream of the surveillance camera? How to correctly use UDP and TCP protocols?
中金证券靠谱吗?是否合法?开股票账户安全吗?