当前位置:网站首页>Development of block hash game guessing system (mature code)
Development of block hash game guessing system (mature code)
2022-06-24 16:48:00 【Development weixin-xtkf556】
The four core technologies of blockchain are cryptography 、 Distributed ledger 、 Consensus mechanisms and smart contracts . Cryptography is one of the most important parts , It can be said to be the cornerstone of blockchain , Other technologies are high-rise buildings that build blockchain based on cryptography . There are two main cryptographic algorithms used in blockchain :
One is hash algorithm ,
Second, asymmetric encryption .
First , It's decentralized . The database originally maintained by one party , It has become a database maintained by many parties . Everyone writes data together by consensus , No one can control the data alone .
secondly , It allows everyone to change from a separate account to a joint account , This brings consistency and transparency to the data .
in addition , Blockchain is only allowed to write data , Deleting and modifying... Are not allowed , It can prevent data from being tampered with secretly . Simply speaking , Hash algorithm is a special function . No matter how long the string is entered , You can get a fixed length output value through this function . It's like the ID number , Always the 18th , It is also the only one in China . The output value of hash algorithm is called hashing value . Hash algorithm has three characteristics .
The first characteristic of hash algorithm is anti-collision ability . The so-called collision , Is to enter two different data , You end up with the same input . It's like we hit the shirt when we were shopping , The pit collision is that most of the inputs can get the only output . In the world of blockchain , The address of any transaction or account is completely generated by the hash algorithm . This also ensures the uniqueness of the transaction or account address in the blockchain network . The second feature is that it is unidirectional . for example , If you enter a string of data , You can get a hash value through the hash algorithm , But there is no way to invert the hash value to get the input data string . It's one-way , Based on that , Blockchain effectively protects the security of our information . The third characteristic of hash algorithm is anti tamper ability . For any input , Even small changes , The hash value can also vary greatly . This feature plays a key role in the connection between blocks . Each block of the blockchain is marked by the hash value of the previous block . Unless someone can crack all the hash values in the whole chain , Otherwise, once the data is recorded on the chain , It's impossible to tamper . Hash property :
(1) One way .Thatis,givenaninputnumber,itiseasytocalculateitshashvalue,butgivenahashvalue,theoriginalinputnumbercannotbeobtainedaccordingtothesamealgorithm.
(2) Weak anti-collision .Thatis,givenaninputnumber,itiscomputationallyinfeasibletofindanotherhashvaluetogetagivennumberwhenusingthesamemethod.
(3) Strong collision resistance .Thatis,foranytwodifferentinputnumbers,itisnotfeasibletocalculatethesamehashvalueaccordingtothesamealgorithm.
Simple explanation : Hash (Hash) Algorithm , Hash function . It's a one-way cryptosystem , That is, it is an irreversible mapping from plaintext to ciphertext , Only the encryption process , No decryption process . meanwhile , Hash function can change the input of any length to get fixed length output . This one-way feature of the hash function and the fixed length of the output data make it possible to generate messages or data .
边栏推荐
- How to pop up an alarm through the national standard gb28181 protocol video platform easygbs for mobile detection / perimeter intrusion detection video recording
- The mystery of redis data migration capacity
- Today, Tencent safety and SAIC Group officially announced!
- Can you remember the code of a programming boss? Can you hit it out without Baidu?
- Enterprise service growth path (7): what key factors will affect SaaS' sales performance?
- Druid architecture and Implementation
- 网站SEO排名越做越差是什么原因造成的?
- [go] runtime package for concurrent programming and its common methods
- Activeindex selection and redirection in the menu bar on the right of easycvs
- What is a reptile
猜你喜欢
A survey of training on graphs: taxonomy, methods, and Applications
Problems encountered in the work of product manager
A survey on dynamic neural networks for natural language processing, University of California
[go] concurrent programming channel
Applet wxss
Cognition and difference of service number, subscription number, applet and enterprise number (enterprise wechat)
Ps\ai and other design software pondering notes
[leetcode108] convert an ordered array into a binary search tree (medium order traversal)
Daily algorithm & interview questions, 28 days of special training in large factories - the 15th day (string)
Applet - use of template
随机推荐
Is CICC securities reliable? Is it legal? Is it safe to open a stock account?
Finite element simulation in design
About with admin option and with grant option
What is the difference between a network card and a port
How to perform concurrent stress testing on RTSP video streams distributed by audio and video streaming servers?
Introduction to koa (II) building the koa program
ClassNotFoundException v/s NoClassDefFoundError
Modern finite element analysis can easily achieve accurate results
Ui- first lesson
Mathematics in machine learning -- point estimation (IV): maximum posteriori probability (map)
IBM:以现代化架构支撑AI与多云时代的企业数字化重塑
Markdown syntax -- Formula
Introduction of thread pool and sharing of practice cases
How does the easynvr/easygbs live video platform use Wireshark to capture and analyze data locally?
Tencent releases the full platform version of reasoning framework TNN, and supports mobile terminal, desktop terminal and server terminal at the same time
2021 devopsdays Tokyo Station ends perfectly | coding experts are invited to share the latest technical information
Web page live broadcast on demand RTMP streaming platform easydss newly added virtual live broadcast support dash streaming function
How to get the response body content in gin?
The RTSP video structured intelligent analysis platform easynvr stops calling the PTZ interface through the onvif protocol to troubleshoot the pending status
[tke] modify the cluster corendns service address