区块链核心技术【密码学】,究竟是什么?

资讯 2024-06-28 阅读:25 评论:0
密码学将“加密”置于加密货币中。它的存在时间比我们的数字时代要长得多,并且在几个世纪以来像语言一样发展。cryptography places encryption in encrypted currency. It exists much...
美化布局示例

欧易(OKX)最新版本

【遇到注册下载问题请加文章最下面的客服微信】永久享受返佣20%手续费!

APP下载   全球官网 大陆官网

币安(Binance)最新版本

币安交易所app【遇到注册下载问题请加文章最下面的客服微信】永久享受返佣20%手续费!

APP下载   官网地址

火币HTX最新版本

火币老牌交易所【遇到注册下载问题请加文章最下面的客服微信】永久享受返佣20%手续费!

APP下载   官网地址

密码学将“加密”置于加密货币中。它的存在时间比我们的数字时代要长得多,并且在几个世纪以来像语言一样发展。

cryptography places encryption in encrypted currency. It exists much longer than our digital age and has evolved over the centuries as a language.


密码学是一门通过将信息转换为只有预期接收者才能处理和阅读的形式来保护信息的科学。它的第一个已知用途可以追溯到公元前 1900 年,作为埃及坟墓中的象形文字。该术语本身来自希腊语kryptos和graphein,分别表示隐藏和书写。

The first known use can be traced back to 1900 B.C. as an pictogram in Egypt's grave. The term itself is from Greek kryptos and graphein, indicating, respectively, concealment and writing.


最著名的用途之一是由朱利叶斯·凯撒在公元前 40 年左右开发的,并被恰当地命名为凯撒密码。密码使用一条秘密信息,告诉您如何加扰并因此解密消息。凯撒使用了一种替代密码,其中字母表中的每个字母都被字母表中更靠上或靠下不同固定位置的一个字母替换。例如,字母表可以向右移动五位,这意味着字母“A”现在是“F”,“B”现在是“G”等等。这意味着他可以传递信息而不必担心被拦截,因为只有他的官员知道如何解读信息。

One of the most famous uses was developed by Julius Caesar in about 40 years B.C. and properly named the Caesar password. The password uses a secret message, telling you how to disturb and declassified the message. Caesar uses an alternative password, in which each letter in the alphabet is replaced by one letter above the alphabet or by a different fixed position. For example, the alphabet can move five to the right, which means that the letter “A” is now “F” and “B” is now “G” and so on. This means that he can transmit the information without fear of being intercepted, because only his official knows how to interpret it.


用于密码学的凯撒密码轮( kprojekt/iStock/Getty Images Plus)

Caesar's Crypto Wheel for cryptography (kprojekt/iStock/Getty Images Plus)


16 世纪的密码学家 Giovan Battista Bellaso 设计了 Vigenere 密码(错误地归因于外交官 Blaise de Vigenere),据信这是第一个使用加密密钥的密码。字母表被写成 26 行,每行移动一个字母以创建一个网格。写出加密密钥以匹配消息的长度。然后,网格被用来加密消息,一个字母一个字母。最后,发送者将加密的消息和秘密关键字分享给拥有相同网格的接收者。?

The 16th century cryptographer Giován Battista Bellaso designed the Vigenere password (correctly attributed to diplomat Blaise de Vigenere), which is believed to be the first password to use encryption keys. The alphabet is written as 26 lines, each of which moves a letter to create a grid. The encryption key is written to match the length of the message. The grid is then used to encrypt messages, a letter. Finally, the sender shares encrypted messages and secret keywords to the receivers with the same grid.


然后出现了计算机,它启用了更复杂的密码学。但目标保持不变:将可读消息(纯文本)转换为非预期读者无法理解的内容(密文)。该过程称为加密,是通过公共互联网连接共享信息的方式。有关如何解密或解密数据的知识称为密钥,只有预期的各方才能访问此信息。?

Then a computer emerges, and it uses more sophisticated cryptography. But the goal remains the same: converts readable messages (pure text) to content that is not understood by the intended reader . This process, called encryption, is a way of sharing information through public Internet connections. Knowledge of how to declassify or decipher data is called keys, which can only be accessed by the intended parties.


密码学是如何工作的?

How does cryptography work?


加密信息的方法有很多种,复杂程度取决于数据可能需要的保护程度。但是我们通常会看到三种类型的密码算法。

There are many ways to encrypt information, the complexity of which depends on the level of protection that data may require. But we usually see three types of cryptographic algorithms.


对称加密

symmetric encryption


对称加密(或密钥加密)依赖于单个密钥。这意味着数据的发送方和接收方都共享相同的密钥,然后使用该密钥对信息进行加密和解密。?

Symmetric encryption (or key encryption) depends on a single key. This means that both the sender and the recipient of the data share the same key and then use that key to encrypt and decipher the information?


为此,需要提前商定密钥。虽然仍然是一个很好的加密来源,但只有一个密钥保护信息的事实意味着通过不安全的连接发送信息时存在一些风险。想象一下,您想通过将前门钥匙藏在门垫下与朋友分享您的前门钥匙。您的朋友现在可以访问您的房子。但是,陌生人也有可能在未经您许可的情况下找到钥匙并进入。

To this end, the key needs to be agreed in advance. Although it is still a good source of encryption, the fact that only one key protects the information means that there is some risk in sending the information through an unsafe connection. Imagine, you want to share your front key with your friends by hiding it under the doorstep. Your friend can now visit your house. Strangers may also find the key and enter without your permission.

?

非对称加密

Asymmetric Encryption


非对称加密(或公钥加密)使用一对密钥。这种增加的安全级别立即增强了对数据的保护。在这种情况下,每个密钥都有一个用途。有一个可以通过任何网络与任何人交换的公钥。此密钥包含有关如何加密数据的信息,任何人都可以使用它。但也有一个私钥。私钥不共享并保存有关如何解密消息的信息。这两个密钥都是由一种算法生成的,该算法使用大素数来创建两个唯一的、数学链接的密钥。任何有权访问公钥的人都可以使用它来加密消息,但只有私钥持有者才能解密消息。?

Unsymmetric encryption (or public key encryption) uses a pair of keys. This increased security level immediately enhances the protection of data. In this case, each key has one use. There is a public key that can be exchanged with anyone via any network. This key contains information about how to encrypt data, and anyone can use it. There is also a private key. The private key does not share and save information about how to decipher messages. Both keys are generated by an algorithm that uses large prime numbers to create two unique mathematically linked keys. Any person who has access to the key can use it to encrypt messages, but only the private key holder can decipher them.


它的工作原理几乎就像一个邮箱。任何人都可以将消息放入存款槽。但是只有邮箱的所有者才有钥匙打开它并阅读邮件。这是大多数加密货币交易的基础。?

It works almost like a mailbox. Anyone can put a message in a deposit slot. But only the owner of the mailbox has the key to open it and read the mail. This is the basis for most encrypted currency transactions.


哈希函数

Hashi function


散列函数是密码学保护信息的另一种方式。但它不使用密钥,而是依靠算法将任何数据输入转换为固定长度的字符串。?

The hash function is another way to protect information by cryptography. It does not use a key, but relies on algorithms to convert any data input to a string with a fixed length.


散列函数也不同于其他形式的加密,因为它们只能以一种方式工作,这意味着您无法将散列转换回其原始数据。

The hash function is also different from other forms of encryption because they work only in one way, which means that you cannot convert the hash back to its original data.


哈希对于区块链管理至关重要,因为它们可以加密大量信息而不会损害原始数据。以有组织的方式来构建数据不仅可以提高效率,而且对于任何已加密的数据,哈希值还可以充当数字指纹。然后,这可用于在通过网络传输期间验证和防止任何未经授权的修改。对原始数据的任何更改都会产生新的哈希值,该哈希值不再与原始数据匹配,因此无法在区块链上进行验证。

Hashi is essential for block chain management because they can encrypt a large amount of information without compromising the raw data. Building the data in an organized manner not only improves efficiency, but can also serve as digital fingerprints for any encrypted data. This can then be used to verify and prevent any unauthorized changes during transmission via the network. Any changes to the original data will result in a new Hashi value, which no longer matches the original data and therefore cannot be validated on the block chain.


数字签名

digital signature


数字签名是确保消息、软件或数字文档中数据的安全性、真实性和完整性的另一个关键方面。顾名思义,它们的作用类似于物理签名,是将您的身份与数据绑定的独特方式,因此可以作为验证信息的一种方式。

Digital signatures are another key aspect of ensuring the security, authenticity and integrity of data in a message, software or digital document. By definition, they play a role similar to a physical signature and are a unique way to bind your identity to data, and can therefore be used as a means of authenticating information.


但是,数字签名不是像物理签名那样使用独特的字符来表示您的身份,而是基于公钥密码术。数字签名以代码形式出现,然后由于两个相互验证的密钥而附加到数据中。发送方通过使用私钥对与签名相关的数据进行加密来创建数字签名,接收方获取签名者的公钥来解密数据。?

Digital signatures, however, do not use unique characters to identify you as physical signatures, but are based on public key cryptography. Digital signatures appear in code form and are then attached to the data because of two mutually authenticated keys. The sender creates digital signatures by encrypting the data related to the signature using private keys, and the recipient takes the public key of the signatory to decrypt the data?


如果收件人无法使用提供的公钥解密和读取签名文档,则表明文档或签名存在问题,因此无法对文档进行身份验证。

If the recipient is unable to decrypt and read the signature document using the public key provided, it indicates that the document or signature is problematic and therefore the document cannot be authenticated.


密码学

cryptography


加密货币的一大吸引力在于它们在区块链上的安全性和透明度。所有这些都依赖于加密机制。这就是大多数基于区块链的加密货币保持安全的方式,因此它构成了加密货币的本质。?

One of the main attractions of encrypted money is its security and transparency in the block chain. All of this depends on encryption mechanisms. That is how most of the encrypted currency based on the block chain remains secure, so it constitutes the essence of encrypted money.


早在 2009 年,比特币创造者中本聪(Satoshi Nakamoto)就在密码学留言板上提出了一种解决长期以来一直是数字货币致命弱点的双重支付问题的方法。当同一单位的加密货币有可能被花费两次时,就会出现双花问题,这会破坏人们对它们作为在线支付解决方案的信任,并使它们基本上毫无价值。

As early as 2009, Satoshi Nakamoto, the creator of Bitcoin, proposed a solution to the problem of double payment, which has long been a digital currency’s vulnerability. When the same unit’s encrypted currency is likely to be spent twice, the problem arises, undermining trust in them as an online payment solution and rendering them largely worthless.

?

中本聪提议使用一种点对点分布式账本,该账本带有时间戳并通过加密手段进行保护。这导致了我们今天所知的区块链的创建。与所有技术一样,密码学将不断发展以跟上对安全数字环境的需求。随着区块链和加密货币越来越多地跨行业和跨界采用,情况尤其如此。?

China’s proposal is to use a point-to-point distribution book, which is time stamped and protected by encryption. This has led to the creation of a chain of blocks that we know today. As with all technologies, cryptography will evolve to keep up with the demand for a secure digital environment.


原文:https://www.coindesk.com/what-is-cryptography?,作者 :Annika Feign

Original language: https://www.coindesk.com/what-is-cryptography?, by Annika Feign



美化布局示例

欧易(OKX)最新版本

【遇到注册下载问题请加文章最下面的客服微信】永久享受返佣20%手续费!

APP下载   全球官网 大陆官网

币安(Binance)最新版本

币安交易所app【遇到注册下载问题请加文章最下面的客服微信】永久享受返佣20%手续费!

APP下载   官网地址

火币HTX最新版本

火币老牌交易所【遇到注册下载问题请加文章最下面的客服微信】永久享受返佣20%手续费!

APP下载   官网地址
文字格式和图片示例

注册有任何问题请添加 微信:MVIP619 拉你进入群

弹窗与图片大小一致 文章转载注明

分享:

扫一扫在手机阅读、分享本文

发表评论
平台列表
美化布局示例

欧易(OKX)

  全球官网 大陆官网

币安(Binance)

  官网

火币(HTX)

  官网

Gate.io

  官网

Bitget

  官网

deepcoin

  官网
热门文章
  • DDO在新加坡上市真假,欧意交易所能交易数字期权吗?

    DDO在新加坡上市真假,欧意交易所能交易数字期权吗?
    然而,对于DDO在新加坡的列名是否真实存在争议。 据报道,有人质疑DDO的数字选项是否真的上市,其背景是否经过了彻底调查。 首先,有报告说,DDO数字选项清单仅仅是一种宣传手段,没有找到DDO交易的平台,这就对DDO的真正清单提出了疑问。 其次,一些媒体调查了DDO数字选项的背景。 报告显示DDO数字选项发行人声称其数字选项是国家赞助的,但实际上,根据中国人民银行,虚拟货币相关业务是非法金融活动。 此外,DDO数字选项在视频号码等平台上广为传播,吸引了许多信徒的注意,然...
  • Griffin Gaming Partners计划为其第三支基金筹集5亿美元

    Griffin Gaming Partners计划为其第三支基金筹集5亿美元
    Pitchbook引用的6月8日《快链头条新闻》作为监管文件, 指出游戏风险投资公司Griffin赌博伙伴计划为其第三个旗舰基金筹集5亿美元, 比第二个基金少33%。 2021年,格里芬赌博伙伴从Web3游戏开发者Forte获得A回合资金1.85亿美元,并于2022年筹集了第二个旗舰基金,金额达7.5亿美元,此时风险资本家对Web3和加密游戏的热情达到顶峰。...
  • 比过山车还狠!比特币价格再次暴跌

    比过山车还狠!比特币价格再次暴跌
      上周日,比特币的价格创造了3000美元的历史新高,随后就开始各种高台跳水了。Last Sunday, the price of Bitcoin created a record high of $3,000, and then began to dive on all the high platforms.   据外媒报道,本周一,比特币价格一度下跌到2526.4美元,最高跌幅高达14.5%,这创造了2015年1月以来最大跌幅。According to external...
  • 加密货币之王重回王位:比特币飙升至 71,000 美元,还能再涨多少?

    加密货币之王重回王位:比特币飙升至 71,000 美元,还能再涨多少?
    比特币是市场上最大的加密货币,它再次打破了重要的7万美元门槛。 在短短的四舍五入(67,000美元到69,000美元之间)之后,价格在这一水平上遇到了强烈的抵制。 然而,势头的不断增强表明,比特币可能形成一个超过70 000美元的板块,为重新测试下一个抵抗阵地71 300美元和3月份可能攀升到历史最高点73 700美元铺平了道路。 问题仍然是:比特币能否维持预期的上升趋势并继续大幅上升?    分析家预计比特币价格将上升到74,400美元。 加密货币分析师Ali M...
  • 几张图看懂区块链技术到底是什么?https://www.cnblogs.com/behindman/p/8873191.html

    几张图看懂区块链技术到底是什么?https://www.cnblogs.com/behindman/p/8873191.html
    “区块链”的概念可以说是异常火爆,好像互联网金融峰会上没人谈一谈区块链技术就out了,BAT以及各大银行还有什么金融机构都在开始自己的区块链研究工作,就连IBM最近也成立了自己的区块链研究实验室,但其实区块链到底是什么?大家或许并不清楚,停留在雾里看花的状态。从今天开始,就让我们一起走进区块链,揭开区块链的神秘面纱吧!The concept of a block chain can be described as an unusually hot one, as if no...
标签列表