密码学将“加密”置于加密货币中。它的存在时间比我们的数字时代要长得多,并且在几个世纪以来像语言一样发展。
cryptography places encryption in encrypted currency. It exists much longer than our digital age and has evolved over the centuries as a language.
密码学是一门通过将信息转换为只有预期接收者才能处理和阅读的形式来保护信息的科学。它的第一个已知用途可以追溯到公元前 1900 年,作为埃及坟墓中的象形文字。该术语本身来自希腊语kryptos和graphein,分别表示隐藏和书写。
The first known use can be traced back to 1900 B.C. as an pictogram in Egypt's grave. The term itself is from Greek kryptos and graphein, indicating, respectively, concealment and writing.
最著名的用途之一是由朱利叶斯·凯撒在公元前 40 年左右开发的,并被恰当地命名为凯撒密码。密码使用一条秘密信息,告诉您如何加扰并因此解密消息。凯撒使用了一种替代密码,其中字母表中的每个字母都被字母表中更靠上或靠下不同固定位置的一个字母替换。例如,字母表可以向右移动五位,这意味着字母“A”现在是“F”,“B”现在是“G”等等。这意味着他可以传递信息而不必担心被拦截,因为只有他的官员知道如何解读信息。
One of the most famous uses was developed by Julius Caesar in about 40 years B.C. and properly named the Caesar password. The password uses a secret message, telling you how to disturb and declassified the message. Caesar uses an alternative password, in which each letter in the alphabet is replaced by one letter above the alphabet or by a different fixed position. For example, the alphabet can move five to the right, which means that the letter “A” is now “F” and “B” is now “G” and so on. This means that he can transmit the information without fear of being intercepted, because only his official knows how to interpret it.
用于密码学的凯撒密码轮( kprojekt/iStock/Getty Images Plus)
Caesar's Crypto Wheel for cryptography (kprojekt/iStock/Getty Images Plus)
16 世纪的密码学家 Giovan Battista Bellaso 设计了 Vigenere 密码(错误地归因于外交官 Blaise de Vigenere),据信这是第一个使用加密密钥的密码。字母表被写成 26 行,每行移动一个字母以创建一个网格。写出加密密钥以匹配消息的长度。然后,网格被用来加密消息,一个字母一个字母。最后,发送者将加密的消息和秘密关键字分享给拥有相同网格的接收者。?
The 16th century cryptographer Giován Battista Bellaso designed the Vigenere password (correctly attributed to diplomat Blaise de Vigenere), which is believed to be the first password to use encryption keys. The alphabet is written as 26 lines, each of which moves a letter to create a grid. The encryption key is written to match the length of the message. The grid is then used to encrypt messages, a letter. Finally, the sender shares encrypted messages and secret keywords to the receivers with the same grid.
然后出现了计算机,它启用了更复杂的密码学。但目标保持不变:将可读消息(纯文本)转换为非预期读者无法理解的内容(密文)。该过程称为加密,是通过公共互联网连接共享信息的方式。有关如何解密或解密数据的知识称为密钥,只有预期的各方才能访问此信息。?
Then a computer emerges, and it uses more sophisticated cryptography. But the goal remains the same: converts readable messages (pure text) to content that is not understood by the intended reader . This process, called encryption, is a way of sharing information through public Internet connections. Knowledge of how to declassify or decipher data is called keys, which can only be accessed by the intended parties.
密码学是如何工作的?
How does cryptography work?
加密信息的方法有很多种,复杂程度取决于数据可能需要的保护程度。但是我们通常会看到三种类型的密码算法。
There are many ways to encrypt information, the complexity of which depends on the level of protection that data may require. But we usually see three types of cryptographic algorithms.
对称加密
对称加密(或密钥加密)依赖于单个密钥。这意味着数据的发送方和接收方都共享相同的密钥,然后使用该密钥对信息进行加密和解密。?
Symmetric encryption (or key encryption) depends on a single key. This means that both the sender and the recipient of the data share the same key and then use that key to encrypt and decipher the information?
为此,需要提前商定密钥。虽然仍然是一个很好的加密来源,但只有一个密钥保护信息的事实意味着通过不安全的连接发送信息时存在一些风险。想象一下,您想通过将前门钥匙藏在门垫下与朋友分享您的前门钥匙。您的朋友现在可以访问您的房子。但是,陌生人也有可能在未经您许可的情况下找到钥匙并进入。
To this end, the key needs to be agreed in advance. Although it is still a good source of encryption, the fact that only one key protects the information means that there is some risk in sending the information through an unsafe connection. Imagine, you want to share your front key with your friends by hiding it under the doorstep. Your friend can now visit your house. Strangers may also find the key and enter without your permission.
?
非对称加密
Asymmetric Encryption
非对称加密(或公钥加密)使用一对密钥。这种增加的安全级别立即增强了对数据的保护。在这种情况下,每个密钥都有一个用途。有一个可以通过任何网络与任何人交换的公钥。此密钥包含有关如何加密数据的信息,任何人都可以使用它。但也有一个私钥。私钥不共享并保存有关如何解密消息的信息。这两个密钥都是由一种算法生成的,该算法使用大素数来创建两个唯一的、数学链接的密钥。任何有权访问公钥的人都可以使用它来加密消息,但只有私钥持有者才能解密消息。?
Unsymmetric encryption (or public key encryption) uses a pair of keys. This increased security level immediately enhances the protection of data. In this case, each key has one use. There is a public key that can be exchanged with anyone via any network. This key contains information about how to encrypt data, and anyone can use it. There is also a private key. The private key does not share and save information about how to decipher messages. Both keys are generated by an algorithm that uses large prime numbers to create two unique mathematically linked keys. Any person who has access to the key can use it to encrypt messages, but only the private key holder can decipher them.
它的工作原理几乎就像一个邮箱。任何人都可以将消息放入存款槽。但是只有邮箱的所有者才有钥匙打开它并阅读邮件。这是大多数加密货币交易的基础。?
It works almost like a mailbox. Anyone can put a message in a deposit slot. But only the owner of the mailbox has the key to open it and read the mail. This is the basis for most encrypted currency transactions.
哈希函数
Hashi function
散列函数是密码学保护信息的另一种方式。但它不使用密钥,而是依靠算法将任何数据输入转换为固定长度的字符串。?
The hash function is another way to protect information by cryptography. It does not use a key, but relies on algorithms to convert any data input to a string with a fixed length.
散列函数也不同于其他形式的加密,因为它们只能以一种方式工作,这意味着您无法将散列转换回其原始数据。
The hash function is also different from other forms of encryption because they work only in one way, which means that you cannot convert the hash back to its original data.
哈希对于区块链管理至关重要,因为它们可以加密大量信息而不会损害原始数据。以有组织的方式来构建数据不仅可以提高效率,而且对于任何已加密的数据,哈希值还可以充当数字指纹。然后,这可用于在通过网络传输期间验证和防止任何未经授权的修改。对原始数据的任何更改都会产生新的哈希值,该哈希值不再与原始数据匹配,因此无法在区块链上进行验证。
Hashi is essential for block chain management because they can encrypt a large amount of information without compromising the raw data. Building the data in an organized manner not only improves efficiency, but can also serve as digital fingerprints for any encrypted data. This can then be used to verify and prevent any unauthorized changes during transmission via the network. Any changes to the original data will result in a new Hashi value, which no longer matches the original data and therefore cannot be validated on the block chain.
数字签名
digital signature
数字签名是确保消息、软件或数字文档中数据的安全性、真实性和完整性的另一个关键方面。顾名思义,它们的作用类似于物理签名,是将您的身份与数据绑定的独特方式,因此可以作为验证信息的一种方式。
Digital signatures are another key aspect of ensuring the security, authenticity and integrity of data in a message, software or digital document. By definition, they play a role similar to a physical signature and are a unique way to bind your identity to data, and can therefore be used as a means of authenticating information.
但是,数字签名不是像物理签名那样使用独特的字符来表示您的身份,而是基于公钥密码术。数字签名以代码形式出现,然后由于两个相互验证的密钥而附加到数据中。发送方通过使用私钥对与签名相关的数据进行加密来创建数字签名,接收方获取签名者的公钥来解密数据。?
Digital signatures, however, do not use unique characters to identify you as physical signatures, but are based on public key cryptography. Digital signatures appear in code form and are then attached to the data because of two mutually authenticated keys. The sender creates digital signatures by encrypting the data related to the signature using private keys, and the recipient takes the public key of the signatory to decrypt the data?
如果收件人无法使用提供的公钥解密和读取签名文档,则表明文档或签名存在问题,因此无法对文档进行身份验证。
If the recipient is unable to decrypt and read the signature document using the public key provided, it indicates that the document or signature is problematic and therefore the document cannot be authenticated.
密码学
cryptography
加密货币的一大吸引力在于它们在区块链上的安全性和透明度。所有这些都依赖于加密机制。这就是大多数基于区块链的加密货币保持安全的方式,因此它构成了加密货币的本质。?
One of the main attractions of encrypted money is its security and transparency in the block chain. All of this depends on encryption mechanisms. That is how most of the encrypted currency based on the block chain remains secure, so it constitutes the essence of encrypted money.
早在 2009 年,比特币创造者中本聪(Satoshi Nakamoto)就在密码学留言板上提出了一种解决长期以来一直是数字货币致命弱点的双重支付问题的方法。当同一单位的加密货币有可能被花费两次时,就会出现双花问题,这会破坏人们对它们作为在线支付解决方案的信任,并使它们基本上毫无价值。
As early as 2009, Satoshi Nakamoto, the creator of Bitcoin, proposed a solution to the problem of double payment, which has long been a digital currency’s vulnerability. When the same unit’s encrypted currency is likely to be spent twice, the problem arises, undermining trust in them as an online payment solution and rendering them largely worthless.
?
中本聪提议使用一种点对点分布式账本,该账本带有时间戳并通过加密手段进行保护。这导致了我们今天所知的区块链的创建。与所有技术一样,密码学将不断发展以跟上对安全数字环境的需求。随着区块链和加密货币越来越多地跨行业和跨界采用,情况尤其如此。?
China’s proposal is to use a point-to-point distribution book, which is time stamped and protected by encryption. This has led to the creation of a chain of blocks that we know today. As with all technologies, cryptography will evolve to keep up with the demand for a secure digital environment.
原文:https://www.coindesk.com/what-is-cryptography?,作者 :Annika Feign
Original language: https://www.coindesk.com/what-is-cryptography?, by Annika Feign
注册有任何问题请添加 微信:MVIP619 拉你进入群
打开微信扫一扫
添加客服
进入交流群
发表评论