How to select a crypto currency wallet
In 1976, Diffie and Hellman proposed that a key to the original A pair of keys is split in two, one key is used to encrypt and one key is used to decrypt. The encryption key is public and is called public key. The decryption key cannot be made public, only I hold it secretly and cannot give it to others, it is called private key. For example, if Zhang San wants to send a message to Li Si, Zhang San has to encrypt the message with Li Si's public key, and only Li Si's private key can be used to decrypt it. No one else can.
In what I shared earlier, I mentioned that the way quantum computing breaks Bitcoin is by backing out the private key via the public key. So if the public key of a bitcoin account isn't published then the quantum computer can't find the target and figure out the private key.
A wallet solution relies on a random number generator that is not secure enough to sign transactions with the same k value as the private key ( (Wallet software will generally use the same random number algorithm to generate the private key and calculate the k-value), rest assured that once the transaction is broadcasted If the hacker is lucky and the program runs fast, he might even double spend the transaction he just broadcast.
The emergence of public key cryptography in 1976 was widely used in Bitcoin, CA (Trusted Authentication), and other applications that required digital identity and The digital signature scenario. It is based on the principle that the private key corresponds one-to-one with the public key, and the public key can unlock the information encrypted by the private key; it can generate the public key from the private key. However, the private key cannot be deduced from the public key. It enables the user to prove that he is the owner of the private key without presenting the public key externally. For example, when A encrypts a message with its own private key and sends it to B, if B can decrypt the message secret using A's public key, B can affirm that The message comes from A. Since only A has the private key to encrypt the message, the above method is often referred to as a digital signature. This technique is therefore called "asymmetric encryption".
Losing a wallet password or private key is a common problem for cryptocurrency users, so can there be a way to minimize trust while What about recovering a lost key?
Key infrastructure services include key creation, tagging, destruction, import, export, encryption, decryption, signature, signature verification, and key management. Permissions, new device recovery, etc.
Understanding asymmetric cryptography (public-key encryption) is important for understanding Bitcoin's public and private keys as well as the wallet and how it works, so today Explain asymmetric cryptography.
We know that a bitcoin wallet address corresponds to a public key and a private key, and that only those who have the private key can use the bitcoins in that wallet, but that the The private key is secure and cannot be calculated from the wallet address or the public key.
Depending on how the private key is stored, i.e. whether the user has the private key or not, we can divide wallets into, "centralized wallets" and "de-centralized wallets". Centralized Wallet
Interacting with the SDK is a two-part process; first, after creating the wallet, you'll get a file containing the private key. So you need to get the wallet address by parsing the key storage file.
Key Protection: How are keys protected? Can I copy the key? How is the key hosted? Is double authentication required for access keys?
-Private key = authentication, equivalent to your bank card number + password. The private key is made up of numbers and upper and lower case letters, and the private key length usually varies from blockchain to blockchain. The private key can be used to derive the public key. It is important to note that once your private key is lost or forgotten, it cannot be recovered, so it is important to keep it safe!
There are still some potential problems with key security. For example, the loss or theft of a private key can jeopardize the rights of the owner of the private key, and the uniqueness of the private key makes such losses difficult to remedy.
On February 29, Polkadot early community member Fuyao Kang shared his private key generation solution with the community " Soulword means "heart language," a cryptographic algorithm that can be used based on private memories. A solution for creating private keys. Soulword uses the private key creator's own Private memory things and create the private key by encryption. Thus the private key or mnemonic can be recovered in the event of loss of the private key or mnemonic in the form of a private memory plus password
As you know, you should know how important the random k-value is when signing a bitcoin transaction, we can even say that the k-value The randomness of the private key is just as important as the randomness of the private key. Now let's explore this topic in more depth
A Private Key is a string of data generated by a random algorithm that can be calculated using asymmetric cryptography The public and has absolute control over the assets of the blockchain through the private key, so the central issue in the security of the blockchain assets is the storage of the private key The public key can then calculate the address of the coin. The private key is very important, as a password, and is hidden from all but the owner of the address. The blockchain asset is actually on the blockchain, the owner actually only has the private key,, and the owner needs to keep it safe and secure
In the first place, the loss of a wallet password or private key is a common problem for cryptocurrency users. while recovering the lost key? This is one direction that is being explored by ethereum co-founders vitalik and others, who have written a new EIP (Ethereum Improvement Proposal) and named it Secret Multisignature Recovery (Secret Multisig) (Recovery) programme
If the bitcoin in the wallet address has never been used, then the public key to that address is not known, and all anyone else knows is that the Wallet address (we only need to give the public key when we spend bitcoins on an address, but even if we only spend it once, the public key is (which will be broadcast to the entire network). As mentioned earlier, SHA-256 is difficult to break by quantum computing, which means that no one else can use the wallet address to calculate the public key. So, even if the public key can be used to figure out the private key, those wallet addresses that haven't exposed the public key are still safe
Blockchain can be used to develop a decentralized education system that breaks up traditional monopolies and can effectively reduce the number of human interventions that lead to The problem of favoritism occurs. At the same time for the student's data and file records, the public key and private key can be encrypted through an encryption algorithm to set up the encryption, and the private key is only the student himself. Own, keep and view your own data, which can effectively reduce the occurrence of privacy leaks, information tampering and other problems.
Encryption requires two keys: a public key (public key for short) and a private key (private key for short). The RSA algorithm also has the disadvantage of being relatively efficient: it can be used to encrypt and decrypt private keys. In practice, we tend to use it in combination with symmetric encryption, and the secret key is used in combination with the symmetric encryption. RSA algorithm
Article Tags: ethereum wallet export private key