Getting started with blockchain

Digital Signature: A digital signature is considered a digital simulation of a handwritten signature.

The important features of handwritten signatures are:

1. Your own signature can only be made by yourself;

2. Your own signature can be verified by anyone else;

3. Your own signature only contacts a particular file and cannot be used to support other files;

Before explaining digital signatures, you need to understand some basic concepts of cryptography:

Clear text: the initial form of the message

Ciphertext: Encrypted form

Key: A secret message used to complete cryptographic applications such as encryption, decryption, and integrity verification.

If we write the plaintext as P, the ciphertext as C, the key as K, the encryption algorithm as E, the decryption algorithm as D, then C=E(P), P=D(C); The system satisfies P=D(E(P)).

Symmetric encryption and asymmetric encryption:

Symmetric encryption algorithm refers to the same secret key used in encryption and decryption. The same key can be used as both information encryption and decryption.

The encryption algorithm that requires the key is written as: C = E (K, P), and P = D (K, E (K, P)).

The working process is as shown in the figure:

An asymmetric encryption algorithm requires two different keys for encryption and decryption. These two keys are generally called public and private keys.

The encryption and decryption keys are different: P=D(KD, E(KE, P)). The public key and the private key appear in pairs. A key pair is obtained by a certain encryption algorithm. The public key is the part disclosed in the key pair, and the private key is the non-public part. When using this key pair, if one piece of data is used to encrypt a piece of data, it must be decrypted with another key. For example, encrypting data with a public key must be decrypted with a private key. If it is encrypted with a private key, it must be decrypted with a public key, otherwise the decryption will not succeed.

The working process is as shown in the figure:

Steps 1-3

Step 1: A generates a pair of keys through a random algorithm, having a public key and a private key;

Step 2: A publicizes the public key and sends it to B, C, and D respectively;

Step 3: B wants to send a message to A. First, encrypt the information with A's public key, and then propagate the encrypted information (cryptotext) to A. After receiving the information, A uses its own private key. Decrypt, and get the original text of B to A.

Then digital signature is a series of digits that only the sender of the information can produce that cannot be forged by others. This digit string is also a valid proof of the authenticity of the information sent by the sender of the message. The process of generating and using digital signatures is shown in the following figure:

Step 4-5

Step 4: The information to be sent by A is hashed to obtain a digest, and is encrypted with a private key to generate a digital signature of the information.

Step 5: A sends the information to be sent and the digital signature to B at the same time, and B uses A's public key to decrypt the digital signature, thereby determining that the information is indeed from A. In addition, B compares the digest obtained by hashing the information sent by A with the decrypted digest, and can determine whether the information has been tampered with.

Source: BitTribe Lab

We will continue to update Blocking; if you have any questions or suggestions, please contact us!

Share:

Was this article helpful?

93 out of 132 found this helpful

Discover more

Blockchain

Clear out while the time is right? FTX and Alameda-related addresses recently transferred $30 million worth of assets.

In September, FTX was approved for liquidation and has been frequently withdrawing large amounts of assets in the pas...

Blockchain

Analysis: How does the value chain of the blockchain industry work?

Over the past few years, blockchain technology has evolved from a purely technology to a multi-billion dollar industr...

Blockchain

Crazy currency contract: leverage up to 125 times, and overnight positions of 2 billion US dollars

Text: Ratchet Source: A blockchain 100 times leverage, 125 times leverage … More and more players in the curren...

Blockchain

Research Report | Blockchain Economics Panorama and Future: Exchange Compliance

Author: BlockVC industry research team Source: BlockVC Editor's Note: The original title is "Postal Chain E...

Blockchain

The exchange is frequently stolen, and where is the security of digital currency going?

In the food chain of digital currency, the exchange has always stood at the top. But if you want to wear a crown, you...

Blockchain

Get Ready for a Jaw-Dropping 90% Asset Return by Q2 2024 FTX Customers in for a Thrilling Ride with New Amended Proposal!

Exciting news for customers of defunct cryptocurrency exchanges FTX and FTX.US - an updated proposal offers hope of r...