Getting started with blockchain

Digital Signature: A digital signature is considered a digital simulation of a handwritten signature.

The important features of handwritten signatures are:

1. Your own signature can only be made by yourself;

2. Your own signature can be verified by anyone else;

3. Your own signature only contacts a particular file and cannot be used to support other files;

Before explaining digital signatures, you need to understand some basic concepts of cryptography:

Clear text: the initial form of the message

Ciphertext: Encrypted form

Key: A secret message used to complete cryptographic applications such as encryption, decryption, and integrity verification.

If we write the plaintext as P, the ciphertext as C, the key as K, the encryption algorithm as E, the decryption algorithm as D, then C=E(P), P=D(C); The system satisfies P=D(E(P)).

Symmetric encryption and asymmetric encryption:

Symmetric encryption algorithm refers to the same secret key used in encryption and decryption. The same key can be used as both information encryption and decryption.

The encryption algorithm that requires the key is written as: C = E (K, P), and P = D (K, E (K, P)).

The working process is as shown in the figure:

An asymmetric encryption algorithm requires two different keys for encryption and decryption. These two keys are generally called public and private keys.

The encryption and decryption keys are different: P=D(KD, E(KE, P)). The public key and the private key appear in pairs. A key pair is obtained by a certain encryption algorithm. The public key is the part disclosed in the key pair, and the private key is the non-public part. When using this key pair, if one piece of data is used to encrypt a piece of data, it must be decrypted with another key. For example, encrypting data with a public key must be decrypted with a private key. If it is encrypted with a private key, it must be decrypted with a public key, otherwise the decryption will not succeed.

The working process is as shown in the figure:

Steps 1-3

Step 1: A generates a pair of keys through a random algorithm, having a public key and a private key;

Step 2: A publicizes the public key and sends it to B, C, and D respectively;

Step 3: B wants to send a message to A. First, encrypt the information with A's public key, and then propagate the encrypted information (cryptotext) to A. After receiving the information, A uses its own private key. Decrypt, and get the original text of B to A.

Then digital signature is a series of digits that only the sender of the information can produce that cannot be forged by others. This digit string is also a valid proof of the authenticity of the information sent by the sender of the message. The process of generating and using digital signatures is shown in the following figure:

Step 4-5

Step 4: The information to be sent by A is hashed to obtain a digest, and is encrypted with a private key to generate a digital signature of the information.

Step 5: A sends the information to be sent and the digital signature to B at the same time, and B uses A's public key to decrypt the digital signature, thereby determining that the information is indeed from A. In addition, B compares the digest obtained by hashing the information sent by A with the decrypted digest, and can determine whether the information has been tampered with.

Source: BitTribe Lab

We will continue to update Blocking; if you have any questions or suggestions, please contact us!

Share:

Was this article helpful?

93 out of 132 found this helpful

Discover more

Market

The short-lived boom is hard to sustain, the second major crash after FTX is on its way.

Macro recession, will it make crypto become a safe haven asset, or will it collapse the entire crypto world? Original...

Market

Fortune Magazine From ambitious to defensive, what twists and turns has the crypto queen Katie Haun experienced?

Cryptocurrencies may experience cyclical fluctuations, but this time the trough is much steeper than investors expect...

Policy

The Crypto Circus: A Bug’s Billion-Dollar Bonanza

During the 10th day of Sam Bankman-Fried's trial, talks focused on a software glitch and the allocation of funds for ...

Blockchain

The money was not earned, and the head was almost bald: interview with the boss of the startup exchange

Currently, one of the most profitable industries in the cryptocurrency sector is the exchange. According to The Block...

Blockchain

Run, clear the sea? This question for the exchange is too difficult

Text | Qin Xiaofeng Production | Odaily Planet Daily The market turned cold, and the exchange changed from a once env...

Opinion

LianGuairadigm, the top cryptocurrency institution, is facing community resistance and significant changes in its leadership. What is happening?

Fred, co-founder of LianGuairadigm, has stepped down from his role as managing partner and will continue on as a gene...