Why is the promulgation of the cryptography method a tool to promote the blockchain?

Source: shallot block chain Author: onion sister

The central government issued "two moves" and the blockchain exposure index soared

This weekend, every blockchain practitioner is excited.

First, the central voice made a strong blockchain. According to Xinhuanet’s report on the 25th, Xi Jinping emphasized in the 18th collective study of the Political Bureau of the Central Committee that the blockchain should be an important breakthrough for independent innovation of core technologies, and accelerate the promotion of blockchain technology and Industrial innovation and development, play the role of blockchain in promoting data sharing, optimizing business processes, reducing operating costs, improving synergy efficiency, and building a credible system.

For a time, the whole industry was “boiling”, and the blockchain was put upright under the spotlight, which undoubtedly injected a strong shot into the industry practitioners.

Then, on October 26, the 14th meeting of the Standing Committee of the 13th National People's Congress voted to pass the "Password Law of the People's Republic of China" (hereinafter referred to as the "Cryptography Law") on the afternoon of the 26th, starting from January 1, 2020. Implementation.

The cryptography aims to standardize the application and management of passwords, promote the development of cryptography, ensure network and information security, and improve the scientific, standardized and legalized level of password management. It is a comprehensive and basic law in the field of cryptography in China, marking the password in China. There are special legal guarantees for applications and management.

As soon as this news came out, the "Cryptography" quickly became on the Weibo hot search list, and the ranking once soared to the 27th place.

It is accidental and inevitable to release the Politburo collective learning blockchain technology on Friday and to issue a cryptographic law vote on Saturday.

The former is the statement and voice of the Central Political Bureau at the entire strategic level, and the introduction of the cryptography has played a role in promoting the commercialization of blockchain-related technologies from the practical level. The two have formed a perfect combination of fists. The land has sent a “spring breeze” to the domestic blockchain industry.

So what exactly does the introduction of the basic law of cryptography represent, and how does it relate to the blockchain, and how will the two influence the development of the blockchain industry? We have made a brief review from three aspects.

The password is complicated, but the password application is getting closer and closer to us.

Article 2 of the Cryptography Law defines its meaning in particular. The "password" here refers to the technology, products and services for encrypting and securing information and so on by means of a specific transformation.

That is to say, it is not a simple authentication password such as a login or payment password consisting of numbers, letters and symbols that we usually touch.

The "password" here may be a technology, product, and service. There are two main functions: one is encryption protection and the other is security authentication.

Encryption protection involves two processes of encryption and decryption. Encryption simply means turning plaintext into ciphertext, that is, using a specific transformation method, turning the original readable information into an unrecognizable symbol sequence, and decrypting is transforming the confusing information. For its original form.

Security authentication is simply to confirm the authenticity of the subject and information. It refers to the use of specific transformation methods to confirm whether the information has been tampered with, whether it is from a reliable source of information, and whether the behavior is true.

Cryptography has evolved from classical cryptography to modern cryptography.

Classical cryptography focuses on the confidential writing and transmission of information, and the corresponding deciphering methods. Modern cryptography not only focuses on information confidentiality, but also involves information integrity verification (message verification code), non-repudiation of information dissemination (digital signature), and internal and external attacks generated in distributed computing. All information security issues.

With the development of the cryptography business, the application of cryptography has expanded from the original party and government leading organs and departments (guaranteeing state-related secrets) to all aspects of social production and life.

For example, in the financial sector, financial chip cards using commercial passwords are used to curb illegal crimes such as bank card forgery and online transaction status counterfeiting; in the taxation field, the VAT anti-counterfeiting tax control system uses commercial password technology to protect tax-related information and contain tampering with coupon information. Conducting illegal activities such as tax evasion and tax evasion; in the field of social management, the Ministry of Public Security issues second-generation resident ID cards using commercial cryptographic chips to prevent illegal and criminal acts such as forgery and fabrication of identity cards…

With the Internet information age, the protection of corporate trade secrets and the privacy of the majority of users has become a rigid demand, and password applications will become more common in the future.

Cryptography is the core of blockchain technology

Blockchain is the underlying technology of Bitcoin, and cryptography is at the heart of blockchain technology.

In a narrow sense, a blockchain is a distributed database (or distributed ledger technology) that combines data blocks in a chronologically connected manner and cryptographically guarantees that they are not tamperable and unforgeable.

The Bitcoin electronic cash system is a successful application of the Elliptic Curve Encryption Algorithm (ECC).

Satoshi Nakamoto mentioned the bitcoin trading process in the article "Bitcoin: A Peer-to-Peer Electronic Cash System":

An electronic currency is such a string of digital signatures, each owner signing a random hashed digital signature by the previous transaction and the next owner's public key, and attaching the signature to the electronic currency At the end, the electronic money is sent to the next owner.

The payee can verify the owner of the chain by verifying the signature. Here are the asymmetric encryption algorithms and digital signature authentication techniques. Since an attacker cannot derive a private key through its public key or bitcoin address, it cannot falsify a valid signature to steal money from its account.

We know that blockchain is seen as a new technology for solving privacy and credit problems, and cryptography is a core component of this technology. To some extent, blockchain technology is difficult to understand, very large. “Make credit” comes from the cryptographic principles that it uses.

Blockchain technology encrypts wallet, transaction, security, and privacy protection protocols in a number of different ways, as the core algorithm for blockchain technology, digital signatures, zero-knowledge proofs, homomorphic encryption, hash functions, and more. The cryptographic technology provides core functions such as identity authentication, data verification, privacy protection and fair incentives, which is the key guarantee for the safe operation of blockchain technology.

The cryptography method will be introduced, or it will accelerate the commercial landing of China's blockchain technology.

Blockchain technology regards it as the growth point of future economic “curve overtaking”. Governments and central banks are actively deploying research and exploration of blockchain technology.

However, the blockchain technology system is a double-edged sword, which brings more transparency, security and unchangeable modification, and also raises the security of network information to an unprecedented height. In order to land and large-scale commercial use, blockchain must first solve security and privacy issues, and cryptography is the core security technology. A stable, compliant and secure cryptosystem is the basis for commercialization of blockchain. Guarantee.

According to the National Cryptography Administration, passwords are the core technology and basic support for network and information security, and are the most effective, reliable, and economical means to solve network and information security problems. A password is like the DNA of cyberspace. It can fully realize the security requirements of identity anti-counterfeiting, information anti-disclosure, content anti-tampering, and behavior non-repudiation.

Article 9 of the Cryptography Law also clearly states that the State encourages and supports the research and application of cryptographic science and technology, protects intellectual property rights in the field of cryptography in accordance with the law, and promotes the advancement and innovation of cryptographic science and technology, which is equivalent to the encouragement and recognition of cryptography-related applications. .

For a long time, there is only one administrative regulation in the field of cryptography in China–the "Commercial Password Management Regulations". Whether in the legislative level or in legal effect, it has been unable to adapt to the needs of the development of the new era of cryptography.

The cryptographic method passed by the 14th meeting of the Standing Committee of the 13th National People's Congress has filled the long-standing legal gap in the field of cryptography in China. Emphasis is placed on clearly defining the three major contents of “How to use passwords, who will manage passwords, and how to manage passwords”, which will help to integrate all fields and links related to cryptography into the rule of law, and guide the society to be compliant and correct. Use your password effectively.

Supervision and innovation will always be mutually racing and mutually reinforcing.

The introduction of the cryptography method undoubtedly provides a strong legal basis for the commercialization of blockchain-related encryption technology, which is conducive to industry practitioners to carry out technological innovation and application within the scope of supervision, to standardize cyberspace password protection work, and to promote the construction of cryptography technology. The new cyberspace security system, which is a core and multi-technology cross-integration, is of great significance and helps accelerate the application of passwords for key information infrastructure.

In addition, in the process of expansion of the global blockchain industry, countries must be safe and controllable. The core and foundation are the localization of passwords, and fundamentally get rid of excessive dependence on international or foreign cryptography technologies and products. The coordinated development of domestic passwords and blockchains will be a hot trend in the future.

We will continue to update Blocking; if you have any questions or suggestions, please contact us!

Share:

Was this article helpful?

93 out of 132 found this helpful

Discover more

News

Twitter featured: Mancoin network suspected of being stolen 100 million US dollars, the official claims to maintain

01 CoinDesk Media News Lightning Labs released its first desktop application on the Bitcoin blockchain. Lightning Lab...

Blockchain

After carrying a huge debt and shutting down TradeBlock, the former crypto empire DCG is now struggling for survival with one arm.

As the liquidity crisis in encryption erupted, the market declined, and the previous blind expansion and investment h...

Blockchain

Full text of South Korea's first independent "Encryption Act": Insider trading carries a maximum sentence of life imprisonment.

On June 30, 2023, the South Korean National Assembly's Political Affairs Committee passed the country's first legisla...

Policy

The Shocking Revelation: When Alameda Research Borrowed More Than Just a Cup of Sugar from FTX

Exclusive Leaked Audio from Alameda Research Meeting Exposes Caroline Ellison's Disclosure of Misuse of FTX Deposits ...

Blockchain

We sorted out 40 "running road" cryptocurrency exchanges, all of which share these common routines

Article | Interchain Pulse · Liangshan Huarong On February 23, the ZG exchange was exposed as suspected to be ru...

Blockchain

FTX shatters Taylor Swift's crypto dream, $100 million collaboration also falls through.

FTX shatters Taylor Swift's Crypto dream, $100 million collaboration falls through. Blocking, former founder SBF is n...