BTC public key
1. The mail cabinet is stolen (the database is stolen)
2. The key is stolen (the private key is stolen)
3. Knowing my home address (the public key is stolen), the lock of the mail cabinet is opened violently (the private key is cracked violently).
only the private key can decrypt the content encrypted by the private key
only the public key can decrypt the content encrypted by the private key
here, the public key is your bitcoin ID, and the private key is your wallet
when using bitcoin, you should take care of your wallet, and you'd better encrypt it with a password, You can use your bitcoin
there are many bitcoin trading platforms on the Internet, and you can find a lot of them by Google search
generally, you need to mine bitcoin, and there are also mining platforms on the Internet, but now the income is low, and the display card is burned
How are bitcoin addresses and private keys generated? Bitcoin uses elliptic curve algorithm to generate public key and private key, and chooses secp256k1 curve. The generated public key is a 33 byte large number, and the private key is a 32 byte large number. The wallet file wallet.dat directly stores the public key and private key. The bitcoin address we use when receiving and sending bitcoin is obtained after the public key is processed by the algorithm. The specific process is that the public key is first processed by SHA-256 algorithm to get 32 byte hash result, then processed by ripemed algorithm to get 20 byte summary result, and then the address we see is obtained through the character conversion process. This character conversion process is the same as that of the private key. The steps are as follows: first, add the version number to the input content (the summary result of 20 bytes for the public key and the large number of 32 bytes for the private key). After two successive SHA-256 algorithms, take the first 4 bytes of the hash result of the last time as the check code and attach it to the back of the input content, and then encode it with base58, Get the string{ RRRRR}
1. The mail cabinet is stolen (the database is stolen)
2. The key is stolen (the private key is stolen)
3. Knowing my home address (the public key is stolen), the mail cabinet lock is opened violently (the private key is cracked violently).
1. Who benefits the most from researching and hyping bitcoin
2. In essence, it's USA's Intel, NVIDIA, amd + ATI
3. Bitcoin requires a huge amount of CPU, GPU, memory, motherboard, power supply, wire and venue
4. Since the speculation of bitcoin, the sales of CPU, GPU, memory, motherboard, power supply and wire are the highest
5. It's the CPU and GPU instry of USA that really make a big profit, while the retail and service of other countries are just middlemen making a difference
6. The plan to hype bitcoin: it boosts the high-end, core and basic chip instry capacity of USA. other countries are compradors
7. Harm: lose the ability to develop domestic high-end, core and basic chips, and become a retailer that can only sell chips for USA.
There is no limit on the total amount of use, but there is a limit in theory. It depends on the number of public key digits. A simple high school permutation can calculate the number (an astronomical number); A public key is a very good random number generator. Under the restriction of long enough public key, it is impossible to have plicate public key in theory
the following is the calculation comparison of different length keys in intercepted professional books