Position: Home page » Currency » Digital currency resistance attack

Digital currency resistance attack

Publish: 2021-05-25 05:03:02
1.

Yin Zhentao, deputy director of the law and Finance Research Office of the Financial Research Institute of the Chinese Academy of Social Sciences, said that digital currency faces two risks. The first is the technical level. Digital currency relies on blockchain technology and a system, which will make it suffer from security impact, such as hacker attacks on computer systems. We have seen many practical problems in this process

Zhao Zhanzhan, a special researcher of intellectual property research center of China University of political science and law, believes that digital currency has anonymity, quickness and irrevocability. In addition, bitcoin and other digital currencies have high circulation in the world, so many criminals use digital currency as a new money laundering channel. Moreover, there are many different ways to realize money laundering through digital currency. Generally speaking, the probability of new money laundering being found and investigated is lower than before. Many countries have no effective means and technology to combat money laundering through digital currency. These factors lead to criminals prefer this way of money laundering

2. One of the key technologies of digital currency is elliptic curve encryption, which is the core technology of digital signature of cryptocurrency. It can ensure the ownership, non plication and transaction integrity of cryptocurrency. But with the advent of quantum computers, it will no longer be secure. The quantum attack of quantum computer can solve the underlying mathematical problems, and the digital signature based on elliptic curve encryption can be forged. This is fatal for cryptocurrency, because the records of distributed ledger can not be tampered with and reversed. If elliptic curve encryption can be broken, then the security foundation of cryptocurrency will no longer exist.
3. Most of the existing cryptocurrencies use elliptic curve cryptography, and elliptic curve cryptography may be cracked by quantum computer in 5-10 years. In order to resist quantum attack, Abe / ABI upgraded the existing encryption algorithm, and upgraded elliptic curve cryptography to lattice cryptography. Abe proposes lattice based linkable ring signature, and lattice based cryptography is one of the most effective methods against quantum computing attacks..
4. The following is for reference only:
very large
in the field of blockchain and virtual currency, such cases of losses caused by the security of exchanges occur frequently, causing great economic losses to users. The security experts of Juhui ggfx also gave a hint: there are still many loopholes in the current digital currency trading platform, for example, the most common are the following six kinds:
the first kind: denial of service attack
denial of service attack is the most important attack against the digital currency trading platform at present. Through denial of service attack, the attacker makes the trading platform unable to access normally, Because users can not accurately distinguish the degree of attack, it often causes panic asset transfer, which brings some loss
the second kind: phishing
even the best technical measures at present can not make the digital currency trading platform avoid phishing attacks. Some hackers and outlaws can confuse digital currency investors by means of fake domain names or fake pages, while ordinary investors can't identify the authenticity, so it's easy to cause asset losses
the third: Hot wallet protection
many digital currency trading platforms use a single private key to protect the hot wallet. If hackers can access a single private key, they can crack the hot wallet related to the private key. For example, in the attack on yapizon of Seoul stock exchange in 2017, the attackers stole hot wallets from the trading platform twice in a year, resulting in a total loss of nearly 50% of the assets of the trading platform and eventually leading to the bankruptcy of the trading platform
Fourth: internal attack
e to the lack of perfect risk isolation measures or ineffective supervision on the authority of employees, the digital currency trading platform also has employees' self-monitoring and stealing, and some employees with operating authority of the platform use internal trust to seek ill gotten gains for themselves. For example, in 2016, the event of employees stealing bitcoin on shapeshift caused a total loss of US $230000 to the trading platform by stealing and reselling sensitive information to others
the fifth: software vulnerability
the software vulnerability of digital currency trading platform includes single sign on vulnerability, OAuth protocol vulnerability, etc. At present, all countries have laws requiring banks or other financial institutions to implement information security measures to protect customers' deposits. However, e to the fact that the blockchain field is still in its infancy, there is a lack of such specifications for encrypting digital assets. Therefore, it is not accidental that many trading platforms have a large number of loopholes in the absence of security constraints
sixth: transaction malleability
Technical supporters of blockchain often think that blockchain transactions are highly secure because they are recorded on records that are said to be unchangeable, but each transaction needs to have a corresponding signature, and the records can be temporarily forged before the final confirmation of the transaction. Mt. GOx, which once accounted for 80% of the world's total transactions, was hacked to submit code changes to the public ledger before the initial transaction was released, resulting in a loss of 473 million US dollars< br /> &# 160;
5. The reason for the speculation of virtual currency is that it emphasizes that it has more "advantages" than traditional currencies, that is, US dollar, RMB, Japanese currency and euro. First of all, bitcoin is a kind of decentralized currency. There is no central bank to control the issuance. It is controlled by a precise computer system to achieve a stable issuance speed and a definite limited amount. It is claimed that anyone can participate in the proction. These "advantages" can be summed up as anti inflation, that is, the currency of the holder will not depreciate. If 10 bitcoin can buy a bicycle one year ago, then 10 bitcoin can still buy a bicycle one year later - sounds very attractive
although there are all kinds of new gimmicks behind bitcoin, they all adhere to the design features of bitcoin, such as decentralization, and take "anti inflation" as an important advantage. Virtual currency is not recommended
6. In fact, it's very simple. Using a kushenleng wallet to store digital currency can prevent hacker attacks. Its private key is completely not connected to the Internet, so its security is very high.
7.

With the advent of digital currency, the encryption algorithm of currency is becoming more and more important. What are the types of passwords

classical cipher types mainly include transposition cipher and rearrangement of alphabetic order messages. For example, "Hello world" becomes "ehlol owrdl"

Diffie Hellman and RSA algorithms have been widely used except for the first public example of high quality public key algorithms. Other asymmetric key algorithms include Cramer schup cryptosystem, ElGamal encryption and various elliptic curve techniques

some well-known cryptosystems include RSA encryption, Schnorr Signature, El Gamal encryption, PGP and so on. More complex password systems include e-cash system, signcryption system, etc. Now more cryptosystems include interactive proof systems, such as zero knowledge proof, which is used for secret sharing

for a long time, information collection and law enforcement agencies have been interested in cryptography. The importance of secret communication is self-evident. Because cryptography promotes privacy protection, it also attracts great interest of cryptography supporters. Therefore, there is a history of controversial legal issues around cryptography, especially since the emergence of cheap computers makes it possible to widely use high-quality cryptography

nowadays, cryptocurrency transactions are semi anonymous, which makes them very suitable for a series of illegal activities, such as money laundering and tax evasion. However, the proponents of cryptocurrency often attach great importance to the anonymity of digital currency and think that it can protect the privacy of users. Some cryptocurrencies are more private than others

Cryptocurrency is a new type of digital asset, which is based on the network distributed on a large number of computers. This decentralized structure enables them to exist outside the control of the government and central authorities. The term "cryptocurrency" also comes from the encryption technology used to protect the network

blockchain is an organization method to ensure the integrity of digital currency transaction data, and it is an important part of many cryptocurrencies. Many experts believe that blockchain and related technologies will subvert many instries, including finance and law. Cryptocurrencies have been criticized for many reasons, including their use for illegal activities, exchange rate fluctuations and the vulnerability of the infrastructure that underpins them. However, digital currency is also praised for its portability, divisibility, anti inflation and transparency

8. You can use procts such as kushenleng wallet to store digital currency, and use the two-dimensional code communication mode, which will not touch the network, so as to prevent hacker attacks.
9. Register an account on Maya's official website and make a risk assessment. If it passes, recharge the account and you can buy it directly.
Hot content
Inn digger Publish: 2021-05-29 20:04:36 Views: 341
Purchase of virtual currency in trust contract dispute Publish: 2021-05-29 20:04:33 Views: 942
Blockchain trust machine Publish: 2021-05-29 20:04:26 Views: 720
Brief introduction of ant mine Publish: 2021-05-29 20:04:25 Views: 848
Will digital currency open in November Publish: 2021-05-29 19:56:16 Views: 861
Global digital currency asset exchange Publish: 2021-05-29 19:54:29 Views: 603
Mining chip machine S11 Publish: 2021-05-29 19:54:26 Views: 945
Ethereum algorithm Sha3 Publish: 2021-05-29 19:52:40 Views: 643
Talking about blockchain is not reliable Publish: 2021-05-29 19:52:26 Views: 754
Mining machine node query Publish: 2021-05-29 19:36:37 Views: 750