Position: Home page » Pool » Parameters of Shenma M33 miner

Parameters of Shenma M33 miner

Publish: 2021-05-27 08:40:52
1.

MD5 SHA1 sha256 these three kinds of essence are summary function, their length MD5 is 128 bits, SHA1 is 160 bits, sha256 is 256 bits

MD5 processes the input information in 512 bit packets, and each packet is divided into 16 32-bit sub packets. After a series of processing, the output of the algorithm is composed of four 32-bit packets, and a 128 bit hash value will be generated after cascading the four 32-bit packets

for messages less than 2 ^ 64 bits in length, SHA1 generates a 160 bit message digest. When a message is received, the message digest can be used to verify the integrity of the data

The

hash value is used as a unique value representing a fixed size of a large amount of data. A small change in the data can result in an unpredictable large number of changes in the hash value. The hash size of sha256 algorithm is 256 bits

{rrrrrrr}


extended data

the application of MD5 algorithm:

1, consistency verification

MD5 can proce an equally unique "digital fingerprint" for any file (regardless of its size, format and quantity). If anyone makes any changes to the file, Its MD5 value, that is, the corresponding "digital fingerprint", will change

MD5 algorithm is widely used in software download station, forum database, system file security and so on

2. The typical application of digital signature

MD5 is to generate fingerprint on a message (byte string) to prevent it from being "tampered"

for example, you can write a paragraph in a file called readme.txt, generate an MD5 value for the readme.txt and record it. Then you can spread the file to others. If others modify any content in the file, you will find that (the two MD5 values are not the same) when you recalculate MD5 for the file

if there is a third-party certification authority, MD5 can also prevent the "repudiation" of the file author, which is the so-called digital signature application

MD5 is also widely used in the login authentication of operating system, such as UNIX, login password of various BSD systems, digital signature and so on. For example, in UNIX system, the user's password is stored in the file system after hash operation with MD5 (or other similar algorithm)

Hot content
Inn digger Publish: 2021-05-29 20:04:36 Views: 341
Purchase of virtual currency in trust contract dispute Publish: 2021-05-29 20:04:33 Views: 942
Blockchain trust machine Publish: 2021-05-29 20:04:26 Views: 720
Brief introduction of ant mine Publish: 2021-05-29 20:04:25 Views: 848
Will digital currency open in November Publish: 2021-05-29 19:56:16 Views: 861
Global digital currency asset exchange Publish: 2021-05-29 19:54:29 Views: 603
Mining chip machine S11 Publish: 2021-05-29 19:54:26 Views: 945
Ethereum algorithm Sha3 Publish: 2021-05-29 19:52:40 Views: 643
Talking about blockchain is not reliable Publish: 2021-05-29 19:52:26 Views: 754
Mining machine node query Publish: 2021-05-29 19:36:37 Views: 750