Official account: BSN Institute
Blockchain is an integrated innovation of multiple computer technologies. Among these sources, the most important one is asymmetric encryption technology.
We know that the transaction information stored on the blockchain is public, but the account identity information is highly encrypted and can only be accessed with the authorization of the data owner, thus ensuring the data security and personal privacy. The reason why blockchain can achieve such a function is that it uses asymmetric encryption technology.
Unlike symmetric encryption algorithms, asymmetric encryption algorithms require two keys: a publickey and a privatekey. The public key and the private key are a pair. If the public key is used to encrypt the data, only the corresponding private key can be used to decrypt; If the data is encrypted with a private key, it can only be decrypted with the corresponding public key. Because encryption and decryption use two different keys, this algorithm is called asymmetric encryption algorithm.
The process of data encryption and decryption is controlled by cryptosystem and key. The security of the cryptosystem depends on the security of the key. Modern cryptography does not pursue the confidentiality of the encryption algorithm, but the completeness of the encryption algorithm, that is, the attacker cannot find a breakthrough from the algorithm without knowing the key. According to whether the keys used in the encryption and decryption algorithm are the same, or whether the solution (encryption) key can be simply obtained from the encryption (decryption) key. Cryptosystems can be divided into symmetric cryptosystems and asymmetric cryptosystems.