Functions, Hash Functions, Cryptography - Discussion

Peeter,
It is all explain in the Popular Links listed at the top of this page. Start at the 16 minute mark of this link https://youtu.be/GT6AuURD8Y0
Private key and randomly generated number are fed into a starting point on a graph. The math is done at points on a graph along an eliptic curve. The calculation method is called eliptic curve cryptography. Very sophisticated math process. It also explains the digital signature which links the private key and the public key together, without revealing personal info or private key info. It also explains how the public key cannot be reverse calculated to determine the private key.
I see that ziomanzo answer answered just above me. We are talking about the same thing and the same video link.

It depends on the algorithm that this particular wallet is using. Some algorithms use movement of the mouse to create entropy.
Check out:

https://www.bitaddress.org

  1. If you want to know how a certain wallet creates the keys, check on their github, because it’s mostly open-source.

  2. You seem to understand it very well.

  3. It uses digital signatures, so you don’t have to reveil your private key to proof that this particular digital signature with this message belongs to your private key.

What are Bitcoin Digital signatures?

Asymmetric Encryption (Easy explained)

Andreas antonopolis Explaining important terminology

2 Likes

Yes it is! hash all the way

1 Like

Hi peeps…I have a question about the hash function. if some people make exactly the same password does that give the same result in sha 256 hash result?

1 Like

well the same information gives the same hash output but if its mixed with the username it will give a completely different output. Does that address your question?

2 Likes

hi LeCorb thanx for replying… i found out myself already after posting this message :wink: but thanks anyway

1 Like

No problem. Glad to help :slightly_smiling_face:

1 Like

Looking forward to this next group of lectures.

1 Like

Hi all,

I am looking forward to get more familiarized with these concepts and to get involved in something more practical like programming.

Best wishes

1 Like

Can Someone give another example of what we can program with SCRIPT on the Bitcoin blockchain.

So we have the example that 2 keys are needed to spend a btc for example. And that this is a good thing in case you have two CEO’s in one company.

Is there something else to do with script?

1 Like

You will learn about this in Bitcoin programming course. How you lock batches of bitcoin with a locking script, and how the owner of an utxo can unlock this to be able to spend a batch of bitcoin that is locked. You need the script stack programing language to verify this

2 Likes

I wished Ivan could list dapps. I know Funfair casino dapp. Cryptokitten I guess. I understand how I can build an iPhone app for example, but a blockchain app? What is the best use of blockchain in an app. A casino is perfect, a social network? Why?

i cant reply things i dont now just learnt funtion im new in this

What will happen to the SHA-256 when quantum computing becomes mainstream? Is there a possbility that SHA-256 is not secure enough anymore?

Hey @ivan,
in the video Hash Functions you are saying there are only 9 digits in our system. From 0-9 we have ten and not nine digits :smiley:

1 Like

If you need some help, tag me. I can always help you out in a chatroom or discord voice channel.

Greatings,
I am a student like you, but because this question comes up from many people who are at the begining i have tried to research it as much as possible and hope to give you a good answer too. SHA-256 is actually the cryptography that even the military uses and many cryptographical systems. We also have SHA-512 which is better but it’s useless at this time, because the best todays computer would need over 50-100 years if not more to crack SHA256 cryptography, so no point to even try. You can read some things here https://en.wikipedia.org/wiki/SHA-2 .
So to come to the theoretical quantum computing which google assumed to have made! and to be honest only IBM has shown some potential in it. If you see the quantum computer of IBM you will maybe remember the first generation of computers in the 70s and the biggest problem is that you need much energy to cool down the procesors of this computers, because if they are not in - Celsius they will burn from the heat. A good resourse: https://en.wikipedia.org/wiki/Quantum_computing Also to come to the point of having in mainstream quantum computers we need at least 30-50 years if not more, because at this time a quantum computer can’t even work as a normal computer and they can only be programed to do very specific computetions and very specific solving of problems you give them. Also don’t forget that if we have mainstream QComputers we will have SHA-256 calculated by them and if it can break we have SHA-512 to go over. Make a Hash with 256 and hash it once more in 512. No way a computer will find it, because don’t forget that there is no algorithmic or logic in producing the hash, it is actually random numbers produced by the input the producer of the hash knows. That’s also why we say that only the real Nakamoto knows how the hash in Bitcoin started because only he knows what is written in the genesis block. If somebody breaks one block we have to start worry but if somebody cracks the genesis block he will open the “pandoras box” :upside_down_face: :sunglasses: I hope i have answered as correct and clear as it could be :slight_smile:

7 Likes

Hi.
I found this category useful and propedeutic for the next lectures
but when the reading on hashing was proposed I was confused by the difficulty of the text https://blockgeeks.com/guides/what-is-hashing/
It speaks about concepts neither requested by the relative homework…

1 Like

Not sure I am clear but a hash is the confirmation of receipt of intent, the reply a of confirmation of the receipt of this intent is
also a hash.Once the hash(es) has been accepted the transaction is complete and non reversible.

I’m sorry but I don’t understand what you mean