Peeter,
It is all explain in the Popular Links listed at the top of this page. Start at the 16 minute mark of this link https://youtu.be/GT6AuURD8Y0
Private key and randomly generated number are fed into a starting point on a graph. The math is done at points on a graph along an eliptic curve. The calculation method is called eliptic curve cryptography. Very sophisticated math process. It also explains the digital signature which links the private key and the public key together, without revealing personal info or private key info. It also explains how the public key cannot be reverse calculated to determine the private key.
I see that ziomanzo answer answered just above me. We are talking about the same thing and the same video link.
It depends on the algorithm that this particular wallet is using. Some algorithms use movement of the mouse to create entropy.
Check out:
-
If you want to know how a certain wallet creates the keys, check on their github, because itâs mostly open-source.
-
You seem to understand it very well.
-
It uses digital signatures, so you donât have to reveil your private key to proof that this particular digital signature with this message belongs to your private key.
What are Bitcoin Digital signatures?
Asymmetric Encryption (Easy explained)
Yes it is! hash all the way
Hi peepsâŚI have a question about the hash function. if some people make exactly the same password does that give the same result in sha 256 hash result?
well the same information gives the same hash output but if its mixed with the username it will give a completely different output. Does that address your question?
hi LeCorb thanx for replying⌠i found out myself already after posting this message but thanks anyway
No problem. Glad to help
Looking forward to this next group of lectures.
Hi all,
I am looking forward to get more familiarized with these concepts and to get involved in something more practical like programming.
Best wishes
Can Someone give another example of what we can program with SCRIPT on the Bitcoin blockchain.
So we have the example that 2 keys are needed to spend a btc for example. And that this is a good thing in case you have two CEOâs in one company.
Is there something else to do with script?
You will learn about this in Bitcoin programming course. How you lock batches of bitcoin with a locking script, and how the owner of an utxo can unlock this to be able to spend a batch of bitcoin that is locked. You need the script stack programing language to verify this
I wished Ivan could list dapps. I know Funfair casino dapp. Cryptokitten I guess. I understand how I can build an iPhone app for example, but a blockchain app? What is the best use of blockchain in an app. A casino is perfect, a social network? Why?
i cant reply things i dont now just learnt funtion im new in this
What will happen to the SHA-256 when quantum computing becomes mainstream? Is there a possbility that SHA-256 is not secure enough anymore?
Hey @ivan,
in the video Hash Functions you are saying there are only 9 digits in our system. From 0-9 we have ten and not nine digits
If you need some help, tag me. I can always help you out in a chatroom or discord voice channel.
Greatings,
I am a student like you, but because this question comes up from many people who are at the begining i have tried to research it as much as possible and hope to give you a good answer too. SHA-256 is actually the cryptography that even the military uses and many cryptographical systems. We also have SHA-512 which is better but itâs useless at this time, because the best todays computer would need over 50-100 years if not more to crack SHA256 cryptography, so no point to even try. You can read some things here https://en.wikipedia.org/wiki/SHA-2 .
So to come to the theoretical quantum computing which google assumed to have made! and to be honest only IBM has shown some potential in it. If you see the quantum computer of IBM you will maybe remember the first generation of computers in the 70s and the biggest problem is that you need much energy to cool down the procesors of this computers, because if they are not in - Celsius they will burn from the heat. A good resourse: https://en.wikipedia.org/wiki/Quantum_computing Also to come to the point of having in mainstream quantum computers we need at least 30-50 years if not more, because at this time a quantum computer canât even work as a normal computer and they can only be programed to do very specific computetions and very specific solving of problems you give them. Also donât forget that if we have mainstream QComputers we will have SHA-256 calculated by them and if it can break we have SHA-512 to go over. Make a Hash with 256 and hash it once more in 512. No way a computer will find it, because donât forget that there is no algorithmic or logic in producing the hash, it is actually random numbers produced by the input the producer of the hash knows. Thatâs also why we say that only the real Nakamoto knows how the hash in Bitcoin started because only he knows what is written in the genesis block. If somebody breaks one block we have to start worry but if somebody cracks the genesis block he will open the âpandoras boxâ I hope i have answered as correct and clear as it could be
Hi.
I found this category useful and propedeutic for the next lectures
but when the reading on hashing was proposed I was confused by the difficulty of the text https://blockgeeks.com/guides/what-is-hashing/
It speaks about concepts neither requested by the relative homeworkâŚ
Not sure I am clear but a hash is the confirmation of receipt of intent, the reply a of confirmation of the receipt of this intent is
also a hash.Once the hash(es) has been accepted the transaction is complete and non reversible.
Iâm sorry but I donât understand what you mean