|
|
|
|
|
|
|
|
|
Satoshi nakamoto
Глоссарий по криптовалютам и блокчейну |
Is a person or group of people who created the bitcoin protocol and reference software, bitcoin core (formerly known as bitcoin-qt). in 2008, nakamoto published a paper on the cryptography mailing list at metzdowd.com describing the bitcoin digital currency. in 2009, they released the first bitcoin software that launched the network and the first units of the bitcoin cryptocurrency, called bitcoins
|
|
Satoshi, английский
The smallest unit of bitcoin, equal to 0.00000001 btc
Cryptography, английский
- The art of protecting information by transforming it (encrypting it) into an unreadable format, called cipher text.
- The science of turning plain language into unintelligible text for secrecy and security. typically the development of codes or ciphers.
- Криптография
- The study or analysis of codes and encoding methods used to secure information. cryptography is used to provide confidentiality, data integrity, authentication (entity and data origin), and nonrepudiation.
Cryptocurrency, английский
A form of digital currency based on mathematics, where encryption techniques are used to regulate the generation of units of currency and verify the transfer of funds. furthermore, cryptocurrencies operate independently of a central bank.
|
Hashcash, английский
Is a proof-of-work system used to limit email spam and denial-of-service attacks, and more recently has become known for its use in bitcoin (and other cryptocurrencies) as part of the mining algorithm. hashcash was proposed in may 1997 by adam back
Sha (secure hash algorithm), английский
Is a family of cryptographic hash functions published by the national institute of standards and technology (nist) as a u.s. federal information processing standard (fips). sha256 is an algorithm used in bitcoin that takes an input of any size which can be any form of data(text, jpeg, pdf, etc.), mixes it up and creates a fixed size output(a hash) which is 256-bit (32-byte) long . you can think of the hash as the fingerprint of the data. hashes are one-way functions – they cannot be decrypted back. the only way to decrypt a hash is by brute forcing it. brute force means to systematically try all the combinations for an input. brute force attack will always find the input, no matter its complexity. the downside is whether or not you will still be alive when it finally guesses it
|
|
|
|
|
|
|