The concept of Hash - الحج و العمره

The concept of Hash

October 14, 2018
The concept of Hash

The concept of Hash is fragile
To go back to the traditional account, the accountant usually has the accountant who is responsible for it, so no one can tamper with it. But with the creation of this account book (the series of blocks) spread on the Internet and accessible to all, how can we ensure that it is not manipulated? How can we ensure that there is no forgery?
Well, it's simple, all we need is an algorithm. This program takes each block on its own, performs some calculations, generates a unique value for this block and only this block.
Each time you get a block, you get this block with its own Hash, Block intervention to the program gives you a Hash, comparing the Hash created by the program with the Hash that came with the block, if there is a match Balbulk intact and unrated.
Any manipulation of the block will give a new hash no matter how simple this manipulation is, and it will be easily discovered. This cache is generated by three things:
- Block contents to ensure that any modification in the block will be discovered because it will not match with Hash.
- Hash for the previous block: Remember that the book of accounts is a series, blocks are a series of blocks, each Hash depends on the value also on the value of the Hash of the previous block, the goal of this process is that any fraud in the block will make the Hash is not true, Therefore, the block for the following block is invalid (since the next block is generated by the current block), and therefore the third is not correct. Thus, if any tampering or tampering with the block is detected when examining any Hash, whether the block has been manipulated The following blocks are broken down by the counterfeit blocks.
- The third point is nonce which I will talk about in the next paragraph.


The concept of nonce:


So far we have known that the block chain is a record representing business transactions. This record is protected from fraud by al-Hash. This is generated by relying on three things (the block - the former block - nonce), but what is this nonce and what is the use of it in generating Al Hashim?
In fact, there is something that I did not mention in the previous paragraphs about al-Hashim. According to the laws of al-takhtin, this hash must have a specific formula, for example every hush must begin with 00000110. This law can not be accepted as any outside of this law.
But wait a little. You tell me that Hash has a certain formula, but it is not acceptable, but what can I do if the algorithm generates an incompatible hash? The algorithm can not be changed, and the block can not be changed because it will be considered fraud. , How do you want me to give you a hush in a certain format and i can not change something ????
Well, this is the primary purpose of the nonce, each time you generate the Hash you change the nonce so that you get a Hash compliant with the rules of Genesis, so that the process is complete:The concept of Hash is fragile
To go back to the traditional account, the accountant usually has the accountant who is responsible for it, so no one can tamper with it. But with the creation of this account book (the series of blocks) spread on the Internet and accessible to all, how can we ensure that it is not manipulated? How can we ensure that there is no forgery?
Well, it's simple, all we need is an algorithm. This program takes each block on its own, performs some calculations, generates a unique value for this block and only this block.
Each time you get a block, you get this block with its own Hash, Block intervention to the program gives you a Hash, comparing the Hash created by the program with the Hash that came with the block, if there is a match Balbulk intact and unrated.
Any manipulation of the block will give a new hash no matter how simple this manipulation is, and it will be easily discovered. This cache is generated by three things:
- Block contents to ensure that any modification in the block will be discovered because it will not match with Hash.
- Hash for the previous block: Remember that the book of accounts is a series, blocks are a series of blocks, each Hash depends on the value also on the value of the Hash of the previous block, the goal of this process is that any fraud in the block will make the Hash is not true, Therefore, the block for the following block is invalid (since the next block is generated by the current block), and therefore the third is not correct. Thus, if any tampering or tampering with the block is detected when examining any Hash, whether the block has been manipulated The following blocks are broken down by the counterfeit blocks.
- The third point is nonce which I will talk about in the next paragraph.


The concept of nonce:


So far we have known that the block chain is a record representing business transactions. This record is protected from fraud by al-Hash. This is generated by relying on three things (the block - the former block - nonce), but what is this nonce and what is the use of it in generating Al Hashim?
In fact, there is something that I did not mention in the previous paragraphs about al-Hashim. According to the laws of al-takhtin, this hash must have a specific formula, for example every hush must begin with 00000110. This law can not be accepted as any outside of this law.
But wait a little. You tell me that Hash has a certain formula, but it is not acceptable, but what can I do if the algorithm generates an incompatible hash? The algorithm can not be changed, and the block can not be changed because it will be considered fraud. , How do you want me to give you a hush in a certain format and i can not change something ????
Well, this is the primary purpose of the nonce, each time you generate the Hash you change the nonce so that you get a Hash compliant with the rules of Genesis, so that the process is complete:The concept of Hash is fragile
To go back to the traditional account, the accountant usually has the accountant who is responsible for it, so no one can tamper with it. But with the creation of this account book (the series of blocks) spread on the Internet and accessible to all, how can we ensure that it is not manipulated? How can we ensure that there is no forgery?
Well, it's simple, all we need is an algorithm. This program takes each block on its own, performs some calculations, generates a unique value for this block and only this block.
Each time you get a block, you get this block with its own Hash, Block intervention to the program gives you a Hash, comparing the Hash created by the program with the Hash that came with the block, if there is a match Balbulk intact and unrated.
Any manipulation of the block will give a new hash no matter how simple this manipulation is, and it will be easily discovered. This cache is generated by three things:
- Block contents to ensure that any modification in the block will be discovered because it will not match with Hash.
- Hash for the previous block: Remember that the book of accounts is a series, blocks are a series of blocks, each Hash depends on the value also on the value of the Hash of the previous block, the goal of this process is that any fraud in the block will make the Hash is not true, Therefore, the block for the following block is invalid (since the next block is generated by the current block), and therefore the third is not correct. Thus, if any tampering or tampering with the block is detected when examining any Hash, whether the block has been manipulated The following blocks are broken down by the counterfeit blocks.
- The third point is nonce which I will talk about in the next paragraph.


The concept of nonce:


So far we have known that the block chain is a record representing business transactions. This record is protected from fraud by al-Hash. This is generated by relying on three things (the block - the former block - nonce), but what is this nonce and what is the use of it in generating Al Hashim?
In fact, there is something that I did not mention in the previous paragraphs about al-Hashim. According to the laws of al-takhtin, this hash must have a specific formula, for example every hush must begin with 00000110. This law can not be accepted as any outside of this law.
But wait a little. You tell me that Hash has a certain formula, but it is not acceptable, but what can I do if the algorithm generates an incompatible hash? The algorithm can not be changed, and the block can not be changed because it will be considered fraud. , How do you want me to give you a hush in a certain format and i can not change something ????
Well, this is the primary purpose of the nonce, each time you generate the Hash you change the nonce so that you get a Hash compliant with the rules of Genesis, so that the process is complete:

3 comments:

  1. hi hghgfugviufgf biuygyguyr-th_yhy bçi_yuobn

    ReplyDelete
  2. احب انيك معاك يا حلوة

    ReplyDelete
  3. I want to have sex with you I am a fares from Algeria

    ReplyDelete

Powered by Blogger.