Equations for Key Processes
Last updated
Last updated
Here are key equations that explain the underlying processes of KYC, authentication, encryption, risk management, and transaction throughput.
The risk score is a weighted sum of risk factors:
Where:
are the weights for each factor.
re the risk scores for each category.
The probability of successful authentication:
Where:
Encryption and decryption processes:
Where:
E is the encryption algorithm, D is the decryption algorithm.
K is the symmetric key, P is the plaintext, and C is the ciphertext.
Where:
Risk Management in Trading:
The expected value E of a trade:
Where:
Where:
H is the hash function (e.g., SHA-256),
N is the nonce value.
System throughput TPS :
Where:
N_{\text{transactions}} \ is the number of transactions,
T_{\text{time}} \ is the time taken to process them.
This document represents a comprehensive guide on how GCB implements its technical architecture, security protocols, and regulatory strategies, including critical equations to explain the system’s key processes.
is the probability of correct password entry.
is the probability of valid MFA token entry.
is the probability of successful biometric verification.
The time to process a transaction:
is the time to validate the transaction.
is the time for block confirmation.
is the probability of gain, is the value of the gain.
is the probability of loss, is the value of the loss.
The hash of a block :
is the block data,