Written by students who passed Immediately available after payment Read online or as PDF Wrong document? Swap it for free 4.6 TrustPilot
logo-home
Summary

Summary Self studying Notes for Blockchain Technology( Beginner & Intermediate)

Rating
-
Sold
1
Pages
20
Uploaded on
28-02-2023
Written in
2022/2023

Self studying Notes for Blockchain Technology( Beginner & Intermediate)

Institution
Course

Content preview

Self studying Notes
for Blockchain
Technology(
Beginner &
Intermediate)

,Introduction to Blockchain – II (History)
We will look into the historical perspective of blockchain and how this concept
of blockchain evolved over time and utilised in to different applications. The
concept is cryptographically secured hash function. This kind of hash function is
used widely in cryptographic context and then we call this kind of. hash function
they have another important property called avalanche effect. The avalanche
property of this cryptographically secured hash function is as follows , say given
an input whenever you are computing the digest , if you make some little
change in the digest you will see a significant change in that digest. This
particular effect in cryptographically secure hash function it is known as

, avalanche effect. It ensures that just by looking into the digest it is nearly
impossible to guess what was the input. Harber and Stornetta have used this
concept of chain of blocks to solve this particular problem. They have taken a
parameters like ah the initial number the initial say in what order the people
have accessed. So , it has started from 0 1 2 3 , then ah ah corresponding ah
change value the ah constructs.

The concept of chain of blocks by connecting them by the hash function that
was used to cryptographically securing the timestamp value of a digital
document. So , this particular architecture looks like something similar to
blockchain where you have multiple blocks of data and this blocks are
connected by a hash value. That way this individual hash values are helping to
connect the blocks one after another and making the block as tamper proof.
That was the first use of this concept of the chain of. the markle tree. The
concept of merkle tree was actually used in 1992 by extending the work where
the earlier people in 1991 they have developed a chain kidd of architecture to
secure the time stamp values in a digital document. The root value if there is any
change in any one of these 4 documents , then that change will get reflected in
the root value. Another use full of the concept is the implementation of th e
Bitcoin. Bitcoin worked as the foundation behind ah this white spilt popularity of
blockchain concept. Bitcoin is completely decentralised where no central
authority like a bank or a government will have control over the currency. The
current Bitcoin price I have just recorded itin on 15th March 2018 at 10 p m and
the value is fluctuating significantly over days. Bitcoin is used as a cross country
untraceable currency because there is no government control or the centralised
control.

Bitcoin price increased that it reached on around 20,000 dollar in the earlier of in
the last of last year and first month of this year and then right now , we are just
observing deep in the price. So , if you look into the blockchain size or
blockchain worked as the backbone of this Bitcoin architecture. So, ah the size of
the blockchain is actually growing exponentially. So , this is an example Bitcoin
wallet. So , Alice gives the address of Bob here and then provides the money to
transfer and then he press the send button. Then the wallet ah it constructs ah
the transaction. Then it signs the transaction made by Alice and broadcast it
over the network. So, this network node they validate the transaction based on
the existing blockchain. Now that is another interesting fact about blockchain.
The miners they construct a new block and tries to connect it with the existing
blockchain through some kind of cryptographic hash computation. So , in a
blockchain concept as I have mentioned earlier that every block is connected to
the next block through some cryptographic hash function say this is B 1 and B 2.
So, this hash problem which is given to the miners is a computationally difficult
problem and that computation is difficult problem every miner needs to solve.

Written for

Course

Document information

Uploaded on
February 28, 2023
Number of pages
20
Written in
2022/2023
Type
SUMMARY

Subjects

$9.09
Get access to the full document:

Wrong document? Swap it for free Within 14 days of purchase and before downloading, you can choose a different document. You can simply spend the amount again.
Written by students who passed
Immediately available after payment
Read online or as PDF

Get to know the seller
Seller avatar
nisargathape

Get to know the seller

Seller avatar
nisargathape Freelancer
Follow You need to be logged in order to follow users or courses
Sold
1
Member since
3 year
Number of followers
0
Documents
1
Last sold
3 year ago

0.0

0 reviews

5
0
4
0
3
0
2
0
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Working on your references?

Create accurate citations in APA, MLA and Harvard with our free citation generator.

Working on your references?

Frequently asked questions