4. Symmetric Algorithms
Single key used for encryption and decryption
●Block algorithms
●Stream algorithms
●Why do we need something better?
5. Asymmetric Algorithms
Different keys for encryption and decryption
●Public and private keys
●Confidentiality
●Digital signature
●“Man in the middle” attack
6. RSA
Encryption●Fast to encrypt, slow to decrypt
●“Trapdoor” Ф(n)=(P-1)(Q-1)
●Complexity of prime factorization
●d=(k*Ф(n)+1)/e
c=mᵉ mod n
m=cᵈ mod n
Ex: P=1181 Q=2683⇒ n=3168623,
Ф(n)=3164760
Ф(n)=2*2*2*3*3*5*59*149
7. Hash functions
●Outputs the value of fixed
length
●Hash collision
●Secure Hash Algorithm (SHA)
●SHA-256 (SHA-2)
9. What are distributed systems?
●A distributed system represents a system of multiple nodes (computers) that
communicate and coordinate actions in order to appear as a single coherent system to
the end-user.
●Examples: Google, Dropbox, Email servers, Cloud computing, Banking systems, Massive
multiplayer online video games, Telephone networks, Sensor networks, IoT...
11. Peer to Peer Networks
●Distributed
●All nodes have equal power and perform the same task.
●There is no “server” and hierarchy within the network.
●The core of bitcoin.
●Why do we use it in blockchain?
●Security