SlideShare a Scribd company logo
Gaurav Mishra
<gmishx@gmail.com>
Block Chain
Introduction to blockchain
27-05-2018
Unrestricted
Gaurav Mishra <gmishx@gmail.com>
The bank way of transactions
• Each bank keeps a record of clients
and their respective bank accounts.
• The bank in which you hold your
account will maintain your
transactions (transaction book).
• These transactions are generally not
public.
• In case of any malicious entry, it is
very difficult to find/trace it out.
• The case gets even better in case of
cheque transactions which are
validated only at the end.
27-05-2018
2
Gaurav Mishra <gmishx@gmail.com>
Shortcoming of the bank way
•
• The transactions are not
public
•
• Creates trust issues
•
• Different organizations hold
different transactions
27-05-2018
3
Gaurav Mishra <gmishx@gmail.com>
Replacement of this method
27-05-2018
4
Store a
public
ledger
Anyone can
read/write
Being
public,
anyone can
own a copy
Current
value is a
sum of all
transactions
Open for
malicious
entries
Gaurav Mishra <gmishx@gmail.com>
Securing the ledger
• Any person can hold a copy of the ledger for keeping track of transactions.
• This also opens a way for modification in the ledger.
• The best way of preventing modifications is by using hash.
• Hash is calculated using a sting and applying certain mathematical operations on it
which creates a new digest (fixed length) of the given input.
• A slight modification in the input creates a great change in the digest (avalanche
effect).
• Hashing input are generally combined with another input called salt or nonce to
modify the hash output for a desired result.
• After a certain number of entries, a hash is calculated on the ledger.
• This can prevent modifications in existing ledger.
• https://anders.com/blockchain/hash.html
• Since calculating the digest is a costly operation, the digest is calculated after a
certain entries in the ledger and those entries are called as a block.
• The size of a block is fixed for any operation on the ledger.
• https://anders.com/blockchain/block.html
27-05-2018
5
Gaurav Mishra <gmishx@gmail.com>
Securing the entries
• Calculating hash on the ledger only prevents the modification of it.
• We still need a way to prevent malicious entries in it.
• The public-private keys are popularly used around and can be used to provide
authenticity of a message using digital signatures.
• https://anders.com/blockchain/public-private-keys/keys.html
• Each entry in the ledger is backed with a signature calculated using the private key of
person making the transaction.
• https://anders.com/blockchain/public-private-keys/signatures.html
• This provides the authenticity of the entries in the ledger.
• Thus the final ledger is secured by authenticating the entries and preventing
modifications in the previous entries.
• https://anders.com/blockchain/public-private-keys/blockchain.html
27-05-2018
6
Gaurav Mishra <gmishx@gmail.com>
The blockchain
• The blockchain is a continuous chain of validated blocks.
• Each block holds its block number, its nonce, its data, hash of previous block and its
own hash.
• https://blockchain.info/block/0000000000000000001cca8a0f8925e6b6d542e314
54a3e16bfe1fd7f571b1d0
• Each participant have to provide their public key.
• https://anders.com/blockchain/public-private-keys/blockchain.html
• The digest of the block have some constrain like the first 4 digits of it should be zero
to increase the computational cost of the digest and making it even more difficult to
change.
• The act of calculation of digest of a block is called mining and the person performing
it is called as miner.
• Since the ledger is distributed among several computers, anyone who mine the block
first broadcast the result to others.
• Any ledger having modifications can be matched with others and discarded.
• If a chain is bifurcated, the chain with most work done is retained and the other one
is discarded.
27-05-2018
7
Gaurav Mishra <gmishx@gmail.com>
Strengths of blockchain
You can own your own copy
of ledger
Entries can be authenticated
anytime
Secured using public-private
keys
Completely trust worthy
Public ledger
27-05-2018
8
Gaurav Mishra <gmishx@gmail.com>
27-05-2018
9

More Related Content

Similar to Block Chain - Introduction

Blockchain concepts
Blockchain conceptsBlockchain concepts
Blockchain concepts
Murughan Palaniachari
 
Blockchain (1).pptx
Blockchain (1).pptxBlockchain (1).pptx
Blockchain (1).pptx
MeetPBarasara
 
Blockchain 101
Blockchain 101Blockchain 101
Blockchain 101
Suki Chana
 
Blockchain
BlockchainBlockchain
The Secret behind the Blockchain Technology
The Secret behind the Blockchain TechnologyThe Secret behind the Blockchain Technology
The Secret behind the Blockchain Technology
PECB
 
About Blockchain
About BlockchainAbout Blockchain
About Blockchain
Shourya Tripathi
 
Block chain fundamentals and hyperledger
Block chain fundamentals and hyperledgerBlock chain fundamentals and hyperledger
Block chain fundamentals and hyperledger
sendhilkumarks
 
BlockChain-1.pptx
BlockChain-1.pptxBlockChain-1.pptx
BlockChain-1.pptx
HussainPashaShaik1
 
Blockchain Security and Demonstration
Blockchain Security and DemonstrationBlockchain Security and Demonstration
Blockchain Security and Demonstration
Yao Yao
 
chapter4.pptxwgdyjshcbnbhvegwydvquhcjdvqigufwk
chapter4.pptxwgdyjshcbnbhvegwydvquhcjdvqigufwkchapter4.pptxwgdyjshcbnbhvegwydvquhcjdvqigufwk
chapter4.pptxwgdyjshcbnbhvegwydvquhcjdvqigufwk
NiveditaSingh839848
 
Chapter 2.pptx
Chapter 2.pptxChapter 2.pptx
Chapter 2.pptx
AvinashChoure2
 
Blockchain Fundamental_KIPMI_2022.02.26.pdf
Blockchain Fundamental_KIPMI_2022.02.26.pdfBlockchain Fundamental_KIPMI_2022.02.26.pdf
Blockchain Fundamental_KIPMI_2022.02.26.pdf
adinugroho751867
 
Module-2-Introduction-to-Cryptocurrencies.pdf
Module-2-Introduction-to-Cryptocurrencies.pdfModule-2-Introduction-to-Cryptocurrencies.pdf
Module-2-Introduction-to-Cryptocurrencies.pdf
reddoors14
 
Blockchain and bitcoin fundamentals (usages and applications)
Blockchain and bitcoin fundamentals (usages and applications)Blockchain and bitcoin fundamentals (usages and applications)
Blockchain and bitcoin fundamentals (usages and applications)
Amir Rafati
 
Bitcoins
BitcoinsBitcoins
How Blockchain Can Be Used In Supply Chain Management & How It Works?
How Blockchain Can Be Used In Supply Chain Management & How It Works?How Blockchain Can Be Used In Supply Chain Management & How It Works?
How Blockchain Can Be Used In Supply Chain Management & How It Works?
Blockchain Council
 
BlockChain-1.pptx
BlockChain-1.pptxBlockChain-1.pptx
BlockChain-1.pptx
BiswaranjanSwain19
 
Unbundling Of Financial Services: The Blockchain(s) Revolution
Unbundling Of Financial Services: The Blockchain(s) RevolutionUnbundling Of Financial Services: The Blockchain(s) Revolution
Unbundling Of Financial Services: The Blockchain(s) Revolution
George Samuel Samman
 
Introduction to Blockchain
Introduction to BlockchainIntroduction to Blockchain
Introduction to Blockchain
Sanjeev Mishra
 
Privacy Preservation Issues in Association Rule Mining in Horizontally Partit...
Privacy Preservation Issues in Association Rule Mining in Horizontally Partit...Privacy Preservation Issues in Association Rule Mining in Horizontally Partit...
Privacy Preservation Issues in Association Rule Mining in Horizontally Partit...
Abhra Basak
 

Similar to Block Chain - Introduction (20)

Blockchain concepts
Blockchain conceptsBlockchain concepts
Blockchain concepts
 
Blockchain (1).pptx
Blockchain (1).pptxBlockchain (1).pptx
Blockchain (1).pptx
 
Blockchain 101
Blockchain 101Blockchain 101
Blockchain 101
 
Blockchain
BlockchainBlockchain
Blockchain
 
The Secret behind the Blockchain Technology
The Secret behind the Blockchain TechnologyThe Secret behind the Blockchain Technology
The Secret behind the Blockchain Technology
 
About Blockchain
About BlockchainAbout Blockchain
About Blockchain
 
Block chain fundamentals and hyperledger
Block chain fundamentals and hyperledgerBlock chain fundamentals and hyperledger
Block chain fundamentals and hyperledger
 
BlockChain-1.pptx
BlockChain-1.pptxBlockChain-1.pptx
BlockChain-1.pptx
 
Blockchain Security and Demonstration
Blockchain Security and DemonstrationBlockchain Security and Demonstration
Blockchain Security and Demonstration
 
chapter4.pptxwgdyjshcbnbhvegwydvquhcjdvqigufwk
chapter4.pptxwgdyjshcbnbhvegwydvquhcjdvqigufwkchapter4.pptxwgdyjshcbnbhvegwydvquhcjdvqigufwk
chapter4.pptxwgdyjshcbnbhvegwydvquhcjdvqigufwk
 
Chapter 2.pptx
Chapter 2.pptxChapter 2.pptx
Chapter 2.pptx
 
Blockchain Fundamental_KIPMI_2022.02.26.pdf
Blockchain Fundamental_KIPMI_2022.02.26.pdfBlockchain Fundamental_KIPMI_2022.02.26.pdf
Blockchain Fundamental_KIPMI_2022.02.26.pdf
 
Module-2-Introduction-to-Cryptocurrencies.pdf
Module-2-Introduction-to-Cryptocurrencies.pdfModule-2-Introduction-to-Cryptocurrencies.pdf
Module-2-Introduction-to-Cryptocurrencies.pdf
 
Blockchain and bitcoin fundamentals (usages and applications)
Blockchain and bitcoin fundamentals (usages and applications)Blockchain and bitcoin fundamentals (usages and applications)
Blockchain and bitcoin fundamentals (usages and applications)
 
Bitcoins
BitcoinsBitcoins
Bitcoins
 
How Blockchain Can Be Used In Supply Chain Management & How It Works?
How Blockchain Can Be Used In Supply Chain Management & How It Works?How Blockchain Can Be Used In Supply Chain Management & How It Works?
How Blockchain Can Be Used In Supply Chain Management & How It Works?
 
BlockChain-1.pptx
BlockChain-1.pptxBlockChain-1.pptx
BlockChain-1.pptx
 
Unbundling Of Financial Services: The Blockchain(s) Revolution
Unbundling Of Financial Services: The Blockchain(s) RevolutionUnbundling Of Financial Services: The Blockchain(s) Revolution
Unbundling Of Financial Services: The Blockchain(s) Revolution
 
Introduction to Blockchain
Introduction to BlockchainIntroduction to Blockchain
Introduction to Blockchain
 
Privacy Preservation Issues in Association Rule Mining in Horizontally Partit...
Privacy Preservation Issues in Association Rule Mining in Horizontally Partit...Privacy Preservation Issues in Association Rule Mining in Horizontally Partit...
Privacy Preservation Issues in Association Rule Mining in Horizontally Partit...
 

More from Gaurav Mishra

FOSSology and OSS-Tools for License Compliance and Automation
FOSSology and OSS-Tools for License Compliance and AutomationFOSSology and OSS-Tools for License Compliance and Automation
FOSSology and OSS-Tools for License Compliance and Automation
Gaurav Mishra
 
FOSSology & GSOC Journey
FOSSology & GSOC JourneyFOSSology & GSOC Journey
FOSSology & GSOC Journey
Gaurav Mishra
 
Backup using rsync
Backup using rsyncBackup using rsync
Backup using rsync
Gaurav Mishra
 
Disk quota and sysd procd
Disk quota and sysd procdDisk quota and sysd procd
Disk quota and sysd procd
Gaurav Mishra
 
Linux User Management
Linux User ManagementLinux User Management
Linux User Management
Gaurav Mishra
 
Apache, cron and proxy
Apache, cron and proxyApache, cron and proxy
Apache, cron and proxy
Gaurav Mishra
 
Linux Run Level
Linux Run LevelLinux Run Level
Linux Run Level
Gaurav Mishra
 
Firewall and IPtables
Firewall and IPtablesFirewall and IPtables
Firewall and IPtables
Gaurav Mishra
 
Linux securities
Linux securitiesLinux securities
Linux securities
Gaurav Mishra
 
wget, curl and scp
wget, curl and scpwget, curl and scp
wget, curl and scp
Gaurav Mishra
 

More from Gaurav Mishra (10)

FOSSology and OSS-Tools for License Compliance and Automation
FOSSology and OSS-Tools for License Compliance and AutomationFOSSology and OSS-Tools for License Compliance and Automation
FOSSology and OSS-Tools for License Compliance and Automation
 
FOSSology & GSOC Journey
FOSSology & GSOC JourneyFOSSology & GSOC Journey
FOSSology & GSOC Journey
 
Backup using rsync
Backup using rsyncBackup using rsync
Backup using rsync
 
Disk quota and sysd procd
Disk quota and sysd procdDisk quota and sysd procd
Disk quota and sysd procd
 
Linux User Management
Linux User ManagementLinux User Management
Linux User Management
 
Apache, cron and proxy
Apache, cron and proxyApache, cron and proxy
Apache, cron and proxy
 
Linux Run Level
Linux Run LevelLinux Run Level
Linux Run Level
 
Firewall and IPtables
Firewall and IPtablesFirewall and IPtables
Firewall and IPtables
 
Linux securities
Linux securitiesLinux securities
Linux securities
 
wget, curl and scp
wget, curl and scpwget, curl and scp
wget, curl and scp
 

Recently uploaded

The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
RitikBhardwaj56
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
thanhdowork
 
Types of Herbal Cosmetics its standardization.
Types of Herbal Cosmetics its standardization.Types of Herbal Cosmetics its standardization.
Types of Herbal Cosmetics its standardization.
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
Digital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental DesignDigital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental Design
amberjdewit93
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
camakaiclarkmusic
 
clinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdfclinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdf
Priyankaranawat4
 
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
PECB
 
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
IreneSebastianRueco1
 
DRUGS AND ITS classification slide share
DRUGS AND ITS classification slide shareDRUGS AND ITS classification slide share
DRUGS AND ITS classification slide share
taiba qazi
 
World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024
ak6969907
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
tarandeep35
 
How to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold MethodHow to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold Method
Celine George
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
Scholarhat
 
PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.
Dr. Shivangi Singh Parihar
 
Main Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docxMain Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docx
adhitya5119
 
Pride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School DistrictPride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School District
David Douglas School District
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
History of Stoke Newington
 
Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
Nicholas Montgomery
 
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective UpskillingYour Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Excellence Foundation for South Sudan
 

Recently uploaded (20)

The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
 
Types of Herbal Cosmetics its standardization.
Types of Herbal Cosmetics its standardization.Types of Herbal Cosmetics its standardization.
Types of Herbal Cosmetics its standardization.
 
Digital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental DesignDigital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental Design
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
 
clinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdfclinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdf
 
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
 
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
 
DRUGS AND ITS classification slide share
DRUGS AND ITS classification slide shareDRUGS AND ITS classification slide share
DRUGS AND ITS classification slide share
 
World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
 
How to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold MethodHow to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold Method
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
 
PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.
 
Main Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docxMain Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docx
 
Pride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School DistrictPride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School District
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
 
Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
 
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective UpskillingYour Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective Upskilling
 

Block Chain - Introduction

  • 1. Gaurav Mishra <gmishx@gmail.com> Block Chain Introduction to blockchain 27-05-2018 Unrestricted
  • 2. Gaurav Mishra <gmishx@gmail.com> The bank way of transactions • Each bank keeps a record of clients and their respective bank accounts. • The bank in which you hold your account will maintain your transactions (transaction book). • These transactions are generally not public. • In case of any malicious entry, it is very difficult to find/trace it out. • The case gets even better in case of cheque transactions which are validated only at the end. 27-05-2018 2
  • 3. Gaurav Mishra <gmishx@gmail.com> Shortcoming of the bank way • • The transactions are not public • • Creates trust issues • • Different organizations hold different transactions 27-05-2018 3
  • 4. Gaurav Mishra <gmishx@gmail.com> Replacement of this method 27-05-2018 4 Store a public ledger Anyone can read/write Being public, anyone can own a copy Current value is a sum of all transactions Open for malicious entries
  • 5. Gaurav Mishra <gmishx@gmail.com> Securing the ledger • Any person can hold a copy of the ledger for keeping track of transactions. • This also opens a way for modification in the ledger. • The best way of preventing modifications is by using hash. • Hash is calculated using a sting and applying certain mathematical operations on it which creates a new digest (fixed length) of the given input. • A slight modification in the input creates a great change in the digest (avalanche effect). • Hashing input are generally combined with another input called salt or nonce to modify the hash output for a desired result. • After a certain number of entries, a hash is calculated on the ledger. • This can prevent modifications in existing ledger. • https://anders.com/blockchain/hash.html • Since calculating the digest is a costly operation, the digest is calculated after a certain entries in the ledger and those entries are called as a block. • The size of a block is fixed for any operation on the ledger. • https://anders.com/blockchain/block.html 27-05-2018 5
  • 6. Gaurav Mishra <gmishx@gmail.com> Securing the entries • Calculating hash on the ledger only prevents the modification of it. • We still need a way to prevent malicious entries in it. • The public-private keys are popularly used around and can be used to provide authenticity of a message using digital signatures. • https://anders.com/blockchain/public-private-keys/keys.html • Each entry in the ledger is backed with a signature calculated using the private key of person making the transaction. • https://anders.com/blockchain/public-private-keys/signatures.html • This provides the authenticity of the entries in the ledger. • Thus the final ledger is secured by authenticating the entries and preventing modifications in the previous entries. • https://anders.com/blockchain/public-private-keys/blockchain.html 27-05-2018 6
  • 7. Gaurav Mishra <gmishx@gmail.com> The blockchain • The blockchain is a continuous chain of validated blocks. • Each block holds its block number, its nonce, its data, hash of previous block and its own hash. • https://blockchain.info/block/0000000000000000001cca8a0f8925e6b6d542e314 54a3e16bfe1fd7f571b1d0 • Each participant have to provide their public key. • https://anders.com/blockchain/public-private-keys/blockchain.html • The digest of the block have some constrain like the first 4 digits of it should be zero to increase the computational cost of the digest and making it even more difficult to change. • The act of calculation of digest of a block is called mining and the person performing it is called as miner. • Since the ledger is distributed among several computers, anyone who mine the block first broadcast the result to others. • Any ledger having modifications can be matched with others and discarded. • If a chain is bifurcated, the chain with most work done is retained and the other one is discarded. 27-05-2018 7
  • 8. Gaurav Mishra <gmishx@gmail.com> Strengths of blockchain You can own your own copy of ledger Entries can be authenticated anytime Secured using public-private keys Completely trust worthy Public ledger 27-05-2018 8