SlideShare a Scribd company logo
1 of 4
BLOCK CHAIN 101
Mining the Phenomenon for Real World applications
page
03
Block Chain –
A common Man’s Viewpoint
Ashared ledger managed securely via transactions validated by all stakeholders rather than a central authority. Also can be configured to selectively provide
access to information through permissions and encryptions. The integrity and anonymity of the shared ledger is maintained through cryptography based on
advancedmathematics
1.TRANSACTION
Two or more parties
exchangedata: this could
Rrepresent money,
contracts, deeds, medical
records, customer details
or any other assets that
can be described in digital
form
2. VERIFICATION
network’sDepending on the
parameters, the transaction is
either verified instantly or
transcribed into a secure record
and placed in a queue of pending
transactions In this case the nodes
in the network and based on set of
rules already agreedto
3. STRUCTURE
Each Block is identified by a hash,
256-bit number, created using an
algorithm agreed upon by a
network. A block contains a header,
a reference to the previous block’s
hash, and a group of transactions.
The sequence of linked hashes
creates asecure, independent chain
4.VALIDATION
Blocks must be first validated to be
added to the Block Chain. The Most
accepted form of validation for open-
source block Chainsin proof of Work
–the solution to a mathematical
Puzzle derived from the blocks
header 5.BLOCKCHAINMINING
Miners try to solve the block by making
incremental changes to one variable until the
solution satisfies a network wide target. This
is called “proof of work” because correct
answers cannot be falsified. Potential
solutions must prove the appropriate level of
computing power wasdrained insolving
6.CHAIN
When a block is validated, the miners that
solved the puzzle are rewarded and the
block is distributed through the network.
Each node adds the block to the majority
chain, the network’s immutable and
auditable blockchain.
7.BUILT INDEFENCE
If a malicious miner tries to submit an altered
block to the chain, the hash function of that
block and all following blocks, would change.
Hence the other nodes would detect these
changes and reject the block from the
majority chain, preventing corruption
page
04
Features and Benefits
Where and Why it works
FeaturesofBlockchain
STP Decentralized Anonymous Time-stamped Consensus Trust Immutable Secure Programmable
StraightThrough All network TheIdentity of the Transaction All network Theydon’t need Anyvalidated records All recordsare ABlockChainis
processing participants havea participants iseither Timestampis participants agreeto another intermediary are irreversibleand individually Programmable
capability copy of the ledger for pseudonymous or recorded oneach the validity ofeach to guaranteethe cannot bechanged encrypted (“SmartContracts”)
full transparency anonymous block of therecords other parties
Benefits ofBlockchain
Transactions time
reduced to minutesas
there is no
intermediary
interference to
facilitate the
transaction
Santander,
predicted thatblock
chain technologies
could reduce banks'
infrastructural costs
by $15-20bn ayear
by 2022.
Assetsare held “in the
cloud” and are tied to
their owners identities
rather thaninstitutional
custodians;allows
exchangeof
information without
third-partyvalidation
Secure
transaction
ledger
databasewhich
is shared in an
established,
distributed
network
Provides realtime
track of
transaction at
decentralized
system with no
double spending
or transaction
repudiation
AUTOMATION
Execution is open to
the Internet and
settlement is
automatic; canrun
without any human
interference and
without the control of
any institution.
EFFICIENCY
New Formsofvalue
interpretation
Optimized time to
value
Continuousand
autonomousmarkets
SERENITY
Cryptographic
Reputation
AMPLIFICATION
IOTIntegration
Collaboration
Public Transparency Empowered Consumer
BusinessConfidence Cross-Economy
Interoperability

More Related Content

What's hot

What's hot (19)

IRJET- Security Threats on Blockchain and its Countermeasures
IRJET- Security Threats on Blockchain and its CountermeasuresIRJET- Security Threats on Blockchain and its Countermeasures
IRJET- Security Threats on Blockchain and its Countermeasures
 
5 Core Blockchain Technology Concepts
5 Core Blockchain Technology Concepts 5 Core Blockchain Technology Concepts
5 Core Blockchain Technology Concepts
 
Understanding Proof of Work (PoW) and Proof of Stake (PoS) Algorithms
Understanding Proof of Work (PoW) and Proof of Stake (PoS) AlgorithmsUnderstanding Proof of Work (PoW) and Proof of Stake (PoS) Algorithms
Understanding Proof of Work (PoW) and Proof of Stake (PoS) Algorithms
 
Application of Blockchain and Smart Contracts on the Internet of Things
Application of Blockchain and Smart Contracts on the Internet of ThingsApplication of Blockchain and Smart Contracts on the Internet of Things
Application of Blockchain and Smart Contracts on the Internet of Things
 
Distributed Systems for Blockchain using Cloud
Distributed  Systems for Blockchain  using CloudDistributed  Systems for Blockchain  using Cloud
Distributed Systems for Blockchain using Cloud
 
Infra
InfraInfra
Infra
 
Distributed systems and blockchain technology
Distributed systems and blockchain technologyDistributed systems and blockchain technology
Distributed systems and blockchain technology
 
Distributed Ledger Technology
Distributed Ledger TechnologyDistributed Ledger Technology
Distributed Ledger Technology
 
Blockchain Scalability - Architectures and Algorithms
Blockchain Scalability - Architectures and AlgorithmsBlockchain Scalability - Architectures and Algorithms
Blockchain Scalability - Architectures and Algorithms
 
Blockchain Technologies
Blockchain TechnologiesBlockchain Technologies
Blockchain Technologies
 
What makes BlockChain secure.pptx
What makes BlockChain secure.pptxWhat makes BlockChain secure.pptx
What makes BlockChain secure.pptx
 
Blockchain tutorial
Blockchain tutorial Blockchain tutorial
Blockchain tutorial
 
Use case of block chain unit 4 AKTU
Use case of block chain unit 4 AKTUUse case of block chain unit 4 AKTU
Use case of block chain unit 4 AKTU
 
Is Azure Blockchain Cloud the Future of Cloud Computing | Sysfore
Is Azure Blockchain Cloud the Future of Cloud Computing | SysforeIs Azure Blockchain Cloud the Future of Cloud Computing | Sysfore
Is Azure Blockchain Cloud the Future of Cloud Computing | Sysfore
 
Hyperledger arch wg_paper_1_consensus
Hyperledger arch wg_paper_1_consensusHyperledger arch wg_paper_1_consensus
Hyperledger arch wg_paper_1_consensus
 
Blockchain On Azure
Blockchain On AzureBlockchain On Azure
Blockchain On Azure
 
Blockchain concepts
Blockchain conceptsBlockchain concepts
Blockchain concepts
 
Распределенный blockchain процессинг / Алексей Трошичев (QiWi, Rakuten)
Распределенный blockchain процессинг / Алексей Трошичев (QiWi, Rakuten)Распределенный blockchain процессинг / Алексей Трошичев (QiWi, Rakuten)
Распределенный blockchain процессинг / Алексей Трошичев (QiWi, Rakuten)
 
Introduction to Blockchain
Introduction to BlockchainIntroduction to Blockchain
Introduction to Blockchain
 

Similar to Blockchain 101

chapter 4 Selected Topics in computer.pptx
chapter 4 Selected Topics in computer.pptxchapter 4 Selected Topics in computer.pptx
chapter 4 Selected Topics in computer.pptx
AschalewAyele2
 
chapter 4 Selected Topics in computer.pptx
chapter 4 Selected Topics in computer.pptxchapter 4 Selected Topics in computer.pptx
chapter 4 Selected Topics in computer.pptx
AschalewAyele2
 
BLOCK CHAIN technology for the students.
BLOCK CHAIN technology for the students.BLOCK CHAIN technology for the students.
BLOCK CHAIN technology for the students.
Rajasekhar364622
 
What Is Blockchain_.pdf
What Is Blockchain_.pdfWhat Is Blockchain_.pdf
What Is Blockchain_.pdf
BeuranHendricks
 

Similar to Blockchain 101 (20)

Blockchain development from concept to reality.docx
Blockchain development from concept to reality.docxBlockchain development from concept to reality.docx
Blockchain development from concept to reality.docx
 
Blockchain
BlockchainBlockchain
Blockchain
 
STREAKK - 3rd Generation Blockchain
STREAKK - 3rd Generation BlockchainSTREAKK - 3rd Generation Blockchain
STREAKK - 3rd Generation Blockchain
 
CG Presentation.pptxgcjdtrdtdrjjydjdhththtr
CG Presentation.pptxgcjdtrdtdrjjydjdhththtrCG Presentation.pptxgcjdtrdtdrjjydjdhththtr
CG Presentation.pptxgcjdtrdtdrjjydjdhththtr
 
chapter 4 Selected Topics in computer.pptx
chapter 4 Selected Topics in computer.pptxchapter 4 Selected Topics in computer.pptx
chapter 4 Selected Topics in computer.pptx
 
chapter 4 Selected Topics in computer.pptx
chapter 4 Selected Topics in computer.pptxchapter 4 Selected Topics in computer.pptx
chapter 4 Selected Topics in computer.pptx
 
Blockchain a deep dive
Blockchain  a deep diveBlockchain  a deep dive
Blockchain a deep dive
 
Blockchain&Crypto.pptx
Blockchain&Crypto.pptxBlockchain&Crypto.pptx
Blockchain&Crypto.pptx
 
Rajeev Lakhanpal Shares Key Principles of Blockchain Technology
Rajeev Lakhanpal Shares Key Principles of Blockchain TechnologyRajeev Lakhanpal Shares Key Principles of Blockchain Technology
Rajeev Lakhanpal Shares Key Principles of Blockchain Technology
 
Blockchain technology in electric power system
Blockchain technology in electric power systemBlockchain technology in electric power system
Blockchain technology in electric power system
 
Blockchain Technology Review and Its Scope
Blockchain Technology Review and Its ScopeBlockchain Technology Review and Its Scope
Blockchain Technology Review and Its Scope
 
Learn Blockchain-Basics - 101Blockchains
Learn Blockchain-Basics - 101BlockchainsLearn Blockchain-Basics - 101Blockchains
Learn Blockchain-Basics - 101Blockchains
 
BLOCK CHAIN technology for the students.
BLOCK CHAIN technology for the students.BLOCK CHAIN technology for the students.
BLOCK CHAIN technology for the students.
 
Blockchain Security and Demonstration
Blockchain Security and DemonstrationBlockchain Security and Demonstration
Blockchain Security and Demonstration
 
Blockchain Assignment
Blockchain AssignmentBlockchain Assignment
Blockchain Assignment
 
Beginner guide to blockchain
Beginner guide to blockchainBeginner guide to blockchain
Beginner guide to blockchain
 
Introduction to Blockchain
Introduction to BlockchainIntroduction to Blockchain
Introduction to Blockchain
 
IRJET- Credible Data through Distributed Ledger Technology
IRJET-  	  Credible Data through Distributed Ledger TechnologyIRJET-  	  Credible Data through Distributed Ledger Technology
IRJET- Credible Data through Distributed Ledger Technology
 
What Is Blockchain_.pdf
What Is Blockchain_.pdfWhat Is Blockchain_.pdf
What Is Blockchain_.pdf
 
BLOCKCHAIN.pptx
BLOCKCHAIN.pptxBLOCKCHAIN.pptx
BLOCKCHAIN.pptx
 

Recently uploaded

Microsoft BitLocker Bypass Attack Method.pdf
Microsoft BitLocker Bypass Attack Method.pdfMicrosoft BitLocker Bypass Attack Method.pdf
Microsoft BitLocker Bypass Attack Method.pdf
Overkill Security
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc
 
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
panagenda
 

Recently uploaded (20)

Generative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdfGenerative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdf
 
WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024
 
Navigating the Large Language Model choices_Ravi Daparthi
Navigating the Large Language Model choices_Ravi DaparthiNavigating the Large Language Model choices_Ravi Daparthi
Navigating the Large Language Model choices_Ravi Daparthi
 
Top 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development CompaniesTop 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development Companies
 
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
 
AI mind or machine power point presentation
AI mind or machine power point presentationAI mind or machine power point presentation
AI mind or machine power point presentation
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdf
 
ERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage Intacct
 
ChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps ProductivityChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps Productivity
 
2024 May Patch Tuesday
2024 May Patch Tuesday2024 May Patch Tuesday
2024 May Patch Tuesday
 
Simplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptxSimplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptx
 
The Ultimate Prompt Engineering Guide for Generative AI: Get the Most Out of ...
The Ultimate Prompt Engineering Guide for Generative AI: Get the Most Out of ...The Ultimate Prompt Engineering Guide for Generative AI: Get the Most Out of ...
The Ultimate Prompt Engineering Guide for Generative AI: Get the Most Out of ...
 
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and Insight
 
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
 
Microsoft BitLocker Bypass Attack Method.pdf
Microsoft BitLocker Bypass Attack Method.pdfMicrosoft BitLocker Bypass Attack Method.pdf
Microsoft BitLocker Bypass Attack Method.pdf
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
 
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
 
Introduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxIntroduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptx
 
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by Anitaraj
 

Blockchain 101

  • 1. BLOCK CHAIN 101 Mining the Phenomenon for Real World applications
  • 2.
  • 3. page 03 Block Chain – A common Man’s Viewpoint Ashared ledger managed securely via transactions validated by all stakeholders rather than a central authority. Also can be configured to selectively provide access to information through permissions and encryptions. The integrity and anonymity of the shared ledger is maintained through cryptography based on advancedmathematics 1.TRANSACTION Two or more parties exchangedata: this could Rrepresent money, contracts, deeds, medical records, customer details or any other assets that can be described in digital form 2. VERIFICATION network’sDepending on the parameters, the transaction is either verified instantly or transcribed into a secure record and placed in a queue of pending transactions In this case the nodes in the network and based on set of rules already agreedto 3. STRUCTURE Each Block is identified by a hash, 256-bit number, created using an algorithm agreed upon by a network. A block contains a header, a reference to the previous block’s hash, and a group of transactions. The sequence of linked hashes creates asecure, independent chain 4.VALIDATION Blocks must be first validated to be added to the Block Chain. The Most accepted form of validation for open- source block Chainsin proof of Work –the solution to a mathematical Puzzle derived from the blocks header 5.BLOCKCHAINMINING Miners try to solve the block by making incremental changes to one variable until the solution satisfies a network wide target. This is called “proof of work” because correct answers cannot be falsified. Potential solutions must prove the appropriate level of computing power wasdrained insolving 6.CHAIN When a block is validated, the miners that solved the puzzle are rewarded and the block is distributed through the network. Each node adds the block to the majority chain, the network’s immutable and auditable blockchain. 7.BUILT INDEFENCE If a malicious miner tries to submit an altered block to the chain, the hash function of that block and all following blocks, would change. Hence the other nodes would detect these changes and reject the block from the majority chain, preventing corruption
  • 4. page 04 Features and Benefits Where and Why it works FeaturesofBlockchain STP Decentralized Anonymous Time-stamped Consensus Trust Immutable Secure Programmable StraightThrough All network TheIdentity of the Transaction All network Theydon’t need Anyvalidated records All recordsare ABlockChainis processing participants havea participants iseither Timestampis participants agreeto another intermediary are irreversibleand individually Programmable capability copy of the ledger for pseudonymous or recorded oneach the validity ofeach to guaranteethe cannot bechanged encrypted (“SmartContracts”) full transparency anonymous block of therecords other parties Benefits ofBlockchain Transactions time reduced to minutesas there is no intermediary interference to facilitate the transaction Santander, predicted thatblock chain technologies could reduce banks' infrastructural costs by $15-20bn ayear by 2022. Assetsare held “in the cloud” and are tied to their owners identities rather thaninstitutional custodians;allows exchangeof information without third-partyvalidation Secure transaction ledger databasewhich is shared in an established, distributed network Provides realtime track of transaction at decentralized system with no double spending or transaction repudiation AUTOMATION Execution is open to the Internet and settlement is automatic; canrun without any human interference and without the control of any institution. EFFICIENCY New Formsofvalue interpretation Optimized time to value Continuousand autonomousmarkets SERENITY Cryptographic Reputation AMPLIFICATION IOTIntegration Collaboration Public Transparency Empowered Consumer BusinessConfidence Cross-Economy Interoperability