SlideShare a Scribd company logo
1 of 37
Download to read offline
Cryptography
Cryptography
the concept of cryptography in
blockchain
What is cryptography?
1. 3. How cryptography is used to secure
information in blockchain
2. Two main types of cryptography 4. Advantages of cryptography in
blockchain
Agenda
Topics Covered
5. Cryptographic Hash Function
What is
cryptography?
Cryptography is a technique or
protocol that secures information
from any third party during
communication. The word is
composed of two Greek terms, the
term Kryptos meaning “hidden,”
and Graphein, meaning “to write”.
Go Back to Agenda Page
YES NO
Two main types
of cryptography
Symmetric-key Cryptography
Asymmetric-key Cryptography
Basic cryptography technologies
can include two types of
encryptions:
Types of Cryptography
Symmetric key encryption is a method that utilizes a
single shared secret key for both encrypting and
decrypting data.
This makes it efficient for tasks like securing website
connections or encrypting data. However, the key
challenge lies in securely exchanging this secret key
between the sender and receiver before communication
can begin.
Common examples of symmetric key algorithms include
AES (Advanced Encryption Standard) and DES (Data
Encryption Standard).
SYMMETRIC KEY ENCRYPTION
It is also described as secret key cryptography.
Both parties have the same key to keep the secret.
It is suitable for bulk encryption.
It requires less processing power and faster
transfer.
Features of Symmetric-key Cryptography:
Asymmetric key encryption is a different approach that
utilizes two distinct keys: a public key and a private
key.
The public key can be freely shared with anyone, while
the private key must be kept confidential.
This method is particularly useful for secure
communication scenarios like sending emails or
browsing the web.
For instance, when you visit a website secured with
HTTPS, asymmetric key encryption safeguards the
communication between your device and the web server.
ASYMMETRIC KEY ENCRYPTION
It is described as public key cryptography.
It is often used for symmetric cryptography secret key
sharing.
It requires a long processing time to execute.
It plays a significant role in the authenticity of the
web server.
FEATURES OF ASYMMETRIC-KEY CRYPTOGRAPHY:
Go Back to Agenda Page
How cryptography
is used to secure
information in
blockchain ?
Cryptography is used to encrypt transactions on the blockchain
network. This encryption protects the information and
communications from unauthorized access. Public key
encryption is specifically used to accomplish this task.
1.
Cryptography uses hashing algorithms to create a unique
identifier for each block of data in the blockchain. This
hashing function helps to ensure the immutability of the
blockchain. If any data in a block were changed, the hash
would also change, and this would be easily detectable.
2.
Digital signatures are used to verify the authenticity of
transactions. Digital signatures are created with cryptography.
3.
SECURITY IN BLOCKCHAIN:
Go Back to Agenda Page
Advantages of
cryptography in
blockchain
Encryption: Ensures secure transactions
1.
Immutability: Allows tamper-proof data
2.
Security: Provides transaction security through encryption
3.
Scalability: Enables secure record keeping
4.
Non-repudiation: Offers undeniable transactions
5.
ADVANTAGES:
Go Back to Agenda Page
Cryptographic
Hash Function
Cryptographic hashing is a major function used in blockchain
technology.
It helps to ensure the immutability of the blockchain. When a
transaction is verified, a hashing algorithm adds a hash to the
block, and a new unique hash is created. This creates a chain of
blocks where any change to a block would be noticeable.
Hashing functions are used to link blocks together and maintain the
integrity of the data in the blockchain.
Some commonly used hash functions are MD5 and SHA-256.
CRYPTOGRAPHIC HASH FUNCTION:
For a particular message, the hash function does not change.
Any minor change in the data will result in a major change in the
hash value.
The input value is not predicted from the output hash function.
They are fast and efficient because they rely heavily on bitwise
operations.
PROPERTIES OF A CRYPTOGRAPHIC HASH
Go Back to Agenda Page
Thank you!
Insert a parting or
call-to-action message here.
MENU
KNOW
MORE..!
Resource Page
AnalyticsVidhya
Giphy
Tezos
SNS Tezos Blockchain Club
Tezos
Unleashed
Introduction to Blockchain
24.03.2024
SNS College of Engineering
BY SUNIL N
1 What is Blockchain?
2 What is a Block?
3 How Blockchain Works?
4 Terminologies
Agenda
SNS College of Engineering
What is
Blockchain? Blockchain is a decentralized digital
ledger that records transactions across a
network of computers.
It is a secure and transparent way to store
and transfer data, without the need for
intermediaries like banks or governments.
SNS College of Engineering
Blockchain
Digital Ledger Decentralized Network of Computers
SNS College of Engineering
What's in a Block?
A block is a collection of data.
Each block contains data, a unique hash
code, and a hash code referencing the
previous block.
A hash is like a fingerprint for the block's
content. If anything changes within the
block, the hash changes as well.
The hash of the previous block being
included in each new block creates a
chronological chain.
SNS College of Engineering
Data (e.g., transaction details)
Hash
Hash of previous block
SNS College of Engineering
So is Blockchain a Linked List?
Kind of similar.
Both use a chained structure where blocks
(data) are linked together.
Differences:
By design, data in a blockchain is very difficult to
alter. Any change would require modifying all
subsequent blocks and gaining control over a
majority of the network (almost impossible).
Distributed across a network of computers, with
no single point of control.
More complex system involving cryptography,
hashing, and network consensus mechanisms.
SNS College of Engineering
How Blockchain Works?
SNS College of Engineering
TERMINOLOGIES
A blockchain is decentralized, which means that it is
not controlled by any single person or entity.
Instead, it is maintained by a network of computers
around the world.
Anyone can participate in the blockchain network by
running a mining computer.
Because everyone has a copy of the blockchain, it is
very difficult to tamper with the data on the
blockchain. If someone tries to change a block, all of
the following blocks would also need to be changed,
which would require a lot of computing power.
Decentralization
Mining
Mining is the process of adding a new block to the
blockchain. Miners compete to solve a
mathematical puzzle in order to validate a block of
transactions.
The puzzle is to find a random number that, when
added to the data in the block, results in a hash that
starts with a certain number of zeros. The more
zeros required, the more difficult it is to solve the
puzzle.
The first miner to solve the puzzle gets to add the
block to the blockchain and is rewarded with
cryptocurrency.
Hashing function
A hashing function is a mathematical function that
turns data of any size into a fixed-size alphanumeric
code, called a hash.
Bitcoin uses SHA-256 as hashing function.
Even a small change in the input data results in a
completely different hash.
It takes time to compute a hash. The more complex
the data, the longer it takes to compute the hash.
Smart Contracts
A self-executing program stored on a blockchain
that automatically carries out the terms of an
agreement when certain conditions are met.
The code defining the agreement is written in a
specific programming language for the chosen
blockchain platform (e.g., Solidity for Ethereum,
Ligo for Tezos).
A popular library for writing smart contracts on
Tezos. It allows developers to write smart contracts
in Python
:
Thank You

More Related Content

Similar to Blockchain_TezosDeveloperCommunitySNSCE.pdf

Blockchain Technology
Blockchain TechnologyBlockchain Technology
Blockchain TechnologyNimmy Solomon
 
SpaceChain - Blockchain in Space
SpaceChain - Blockchain in SpaceSpaceChain - Blockchain in Space
SpaceChain - Blockchain in SpaceAlecHo7
 
Lapine blockchain introduction 10/04/2018
Lapine blockchain introduction 10/04/2018Lapine blockchain introduction 10/04/2018
Lapine blockchain introduction 10/04/2018Chuck Bair
 
Blockchain based electronic voting system
Blockchain based electronic voting systemBlockchain based electronic voting system
Blockchain based electronic voting systemIRJET Journal
 
Security and privacy with blockchain
Security and privacy with blockchainSecurity and privacy with blockchain
Security and privacy with blockchainCeline George
 
Blockchain tutorial
Blockchain tutorial Blockchain tutorial
Blockchain tutorial Rohit Verma
 
Abhishek jaiswal blockchain
Abhishek jaiswal blockchainAbhishek jaiswal blockchain
Abhishek jaiswal blockchainAbhishek Jaiswal
 
Blockchain- Ammar Ahmad.pdf
Blockchain- Ammar Ahmad.pdfBlockchain- Ammar Ahmad.pdf
Blockchain- Ammar Ahmad.pdfArcadePrinters
 
Blockchain data structures and fundamental
Blockchain data structures and fundamentalBlockchain data structures and fundamental
Blockchain data structures and fundamentalCodium Club
 
IRJET- A Review on Implementation Techniques of Blockchain Enabled Smart Cont...
IRJET- A Review on Implementation Techniques of Blockchain Enabled Smart Cont...IRJET- A Review on Implementation Techniques of Blockchain Enabled Smart Cont...
IRJET- A Review on Implementation Techniques of Blockchain Enabled Smart Cont...IRJET Journal
 
A Technological Perspective of Blockchain Security
A Technological Perspective of Blockchain SecurityA Technological Perspective of Blockchain Security
A Technological Perspective of Blockchain SecurityRagaviRaghavan
 
Blockchain Landscape Report 2019
Blockchain Landscape Report 2019Blockchain Landscape Report 2019
Blockchain Landscape Report 2019[x]cube LABS
 
Final paper blockchain
Final paper blockchain Final paper blockchain
Final paper blockchain VIMANYU SAHU
 
The Blockchain, Bitcoin and other Cryptocurrencies
The Blockchain, Bitcoin and other CryptocurrenciesThe Blockchain, Bitcoin and other Cryptocurrencies
The Blockchain, Bitcoin and other CryptocurrenciesApondi Kevin Omondi
 
1910990335_ppt on blockchain and its issue.ppt
1910990335_ppt on blockchain and its issue.ppt1910990335_ppt on blockchain and its issue.ppt
1910990335_ppt on blockchain and its issue.pptbansalvvinayak832
 
Blockchain Technology | Bitcoin | Ethereum Coin | Cryptocurrency
Blockchain Technology | Bitcoin | Ethereum Coin | CryptocurrencyBlockchain Technology | Bitcoin | Ethereum Coin | Cryptocurrency
Blockchain Technology | Bitcoin | Ethereum Coin | CryptocurrencyUnbiased Technolab
 
IRJET- Blockchain Technology
IRJET- Blockchain TechnologyIRJET- Blockchain Technology
IRJET- Blockchain TechnologyIRJET Journal
 
How Blockchain Technology Is Evolving In The Cloud
How Blockchain Technology Is Evolving In The CloudHow Blockchain Technology Is Evolving In The Cloud
How Blockchain Technology Is Evolving In The CloudShikhaKonda
 

Similar to Blockchain_TezosDeveloperCommunitySNSCE.pdf (20)

Blockchain Technology
Blockchain TechnologyBlockchain Technology
Blockchain Technology
 
SpaceChain - Blockchain in Space
SpaceChain - Blockchain in SpaceSpaceChain - Blockchain in Space
SpaceChain - Blockchain in Space
 
Lapine blockchain introduction 10/04/2018
Lapine blockchain introduction 10/04/2018Lapine blockchain introduction 10/04/2018
Lapine blockchain introduction 10/04/2018
 
Blockchain based electronic voting system
Blockchain based electronic voting systemBlockchain based electronic voting system
Blockchain based electronic voting system
 
Blockchain Assignment
Blockchain AssignmentBlockchain Assignment
Blockchain Assignment
 
Security and privacy with blockchain
Security and privacy with blockchainSecurity and privacy with blockchain
Security and privacy with blockchain
 
Blockchain tutorial
Blockchain tutorial Blockchain tutorial
Blockchain tutorial
 
Abhishek jaiswal blockchain
Abhishek jaiswal blockchainAbhishek jaiswal blockchain
Abhishek jaiswal blockchain
 
Blockchain- Ammar Ahmad.pdf
Blockchain- Ammar Ahmad.pdfBlockchain- Ammar Ahmad.pdf
Blockchain- Ammar Ahmad.pdf
 
Blockchain data structures and fundamental
Blockchain data structures and fundamentalBlockchain data structures and fundamental
Blockchain data structures and fundamental
 
Rafael Oliveira | All About Blockchain
Rafael Oliveira | All About BlockchainRafael Oliveira | All About Blockchain
Rafael Oliveira | All About Blockchain
 
IRJET- A Review on Implementation Techniques of Blockchain Enabled Smart Cont...
IRJET- A Review on Implementation Techniques of Blockchain Enabled Smart Cont...IRJET- A Review on Implementation Techniques of Blockchain Enabled Smart Cont...
IRJET- A Review on Implementation Techniques of Blockchain Enabled Smart Cont...
 
A Technological Perspective of Blockchain Security
A Technological Perspective of Blockchain SecurityA Technological Perspective of Blockchain Security
A Technological Perspective of Blockchain Security
 
Blockchain Landscape Report 2019
Blockchain Landscape Report 2019Blockchain Landscape Report 2019
Blockchain Landscape Report 2019
 
Final paper blockchain
Final paper blockchain Final paper blockchain
Final paper blockchain
 
The Blockchain, Bitcoin and other Cryptocurrencies
The Blockchain, Bitcoin and other CryptocurrenciesThe Blockchain, Bitcoin and other Cryptocurrencies
The Blockchain, Bitcoin and other Cryptocurrencies
 
1910990335_ppt on blockchain and its issue.ppt
1910990335_ppt on blockchain and its issue.ppt1910990335_ppt on blockchain and its issue.ppt
1910990335_ppt on blockchain and its issue.ppt
 
Blockchain Technology | Bitcoin | Ethereum Coin | Cryptocurrency
Blockchain Technology | Bitcoin | Ethereum Coin | CryptocurrencyBlockchain Technology | Bitcoin | Ethereum Coin | Cryptocurrency
Blockchain Technology | Bitcoin | Ethereum Coin | Cryptocurrency
 
IRJET- Blockchain Technology
IRJET- Blockchain TechnologyIRJET- Blockchain Technology
IRJET- Blockchain Technology
 
How Blockchain Technology Is Evolving In The Cloud
How Blockchain Technology Is Evolving In The CloudHow Blockchain Technology Is Evolving In The Cloud
How Blockchain Technology Is Evolving In The Cloud
 

More from VISHNURAJSSNSCEAD

Technical Skills covering DSA and Lead Application
Technical Skills covering DSA and Lead ApplicationTechnical Skills covering DSA and Lead Application
Technical Skills covering DSA and Lead ApplicationVISHNURAJSSNSCEAD
 
Leadership - Team & Event Management.pptx
Leadership - Team & Event Management.pptxLeadership - Team & Event Management.pptx
Leadership - Team & Event Management.pptxVISHNURAJSSNSCEAD
 
SNS Institutions - First Session on GDSC.pptx
SNS Institutions - First Session on GDSC.pptxSNS Institutions - First Session on GDSC.pptx
SNS Institutions - First Session on GDSC.pptxVISHNURAJSSNSCEAD
 
SNS Institutions - First Session on GDSC.pptx
SNS Institutions - First Session on GDSC.pptxSNS Institutions - First Session on GDSC.pptx
SNS Institutions - First Session on GDSC.pptxVISHNURAJSSNSCEAD
 
SNS Institutions - First Session on GDSC
SNS Institutions - First Session on GDSCSNS Institutions - First Session on GDSC
SNS Institutions - First Session on GDSCVISHNURAJSSNSCEAD
 
Solution_Challenge_2024.pptx
Solution_Challenge_2024.pptxSolution_Challenge_2024.pptx
Solution_Challenge_2024.pptxVISHNURAJSSNSCEAD
 
GDSC23 - Info Session GDSC 26th August.pptx
GDSC23 -  Info Session GDSC 26th August.pptxGDSC23 -  Info Session GDSC 26th August.pptx
GDSC23 - Info Session GDSC 26th August.pptxVISHNURAJSSNSCEAD
 

More from VISHNURAJSSNSCEAD (8)

Technical Skills covering DSA and Lead Application
Technical Skills covering DSA and Lead ApplicationTechnical Skills covering DSA and Lead Application
Technical Skills covering DSA and Lead Application
 
Leadership - Team & Event Management.pptx
Leadership - Team & Event Management.pptxLeadership - Team & Event Management.pptx
Leadership - Team & Event Management.pptx
 
SNS Institutions - First Session on GDSC.pptx
SNS Institutions - First Session on GDSC.pptxSNS Institutions - First Session on GDSC.pptx
SNS Institutions - First Session on GDSC.pptx
 
SNS Institutions - First Session on GDSC.pptx
SNS Institutions - First Session on GDSC.pptxSNS Institutions - First Session on GDSC.pptx
SNS Institutions - First Session on GDSC.pptx
 
SNS Institutions - First Session on GDSC
SNS Institutions - First Session on GDSCSNS Institutions - First Session on GDSC
SNS Institutions - First Session on GDSC
 
Solution_Challenge_2024.pptx
Solution_Challenge_2024.pptxSolution_Challenge_2024.pptx
Solution_Challenge_2024.pptx
 
Cloud Jam .pptx
Cloud Jam .pptxCloud Jam .pptx
Cloud Jam .pptx
 
GDSC23 - Info Session GDSC 26th August.pptx
GDSC23 -  Info Session GDSC 26th August.pptxGDSC23 -  Info Session GDSC 26th August.pptx
GDSC23 - Info Session GDSC 26th August.pptx
 

Recently uploaded

Digital Marketing Training Institute in Mohali, India
Digital Marketing Training Institute in Mohali, IndiaDigital Marketing Training Institute in Mohali, India
Digital Marketing Training Institute in Mohali, IndiaDigital Discovery Institute
 
Ch. 9- __Skin, hair and nail Assessment (1).pdf
Ch. 9- __Skin, hair and nail Assessment (1).pdfCh. 9- __Skin, hair and nail Assessment (1).pdf
Ch. 9- __Skin, hair and nail Assessment (1).pdfJamalYaseenJameelOde
 
ME 205- Chapter 6 - Pure Bending of Beams.pdf
ME 205- Chapter 6 - Pure Bending of Beams.pdfME 205- Chapter 6 - Pure Bending of Beams.pdf
ME 205- Chapter 6 - Pure Bending of Beams.pdfaae4149584
 
do's and don'ts in Telephone Interview of Job
do's and don'ts in Telephone Interview of Jobdo's and don'ts in Telephone Interview of Job
do's and don'ts in Telephone Interview of JobRemote DBA Services
 
Protection of Children in context of IHL and Counter Terrorism
Protection of Children in context of IHL and  Counter TerrorismProtection of Children in context of IHL and  Counter Terrorism
Protection of Children in context of IHL and Counter TerrorismNilendra Kumar
 
格里菲斯大学毕业证(Griffith毕业证)#文凭成绩单#真实留信学历认证永久存档
格里菲斯大学毕业证(Griffith毕业证)#文凭成绩单#真实留信学历认证永久存档格里菲斯大学毕业证(Griffith毕业证)#文凭成绩单#真实留信学历认证永久存档
格里菲斯大学毕业证(Griffith毕业证)#文凭成绩单#真实留信学历认证永久存档208367051
 
办理老道明大学毕业证成绩单|购买美国ODU文凭证书
办理老道明大学毕业证成绩单|购买美国ODU文凭证书办理老道明大学毕业证成绩单|购买美国ODU文凭证书
办理老道明大学毕业证成绩单|购买美国ODU文凭证书saphesg8
 
定制(ECU毕业证书)埃迪斯科文大学毕业证毕业证成绩单原版一比一
定制(ECU毕业证书)埃迪斯科文大学毕业证毕业证成绩单原版一比一定制(ECU毕业证书)埃迪斯科文大学毕业证毕业证成绩单原版一比一
定制(ECU毕业证书)埃迪斯科文大学毕业证毕业证成绩单原版一比一fjjwgk
 
Storytelling, Ethics and Workflow in Documentary Photography
Storytelling, Ethics and Workflow in Documentary PhotographyStorytelling, Ethics and Workflow in Documentary Photography
Storytelling, Ethics and Workflow in Documentary PhotographyOrtega Alikwe
 
办理(Salford毕业证书)索尔福德大学毕业证成绩单原版一比一
办理(Salford毕业证书)索尔福德大学毕业证成绩单原版一比一办理(Salford毕业证书)索尔福德大学毕业证成绩单原版一比一
办理(Salford毕业证书)索尔福德大学毕业证成绩单原版一比一diploma 1
 
定制(Waikato毕业证书)新西兰怀卡托大学毕业证成绩单原版一比一
定制(Waikato毕业证书)新西兰怀卡托大学毕业证成绩单原版一比一定制(Waikato毕业证书)新西兰怀卡托大学毕业证成绩单原版一比一
定制(Waikato毕业证书)新西兰怀卡托大学毕业证成绩单原版一比一Fs
 
定制(NYIT毕业证书)美国纽约理工学院毕业证成绩单原版一比一
定制(NYIT毕业证书)美国纽约理工学院毕业证成绩单原版一比一定制(NYIT毕业证书)美国纽约理工学院毕业证成绩单原版一比一
定制(NYIT毕业证书)美国纽约理工学院毕业证成绩单原版一比一2s3dgmej
 
办理哈珀亚当斯大学学院毕业证书文凭学位证书
办理哈珀亚当斯大学学院毕业证书文凭学位证书办理哈珀亚当斯大学学院毕业证书文凭学位证书
办理哈珀亚当斯大学学院毕业证书文凭学位证书saphesg8
 
Call Girl in Low Price Delhi Punjabi Bagh 9711199012
Call Girl in Low Price Delhi Punjabi Bagh  9711199012Call Girl in Low Price Delhi Punjabi Bagh  9711199012
Call Girl in Low Price Delhi Punjabi Bagh 9711199012sapnasaifi408
 
Ethics of Animal Research Laika mission.ppt
Ethics of Animal Research Laika mission.pptEthics of Animal Research Laika mission.ppt
Ethics of Animal Research Laika mission.pptShafqatShakeel1
 
定制英国克兰菲尔德大学毕业证成绩单原版一比一
定制英国克兰菲尔德大学毕业证成绩单原版一比一定制英国克兰菲尔德大学毕业证成绩单原版一比一
定制英国克兰菲尔德大学毕业证成绩单原版一比一z zzz
 
办理(Hull毕业证书)英国赫尔大学毕业证成绩单原版一比一
办理(Hull毕业证书)英国赫尔大学毕业证成绩单原版一比一办理(Hull毕业证书)英国赫尔大学毕业证成绩单原版一比一
办理(Hull毕业证书)英国赫尔大学毕业证成绩单原版一比一F La
 
定制(UQ毕业证书)澳洲昆士兰大学毕业证成绩单原版一比一
定制(UQ毕业证书)澳洲昆士兰大学毕业证成绩单原版一比一定制(UQ毕业证书)澳洲昆士兰大学毕业证成绩单原版一比一
定制(UQ毕业证书)澳洲昆士兰大学毕业证成绩单原版一比一lvtagr7
 
办澳洲詹姆斯库克大学毕业证成绩单pdf电子版制作修改
办澳洲詹姆斯库克大学毕业证成绩单pdf电子版制作修改办澳洲詹姆斯库克大学毕业证成绩单pdf电子版制作修改
办澳洲詹姆斯库克大学毕业证成绩单pdf电子版制作修改yuu sss
 

Recently uploaded (20)

Digital Marketing Training Institute in Mohali, India
Digital Marketing Training Institute in Mohali, IndiaDigital Marketing Training Institute in Mohali, India
Digital Marketing Training Institute in Mohali, India
 
Ch. 9- __Skin, hair and nail Assessment (1).pdf
Ch. 9- __Skin, hair and nail Assessment (1).pdfCh. 9- __Skin, hair and nail Assessment (1).pdf
Ch. 9- __Skin, hair and nail Assessment (1).pdf
 
ME 205- Chapter 6 - Pure Bending of Beams.pdf
ME 205- Chapter 6 - Pure Bending of Beams.pdfME 205- Chapter 6 - Pure Bending of Beams.pdf
ME 205- Chapter 6 - Pure Bending of Beams.pdf
 
do's and don'ts in Telephone Interview of Job
do's and don'ts in Telephone Interview of Jobdo's and don'ts in Telephone Interview of Job
do's and don'ts in Telephone Interview of Job
 
Protection of Children in context of IHL and Counter Terrorism
Protection of Children in context of IHL and  Counter TerrorismProtection of Children in context of IHL and  Counter Terrorism
Protection of Children in context of IHL and Counter Terrorism
 
格里菲斯大学毕业证(Griffith毕业证)#文凭成绩单#真实留信学历认证永久存档
格里菲斯大学毕业证(Griffith毕业证)#文凭成绩单#真实留信学历认证永久存档格里菲斯大学毕业证(Griffith毕业证)#文凭成绩单#真实留信学历认证永久存档
格里菲斯大学毕业证(Griffith毕业证)#文凭成绩单#真实留信学历认证永久存档
 
办理老道明大学毕业证成绩单|购买美国ODU文凭证书
办理老道明大学毕业证成绩单|购买美国ODU文凭证书办理老道明大学毕业证成绩单|购买美国ODU文凭证书
办理老道明大学毕业证成绩单|购买美国ODU文凭证书
 
定制(ECU毕业证书)埃迪斯科文大学毕业证毕业证成绩单原版一比一
定制(ECU毕业证书)埃迪斯科文大学毕业证毕业证成绩单原版一比一定制(ECU毕业证书)埃迪斯科文大学毕业证毕业证成绩单原版一比一
定制(ECU毕业证书)埃迪斯科文大学毕业证毕业证成绩单原版一比一
 
Storytelling, Ethics and Workflow in Documentary Photography
Storytelling, Ethics and Workflow in Documentary PhotographyStorytelling, Ethics and Workflow in Documentary Photography
Storytelling, Ethics and Workflow in Documentary Photography
 
办理(Salford毕业证书)索尔福德大学毕业证成绩单原版一比一
办理(Salford毕业证书)索尔福德大学毕业证成绩单原版一比一办理(Salford毕业证书)索尔福德大学毕业证成绩单原版一比一
办理(Salford毕业证书)索尔福德大学毕业证成绩单原版一比一
 
定制(Waikato毕业证书)新西兰怀卡托大学毕业证成绩单原版一比一
定制(Waikato毕业证书)新西兰怀卡托大学毕业证成绩单原版一比一定制(Waikato毕业证书)新西兰怀卡托大学毕业证成绩单原版一比一
定制(Waikato毕业证书)新西兰怀卡托大学毕业证成绩单原版一比一
 
定制(NYIT毕业证书)美国纽约理工学院毕业证成绩单原版一比一
定制(NYIT毕业证书)美国纽约理工学院毕业证成绩单原版一比一定制(NYIT毕业证书)美国纽约理工学院毕业证成绩单原版一比一
定制(NYIT毕业证书)美国纽约理工学院毕业证成绩单原版一比一
 
办理哈珀亚当斯大学学院毕业证书文凭学位证书
办理哈珀亚当斯大学学院毕业证书文凭学位证书办理哈珀亚当斯大学学院毕业证书文凭学位证书
办理哈珀亚当斯大学学院毕业证书文凭学位证书
 
Call Girl in Low Price Delhi Punjabi Bagh 9711199012
Call Girl in Low Price Delhi Punjabi Bagh  9711199012Call Girl in Low Price Delhi Punjabi Bagh  9711199012
Call Girl in Low Price Delhi Punjabi Bagh 9711199012
 
Ethics of Animal Research Laika mission.ppt
Ethics of Animal Research Laika mission.pptEthics of Animal Research Laika mission.ppt
Ethics of Animal Research Laika mission.ppt
 
定制英国克兰菲尔德大学毕业证成绩单原版一比一
定制英国克兰菲尔德大学毕业证成绩单原版一比一定制英国克兰菲尔德大学毕业证成绩单原版一比一
定制英国克兰菲尔德大学毕业证成绩单原版一比一
 
FULL ENJOY Call Girls In Gautam Nagar (Delhi) Call Us 9953056974
FULL ENJOY Call Girls In Gautam Nagar (Delhi) Call Us 9953056974FULL ENJOY Call Girls In Gautam Nagar (Delhi) Call Us 9953056974
FULL ENJOY Call Girls In Gautam Nagar (Delhi) Call Us 9953056974
 
办理(Hull毕业证书)英国赫尔大学毕业证成绩单原版一比一
办理(Hull毕业证书)英国赫尔大学毕业证成绩单原版一比一办理(Hull毕业证书)英国赫尔大学毕业证成绩单原版一比一
办理(Hull毕业证书)英国赫尔大学毕业证成绩单原版一比一
 
定制(UQ毕业证书)澳洲昆士兰大学毕业证成绩单原版一比一
定制(UQ毕业证书)澳洲昆士兰大学毕业证成绩单原版一比一定制(UQ毕业证书)澳洲昆士兰大学毕业证成绩单原版一比一
定制(UQ毕业证书)澳洲昆士兰大学毕业证成绩单原版一比一
 
办澳洲詹姆斯库克大学毕业证成绩单pdf电子版制作修改
办澳洲詹姆斯库克大学毕业证成绩单pdf电子版制作修改办澳洲詹姆斯库克大学毕业证成绩单pdf电子版制作修改
办澳洲詹姆斯库克大学毕业证成绩单pdf电子版制作修改
 

Blockchain_TezosDeveloperCommunitySNSCE.pdf

  • 1. Cryptography Cryptography the concept of cryptography in blockchain
  • 2. What is cryptography? 1. 3. How cryptography is used to secure information in blockchain 2. Two main types of cryptography 4. Advantages of cryptography in blockchain Agenda Topics Covered 5. Cryptographic Hash Function
  • 4. Cryptography is a technique or protocol that secures information from any third party during communication. The word is composed of two Greek terms, the term Kryptos meaning “hidden,” and Graphein, meaning “to write”. Go Back to Agenda Page YES NO
  • 5. Two main types of cryptography
  • 6. Symmetric-key Cryptography Asymmetric-key Cryptography Basic cryptography technologies can include two types of encryptions: Types of Cryptography
  • 7.
  • 8. Symmetric key encryption is a method that utilizes a single shared secret key for both encrypting and decrypting data. This makes it efficient for tasks like securing website connections or encrypting data. However, the key challenge lies in securely exchanging this secret key between the sender and receiver before communication can begin. Common examples of symmetric key algorithms include AES (Advanced Encryption Standard) and DES (Data Encryption Standard). SYMMETRIC KEY ENCRYPTION
  • 9. It is also described as secret key cryptography. Both parties have the same key to keep the secret. It is suitable for bulk encryption. It requires less processing power and faster transfer. Features of Symmetric-key Cryptography:
  • 10.
  • 11. Asymmetric key encryption is a different approach that utilizes two distinct keys: a public key and a private key. The public key can be freely shared with anyone, while the private key must be kept confidential. This method is particularly useful for secure communication scenarios like sending emails or browsing the web. For instance, when you visit a website secured with HTTPS, asymmetric key encryption safeguards the communication between your device and the web server. ASYMMETRIC KEY ENCRYPTION
  • 12. It is described as public key cryptography. It is often used for symmetric cryptography secret key sharing. It requires a long processing time to execute. It plays a significant role in the authenticity of the web server. FEATURES OF ASYMMETRIC-KEY CRYPTOGRAPHY: Go Back to Agenda Page
  • 13. How cryptography is used to secure information in blockchain ?
  • 14. Cryptography is used to encrypt transactions on the blockchain network. This encryption protects the information and communications from unauthorized access. Public key encryption is specifically used to accomplish this task. 1. Cryptography uses hashing algorithms to create a unique identifier for each block of data in the blockchain. This hashing function helps to ensure the immutability of the blockchain. If any data in a block were changed, the hash would also change, and this would be easily detectable. 2. Digital signatures are used to verify the authenticity of transactions. Digital signatures are created with cryptography. 3. SECURITY IN BLOCKCHAIN: Go Back to Agenda Page
  • 16. Encryption: Ensures secure transactions 1. Immutability: Allows tamper-proof data 2. Security: Provides transaction security through encryption 3. Scalability: Enables secure record keeping 4. Non-repudiation: Offers undeniable transactions 5. ADVANTAGES: Go Back to Agenda Page
  • 18. Cryptographic hashing is a major function used in blockchain technology. It helps to ensure the immutability of the blockchain. When a transaction is verified, a hashing algorithm adds a hash to the block, and a new unique hash is created. This creates a chain of blocks where any change to a block would be noticeable. Hashing functions are used to link blocks together and maintain the integrity of the data in the blockchain. Some commonly used hash functions are MD5 and SHA-256. CRYPTOGRAPHIC HASH FUNCTION:
  • 19.
  • 20. For a particular message, the hash function does not change. Any minor change in the data will result in a major change in the hash value. The input value is not predicted from the output hash function. They are fast and efficient because they rely heavily on bitwise operations. PROPERTIES OF A CRYPTOGRAPHIC HASH Go Back to Agenda Page
  • 21. Thank you! Insert a parting or call-to-action message here. MENU KNOW MORE..!
  • 23. SNS Tezos Blockchain Club Tezos Unleashed Introduction to Blockchain 24.03.2024 SNS College of Engineering BY SUNIL N
  • 24. 1 What is Blockchain? 2 What is a Block? 3 How Blockchain Works? 4 Terminologies Agenda SNS College of Engineering
  • 25. What is Blockchain? Blockchain is a decentralized digital ledger that records transactions across a network of computers. It is a secure and transparent way to store and transfer data, without the need for intermediaries like banks or governments. SNS College of Engineering
  • 26. Blockchain Digital Ledger Decentralized Network of Computers SNS College of Engineering
  • 27. What's in a Block? A block is a collection of data. Each block contains data, a unique hash code, and a hash code referencing the previous block. A hash is like a fingerprint for the block's content. If anything changes within the block, the hash changes as well. The hash of the previous block being included in each new block creates a chronological chain. SNS College of Engineering Data (e.g., transaction details) Hash Hash of previous block
  • 28. SNS College of Engineering
  • 29.
  • 30. So is Blockchain a Linked List? Kind of similar. Both use a chained structure where blocks (data) are linked together. Differences: By design, data in a blockchain is very difficult to alter. Any change would require modifying all subsequent blocks and gaining control over a majority of the network (almost impossible). Distributed across a network of computers, with no single point of control. More complex system involving cryptography, hashing, and network consensus mechanisms. SNS College of Engineering
  • 31. How Blockchain Works? SNS College of Engineering
  • 33. A blockchain is decentralized, which means that it is not controlled by any single person or entity. Instead, it is maintained by a network of computers around the world. Anyone can participate in the blockchain network by running a mining computer. Because everyone has a copy of the blockchain, it is very difficult to tamper with the data on the blockchain. If someone tries to change a block, all of the following blocks would also need to be changed, which would require a lot of computing power. Decentralization
  • 34. Mining Mining is the process of adding a new block to the blockchain. Miners compete to solve a mathematical puzzle in order to validate a block of transactions. The puzzle is to find a random number that, when added to the data in the block, results in a hash that starts with a certain number of zeros. The more zeros required, the more difficult it is to solve the puzzle. The first miner to solve the puzzle gets to add the block to the blockchain and is rewarded with cryptocurrency.
  • 35. Hashing function A hashing function is a mathematical function that turns data of any size into a fixed-size alphanumeric code, called a hash. Bitcoin uses SHA-256 as hashing function. Even a small change in the input data results in a completely different hash. It takes time to compute a hash. The more complex the data, the longer it takes to compute the hash.
  • 36. Smart Contracts A self-executing program stored on a blockchain that automatically carries out the terms of an agreement when certain conditions are met. The code defining the agreement is written in a specific programming language for the chosen blockchain platform (e.g., Solidity for Ethereum, Ligo for Tezos). A popular library for writing smart contracts on Tezos. It allows developers to write smart contracts in Python