SlideShare a Scribd company logo
Concept of Block-Chain technology
Mob- 9090949732
Mail- sspritamrath93@gmail.com ·
Linked in :- www.linkedin.com/in/subham-preetam-97b2b0148
Researchgate ID:-
https://www.researchgate.net/profile/Subham_Preetam2
OMPRAKASH
PAHI
TAPAN KU.
DAKUA
SUBHAM
PREETAM
Dear all
This slide are created in gathering different journals, for basic fundamentals
about how block chain helps in day-today life and in the field of crypto
currency production. For any information contact us.
Thanks
SOA University SOA UniversityUtkal University
 Ingenious invention of a person known as
Satoshi Nakamoto.
 Originally devised for the digital currency, Bitcoin.
 A spreadsheet that is duplicated thousands of times
across a network of computers which is regularly
updated.
 Information held on a blockchain exists as a shared
— and continually reconciled — database
What is Block-Chain technology
• Cryptocurrencies work on the block-chain technology,
and this technology is being seen as the way of the
future transactions.
• Block-chain technology is simply a digital ledger
created for transactions.
• It was originally written for Bitcoin.
• This technology distributes transactional data transparently
through a series of interconnected systems or computers.
How does this technology works
• Instead of relying on a third party controller, transactions
in this technology are mediated by participants using a
consensus protocol on ledger content (pre-agreed
rules).
• They transaction integrity is maintained by using
cryptographic hashes and digital signatures.
• The shared ledgers here are identical, based on the
established consensus, which lowers the risk of
fraudulent transactions.
Why use Blockchain technology
• There are two big changes this technology promises to bring
in the online transactions avenue.
– Firstly, it lowers the risk of information theft or misuse, owing to its
structure of the peer-to-peer network.
– Secondly, in case of an error in a certain transaction, the remaining computers in the
network can easily overrule the faulty one preventing the probability of fraudulent
transactions considerably.
• Unlike traditional technologies, where a central server manages or stores all the data,
becoming highly vulnerable to security attacks, block-chain technology actually
distributes the data using cryptography, which in turn secures sensitive information.
• Hence, with block-chain technology, all the data is being stored on a series or a network of
computers connected to each other, rather than on a single central server.
• So if one computer from the whole network is corrupted or attacked, a timestamp
stored on another computer in the chain or network can counteract its effect.
• Beyond security benefits, this technology also offers a more democratic and
transparent, data distribution method across supply chains.
Current Monetary
System
EVOLUTION OF MONETARY
SYSTEM
 Issues with the current System
• Double Spending
• Fake digital certificates are used to initiate fake transactions without
enough balance
• Standard Transaction Fees
• Transaction Delays
How Blockchain
works
A block records some or all if the recent transactions and completed ones are added in to the
blockchain as permanent database and a new block is generated.
 Public Key Cryptography is used for encryption
 Sender + Receiver + amount of Bitcoins to be send > hashed to
particular hash value
 Apart from this there is a Digital Signature ( Hashed value of
private
Key and amount of bitcoins )
 Decrypt these values and compared to ensure the data is secure
Peer to Peer
Network
 Node is anyone associated with the
block Chain system
 Full Node – Complete block chain
and ledger
 Minor Node – People who
validate transaction and builds
new node
What is BITCOIN
NEWMODE OF
TRANSACTION
 First Decentralized Cryptocurrency
 Uses cryptography to control its creation and
management
 Various cryptography technologies and
mathematical algorithms for creating Bitcoins
are very complicated
 Total Bitcoins are limited to 21 Million
 Last bitcoin will be mined only by 2040
Thank You

More Related Content

What's hot

What is Block-Chain Technology?
What is Block-Chain Technology?What is Block-Chain Technology?
What is Block-Chain Technology?
ThreadSol
 
Block chain technology
Block chain technologyBlock chain technology
Block chain technology
Md. Syful Azam
 
Block Chain
Block ChainBlock Chain
Block Chain
Md.Noman Hasan
 
What is Block chain
What is Block chain What is Block chain
What is Block chain
Aman Vats PMP®
 
BlockChain Technology - Technology Behind Bitcoin and other Cryptocurrency
BlockChain Technology - Technology Behind Bitcoin and other CryptocurrencyBlockChain Technology - Technology Behind Bitcoin and other Cryptocurrency
BlockChain Technology - Technology Behind Bitcoin and other Cryptocurrency
Yashwanth Reddy
 
BLOCK CHAIN TECHNOLOGY
BLOCK CHAIN TECHNOLOGYBLOCK CHAIN TECHNOLOGY
BLOCK CHAIN TECHNOLOGY
CANiharikaGarg
 
Blockchain
BlockchainBlockchain
Blockchain
Amit Kumar
 
Blockchain technology
Blockchain technologyBlockchain technology
Blockchain technology
hellygeorge
 
Block chain technology
Block chain technologyBlock chain technology
Block chain technology
Andrew Adamson
 
Block chain technology
Block chain technologyBlock chain technology
Block chain technology
Rinshi Singh
 
An introduction to block chain technology
An introduction to block chain technologyAn introduction to block chain technology
An introduction to block chain technology
yaminisindhurabandar
 
Blockchain technology-presentation
Blockchain technology-presentationBlockchain technology-presentation
Blockchain technology-presentation
KailashChandra33
 
BLOCK CHAIN
BLOCK CHAINBLOCK CHAIN
BLOCK CHAIN
Saima Mustafa
 
Block chain
Block chainBlock chain
Block chain
gehad hamdy
 
What are-the-difference-between-private-and-public-blockchain
What are-the-difference-between-private-and-public-blockchainWhat are-the-difference-between-private-and-public-blockchain
What are-the-difference-between-private-and-public-blockchain
Blockchain Council
 
Ethereum Block Chain
Ethereum Block ChainEthereum Block Chain
Ethereum Block Chain
SanatPandoh
 
Blockchain
BlockchainBlockchain
Blockchain
ChrisSwanson37
 
Article on Block chain and its use case
Article on Block chain and its use caseArticle on Block chain and its use case
Article on Block chain and its use case
ABHISHEK JAIN
 
Block chain technology
Block chain technologyBlock chain technology
Block chain technology
Mercy Akinseinde
 
Block chain and crypto
Block chain and cryptoBlock chain and crypto
Block chain and crypto
yagyabuttan1
 

What's hot (20)

What is Block-Chain Technology?
What is Block-Chain Technology?What is Block-Chain Technology?
What is Block-Chain Technology?
 
Block chain technology
Block chain technologyBlock chain technology
Block chain technology
 
Block Chain
Block ChainBlock Chain
Block Chain
 
What is Block chain
What is Block chain What is Block chain
What is Block chain
 
BlockChain Technology - Technology Behind Bitcoin and other Cryptocurrency
BlockChain Technology - Technology Behind Bitcoin and other CryptocurrencyBlockChain Technology - Technology Behind Bitcoin and other Cryptocurrency
BlockChain Technology - Technology Behind Bitcoin and other Cryptocurrency
 
BLOCK CHAIN TECHNOLOGY
BLOCK CHAIN TECHNOLOGYBLOCK CHAIN TECHNOLOGY
BLOCK CHAIN TECHNOLOGY
 
Blockchain
BlockchainBlockchain
Blockchain
 
Blockchain technology
Blockchain technologyBlockchain technology
Blockchain technology
 
Block chain technology
Block chain technologyBlock chain technology
Block chain technology
 
Block chain technology
Block chain technologyBlock chain technology
Block chain technology
 
An introduction to block chain technology
An introduction to block chain technologyAn introduction to block chain technology
An introduction to block chain technology
 
Blockchain technology-presentation
Blockchain technology-presentationBlockchain technology-presentation
Blockchain technology-presentation
 
BLOCK CHAIN
BLOCK CHAINBLOCK CHAIN
BLOCK CHAIN
 
Block chain
Block chainBlock chain
Block chain
 
What are-the-difference-between-private-and-public-blockchain
What are-the-difference-between-private-and-public-blockchainWhat are-the-difference-between-private-and-public-blockchain
What are-the-difference-between-private-and-public-blockchain
 
Ethereum Block Chain
Ethereum Block ChainEthereum Block Chain
Ethereum Block Chain
 
Blockchain
BlockchainBlockchain
Blockchain
 
Article on Block chain and its use case
Article on Block chain and its use caseArticle on Block chain and its use case
Article on Block chain and its use case
 
Block chain technology
Block chain technologyBlock chain technology
Block chain technology
 
Block chain and crypto
Block chain and cryptoBlock chain and crypto
Block chain and crypto
 

Similar to Fundamentals of Block chain Technology

Blockchain and Bitcoin
Blockchain and BitcoinBlockchain and Bitcoin
Blockchain and Bitcoin
M Shamim Iqbal
 
Blockchain Basics
Blockchain BasicsBlockchain Basics
Blockchain Basics
Bluechip Technologies
 
Blockchain (1).pptx
Blockchain (1).pptxBlockchain (1).pptx
Blockchain (1).pptx
MeetPBarasara
 
Understanding Blockchain
Understanding BlockchainUnderstanding Blockchain
Understanding Blockchain
Amey Ratnakar Prabhu
 
Blockchain English
Blockchain EnglishBlockchain English
Blockchain English
Ming Sun
 
Blockchain.pptx
Blockchain.pptxBlockchain.pptx
Blockchain.pptx
praneelkumarperuru
 
Quantum Secured Blockchain
Quantum Secured BlockchainQuantum Secured Blockchain
Quantum Secured Blockchain
ravi sahal
 
IoT and Blockchain Challenges and Risks
IoT and Blockchain Challenges and RisksIoT and Blockchain Challenges and Risks
IoT and Blockchain Challenges and Risks
Ahmed Banafa
 
module-1.pptx
module-1.pptxmodule-1.pptx
module-1.pptx
Raju385766
 
Blockchain and BPM - Reflections on Four Years of Research and Applications
Blockchain and BPM - Reflections on Four Years of Research and ApplicationsBlockchain and BPM - Reflections on Four Years of Research and Applications
Blockchain and BPM - Reflections on Four Years of Research and Applications
Ingo Weber
 
Blockchain technology | Bitcoins
Blockchain technology | BitcoinsBlockchain technology | Bitcoins
Blockchain technology | Bitcoins
Huzaifa Âl-Sikandar
 
IRJET- Blockchain Technology
IRJET- Blockchain TechnologyIRJET- Blockchain Technology
IRJET- Blockchain Technology
IRJET Journal
 
BLOCKCHAIN
 BLOCKCHAIN BLOCKCHAIN
BLOCKCHAIN
Bikash Jaiswal
 
BlockChain (1).pptxbhbhbhhbhjbhbhgghbhjbhhg
BlockChain (1).pptxbhbhbhhbhjbhbhgghbhjbhhgBlockChain (1).pptxbhbhbhhbhjbhbhgghbhjbhhg
BlockChain (1).pptxbhbhbhhbhjbhbhgghbhjbhhg
DevkumarKardamVIT
 
Block Chain Bitcoin and Crypto Currency
Block Chain Bitcoin and Crypto CurrencyBlock Chain Bitcoin and Crypto Currency
Block Chain Bitcoin and Crypto Currency
Nidhin P Koshy
 
Blockchain As An Enabler_16 July 2016_David Lee_Final
Blockchain As An Enabler_16 July 2016_David Lee_FinalBlockchain As An Enabler_16 July 2016_David Lee_Final
Blockchain As An Enabler_16 July 2016_David Lee_Final
David Lee Kuo Chuen 李国权
 
Blockchain Technology | Bitcoin | Ethereum Coin | Cryptocurrency
Blockchain Technology | Bitcoin | Ethereum Coin | CryptocurrencyBlockchain Technology | Bitcoin | Ethereum Coin | Cryptocurrency
Blockchain Technology | Bitcoin | Ethereum Coin | Cryptocurrency
Unbiased Technolab
 
crypto ppt.ppt
crypto ppt.pptcrypto ppt.ppt
crypto ppt.ppt
SakshiRawat394090
 
Second line of defense for cybersecurity : Blockchain
Second line of defense for cybersecurity : BlockchainSecond line of defense for cybersecurity : Blockchain
Second line of defense for cybersecurity : Blockchain
Ahmed Banafa
 
InitVerse Blockchain - 5 minutes to understand the blockchain.pdf
InitVerse Blockchain - 5 minutes to understand the blockchain.pdfInitVerse Blockchain - 5 minutes to understand the blockchain.pdf
InitVerse Blockchain - 5 minutes to understand the blockchain.pdf
InitVerse Blockchain
 

Similar to Fundamentals of Block chain Technology (20)

Blockchain and Bitcoin
Blockchain and BitcoinBlockchain and Bitcoin
Blockchain and Bitcoin
 
Blockchain Basics
Blockchain BasicsBlockchain Basics
Blockchain Basics
 
Blockchain (1).pptx
Blockchain (1).pptxBlockchain (1).pptx
Blockchain (1).pptx
 
Understanding Blockchain
Understanding BlockchainUnderstanding Blockchain
Understanding Blockchain
 
Blockchain English
Blockchain EnglishBlockchain English
Blockchain English
 
Blockchain.pptx
Blockchain.pptxBlockchain.pptx
Blockchain.pptx
 
Quantum Secured Blockchain
Quantum Secured BlockchainQuantum Secured Blockchain
Quantum Secured Blockchain
 
IoT and Blockchain Challenges and Risks
IoT and Blockchain Challenges and RisksIoT and Blockchain Challenges and Risks
IoT and Blockchain Challenges and Risks
 
module-1.pptx
module-1.pptxmodule-1.pptx
module-1.pptx
 
Blockchain and BPM - Reflections on Four Years of Research and Applications
Blockchain and BPM - Reflections on Four Years of Research and ApplicationsBlockchain and BPM - Reflections on Four Years of Research and Applications
Blockchain and BPM - Reflections on Four Years of Research and Applications
 
Blockchain technology | Bitcoins
Blockchain technology | BitcoinsBlockchain technology | Bitcoins
Blockchain technology | Bitcoins
 
IRJET- Blockchain Technology
IRJET- Blockchain TechnologyIRJET- Blockchain Technology
IRJET- Blockchain Technology
 
BLOCKCHAIN
 BLOCKCHAIN BLOCKCHAIN
BLOCKCHAIN
 
BlockChain (1).pptxbhbhbhhbhjbhbhgghbhjbhhg
BlockChain (1).pptxbhbhbhhbhjbhbhgghbhjbhhgBlockChain (1).pptxbhbhbhhbhjbhbhgghbhjbhhg
BlockChain (1).pptxbhbhbhhbhjbhbhgghbhjbhhg
 
Block Chain Bitcoin and Crypto Currency
Block Chain Bitcoin and Crypto CurrencyBlock Chain Bitcoin and Crypto Currency
Block Chain Bitcoin and Crypto Currency
 
Blockchain As An Enabler_16 July 2016_David Lee_Final
Blockchain As An Enabler_16 July 2016_David Lee_FinalBlockchain As An Enabler_16 July 2016_David Lee_Final
Blockchain As An Enabler_16 July 2016_David Lee_Final
 
Blockchain Technology | Bitcoin | Ethereum Coin | Cryptocurrency
Blockchain Technology | Bitcoin | Ethereum Coin | CryptocurrencyBlockchain Technology | Bitcoin | Ethereum Coin | Cryptocurrency
Blockchain Technology | Bitcoin | Ethereum Coin | Cryptocurrency
 
crypto ppt.ppt
crypto ppt.pptcrypto ppt.ppt
crypto ppt.ppt
 
Second line of defense for cybersecurity : Blockchain
Second line of defense for cybersecurity : BlockchainSecond line of defense for cybersecurity : Blockchain
Second line of defense for cybersecurity : Blockchain
 
InitVerse Blockchain - 5 minutes to understand the blockchain.pdf
InitVerse Blockchain - 5 minutes to understand the blockchain.pdfInitVerse Blockchain - 5 minutes to understand the blockchain.pdf
InitVerse Blockchain - 5 minutes to understand the blockchain.pdf
 

More from Subham Preetam

Alcohol and its effects on the body
Alcohol and its effects on the bodyAlcohol and its effects on the body
Alcohol and its effects on the body
Subham Preetam
 
Cryptocurrency A brief History
Cryptocurrency A brief HistoryCryptocurrency A brief History
Cryptocurrency A brief History
Subham Preetam
 
Basics of Artificial Neural Network
Basics of Artificial Neural Network Basics of Artificial Neural Network
Basics of Artificial Neural Network
Subham Preetam
 
Beneficial use of Microorganism
 Beneficial use of Microorganism Beneficial use of Microorganism
Beneficial use of Microorganism
Subham Preetam
 
Recent Advancement in science (India part)
Recent Advancement in  science (India part)Recent Advancement in  science (India part)
Recent Advancement in science (India part)
Subham Preetam
 
Nanotechnology the Advanced Science
Nanotechnology the Advanced ScienceNanotechnology the Advanced Science
Nanotechnology the Advanced Science
Subham Preetam
 
Chandryaan 2
Chandryaan 2 Chandryaan 2
Chandryaan 2
Subham Preetam
 
Coronavirus
CoronavirusCoronavirus
Coronavirus
Subham Preetam
 
Membrane structure
Membrane structureMembrane structure
Membrane structure
Subham Preetam
 
Silk moth and silk production
Silk moth and silk productionSilk moth and silk production
Silk moth and silk production
Subham Preetam
 
IMMUNOPATHOLOGY ON SLEEPING SICKNESS:
IMMUNOPATHOLOGY ON SLEEPING SICKNESS: IMMUNOPATHOLOGY ON SLEEPING SICKNESS:
IMMUNOPATHOLOGY ON SLEEPING SICKNESS:
Subham Preetam
 
Food Packing
Food Packing Food Packing
Food Packing
Subham Preetam
 
Golden rice technology
Golden rice technologyGolden rice technology
Golden rice technology
Subham Preetam
 
Immunotherapy
Immunotherapy Immunotherapy
Immunotherapy
Subham Preetam
 
Biosurfect againt Cancer
Biosurfect againt Cancer Biosurfect againt Cancer
Biosurfect againt Cancer
Subham Preetam
 
Inhibition effect of Garlic and Onion
Inhibition effect of Garlic and Onion Inhibition effect of Garlic and Onion
Inhibition effect of Garlic and Onion
Subham Preetam
 
Blast subham
Blast subhamBlast subham
Blast subham
Subham Preetam
 
Biosurfectant production
Biosurfectant productionBiosurfectant production
Biosurfectant production
Subham Preetam
 
Ebola virus
  Ebola virus  Ebola virus
Ebola virus
Subham Preetam
 
Benifits of ginger
Benifits of gingerBenifits of ginger
Benifits of ginger
Subham Preetam
 

More from Subham Preetam (20)

Alcohol and its effects on the body
Alcohol and its effects on the bodyAlcohol and its effects on the body
Alcohol and its effects on the body
 
Cryptocurrency A brief History
Cryptocurrency A brief HistoryCryptocurrency A brief History
Cryptocurrency A brief History
 
Basics of Artificial Neural Network
Basics of Artificial Neural Network Basics of Artificial Neural Network
Basics of Artificial Neural Network
 
Beneficial use of Microorganism
 Beneficial use of Microorganism Beneficial use of Microorganism
Beneficial use of Microorganism
 
Recent Advancement in science (India part)
Recent Advancement in  science (India part)Recent Advancement in  science (India part)
Recent Advancement in science (India part)
 
Nanotechnology the Advanced Science
Nanotechnology the Advanced ScienceNanotechnology the Advanced Science
Nanotechnology the Advanced Science
 
Chandryaan 2
Chandryaan 2 Chandryaan 2
Chandryaan 2
 
Coronavirus
CoronavirusCoronavirus
Coronavirus
 
Membrane structure
Membrane structureMembrane structure
Membrane structure
 
Silk moth and silk production
Silk moth and silk productionSilk moth and silk production
Silk moth and silk production
 
IMMUNOPATHOLOGY ON SLEEPING SICKNESS:
IMMUNOPATHOLOGY ON SLEEPING SICKNESS: IMMUNOPATHOLOGY ON SLEEPING SICKNESS:
IMMUNOPATHOLOGY ON SLEEPING SICKNESS:
 
Food Packing
Food Packing Food Packing
Food Packing
 
Golden rice technology
Golden rice technologyGolden rice technology
Golden rice technology
 
Immunotherapy
Immunotherapy Immunotherapy
Immunotherapy
 
Biosurfect againt Cancer
Biosurfect againt Cancer Biosurfect againt Cancer
Biosurfect againt Cancer
 
Inhibition effect of Garlic and Onion
Inhibition effect of Garlic and Onion Inhibition effect of Garlic and Onion
Inhibition effect of Garlic and Onion
 
Blast subham
Blast subhamBlast subham
Blast subham
 
Biosurfectant production
Biosurfectant productionBiosurfectant production
Biosurfectant production
 
Ebola virus
  Ebola virus  Ebola virus
Ebola virus
 
Benifits of ginger
Benifits of gingerBenifits of ginger
Benifits of ginger
 

Recently uploaded

20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website
Pixlogix Infotech
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
Data structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdfData structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdf
TIPNGVN2
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
Zilliz
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
Rohit Gautam
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Zilliz
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 

Recently uploaded (20)

20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
Data structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdfData structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdf
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 

Fundamentals of Block chain Technology

  • 1. Concept of Block-Chain technology Mob- 9090949732 Mail- sspritamrath93@gmail.com · Linked in :- www.linkedin.com/in/subham-preetam-97b2b0148 Researchgate ID:- https://www.researchgate.net/profile/Subham_Preetam2
  • 2. OMPRAKASH PAHI TAPAN KU. DAKUA SUBHAM PREETAM Dear all This slide are created in gathering different journals, for basic fundamentals about how block chain helps in day-today life and in the field of crypto currency production. For any information contact us. Thanks SOA University SOA UniversityUtkal University
  • 3.  Ingenious invention of a person known as Satoshi Nakamoto.  Originally devised for the digital currency, Bitcoin.  A spreadsheet that is duplicated thousands of times across a network of computers which is regularly updated.  Information held on a blockchain exists as a shared — and continually reconciled — database
  • 4. What is Block-Chain technology • Cryptocurrencies work on the block-chain technology, and this technology is being seen as the way of the future transactions. • Block-chain technology is simply a digital ledger created for transactions. • It was originally written for Bitcoin. • This technology distributes transactional data transparently through a series of interconnected systems or computers.
  • 5. How does this technology works • Instead of relying on a third party controller, transactions in this technology are mediated by participants using a consensus protocol on ledger content (pre-agreed rules). • They transaction integrity is maintained by using cryptographic hashes and digital signatures. • The shared ledgers here are identical, based on the established consensus, which lowers the risk of fraudulent transactions.
  • 6. Why use Blockchain technology • There are two big changes this technology promises to bring in the online transactions avenue. – Firstly, it lowers the risk of information theft or misuse, owing to its structure of the peer-to-peer network. – Secondly, in case of an error in a certain transaction, the remaining computers in the network can easily overrule the faulty one preventing the probability of fraudulent transactions considerably. • Unlike traditional technologies, where a central server manages or stores all the data, becoming highly vulnerable to security attacks, block-chain technology actually distributes the data using cryptography, which in turn secures sensitive information. • Hence, with block-chain technology, all the data is being stored on a series or a network of computers connected to each other, rather than on a single central server. • So if one computer from the whole network is corrupted or attacked, a timestamp stored on another computer in the chain or network can counteract its effect. • Beyond security benefits, this technology also offers a more democratic and transparent, data distribution method across supply chains.
  • 8.
  • 9.  Issues with the current System • Double Spending • Fake digital certificates are used to initiate fake transactions without enough balance • Standard Transaction Fees • Transaction Delays
  • 10.
  • 12.
  • 13. A block records some or all if the recent transactions and completed ones are added in to the blockchain as permanent database and a new block is generated.
  • 14.
  • 15.  Public Key Cryptography is used for encryption  Sender + Receiver + amount of Bitcoins to be send > hashed to particular hash value  Apart from this there is a Digital Signature ( Hashed value of private Key and amount of bitcoins )  Decrypt these values and compared to ensure the data is secure
  • 16. Peer to Peer Network  Node is anyone associated with the block Chain system  Full Node – Complete block chain and ledger  Minor Node – People who validate transaction and builds new node
  • 17.
  • 18.
  • 19. What is BITCOIN NEWMODE OF TRANSACTION
  • 20.  First Decentralized Cryptocurrency  Uses cryptography to control its creation and management  Various cryptography technologies and mathematical algorithms for creating Bitcoins are very complicated  Total Bitcoins are limited to 21 Million  Last bitcoin will be mined only by 2040
  • 21.