100% tevredenheidsgarantie Direct beschikbaar na je betaling Lees online óf als PDF Geen vaste maandelijkse kosten 4.2 TrustPilot
logo-home
College aantekeningen

Class notes on Blockchain and Cryptocurrency (R_GRET)

Beoordeling
-
Verkocht
-
Pagina's
7
Geüpload op
21-06-2022
Geschreven in
2021/2022

Notes explaining in depth how a blockchain works, including notes on peer-to-peer communication, cryptography, and hashing. How are blockchains created? Why are they used? What legal impact do they have? Includes possible applications of blockchain and the advantages and disadvantages.

Meer zien Lees minder









Oeps! We kunnen je document nu niet laden. Probeer het nog eens of neem contact op met support.

Documentinformatie

Geüpload op
21 juni 2022
Aantal pagina's
7
Geschreven in
2021/2022
Type
College aantekeningen
Docent(en)
Arno r. lodder
Bevat
Lecture 6

Voorbeeld van de inhoud

Lecture 6 – Blockchain

What is a blockchain?
Blockchain is a system of recording information in a way that
makes it difficult or impossible to change, hack, or cheat the
system. A blockchain is essentially a digital ledger of
transactions that is duplicated and distributed across the entire
network of computer systems on the blockchain.

‘Blockchain’ was invented by ‘Satoshi Nakamoto’ in around
2008/2009. To this day, we do not know who this person(s)
is/are. The search for a trustworthy anonymous currency online
has been an ongoing quest since the internet became
mainstream in the early 90s. Blockchain enables anonymity
and creates trust without a trusted third party, as you would
normally have in internet transaction. Thus, using blockchain,
you can execute transactions and deal with commercial
relations online that you do not necessarily trust.

The development of blockchain has resulted in Bitcoin, which
was the first blockchain application.

How does blockchain work?
It is a clever combination of three underlying technologies:
1. Peer-to-peer communication
This is a well-known concept that is used in file sharing.
There is no central node, nobody is in charge and all peers
are equal. It differs to a centralised server as it allows all
users to communicate directly without a central base
necessary. Peer-to-peer protocol is needed.

2. Cryptography
This is mostly used in digital signatures. It hides the
contents of messages by encrypting messages in a way
that only allows the receiver to read it. This technology
does not use symmetric encryption, which is where the
sender and receiver need the same key to read the
message. Instead, it is asymmetric, which allows different
keys for encryption and decryption. An advantage of this
is that no prior exchange of key is needed.

, As two keys are used, it is known as a ‘key-pair’. There is
one private key and one public key. A message encrypted
by one key can only be decrypted by the other
corresponding key. So, a message encrypted by the
private key can only be decrypted by the public key and
vice versa. Note, from a public key, the private key
cannot be inferred. Thus, a public key printed on a
business card or website etc, cannot then lead to the
corresponding private key.

In a blockchain context, private keys should be kept
private and public keys are open to the public. A private
key is used to encrypt a message, much like a signature.
This message can only be decrypted by using the
associated public key. A public key is much like an
address. If a message can be decrypted using a public
key, it must have been signed by the associated private
key.

3. Hashing
This is similar to encryption, but it is a one-way only
operation. You can only move in one direction. Hashing
refers to sealing data off with a code (like a fingerprint). It
is important to know that the tiniest change in the data
results in a completely different hash. The input data can
be any length, but the output data is a fixed length. In
Bitcoin, the output data yields a 32-byte hash.

With hashing, there is no way back. The original data can
never be retrieved from the resulting hash value. You
cannot go from the output back to the input. Further, re-
running the hash function over the same set of data will
always yield the exact same hash-value, proving that the
data is unchanged.

How does this create a blockchain?
A blockchain is built by combining the three technologies
above. A blockchain is a way of storing data. The data stored is
data concerning transactions. Transactional data is typically
stored in ledgers. The ledger is stored in a distributive way,
over a peer-to-peer network. Asymmetric cryptography is used
to sign transactions (public key is like the address and private
€3,49
Krijg toegang tot het volledige document:

100% tevredenheidsgarantie
Direct beschikbaar na je betaling
Lees online óf als PDF
Geen vaste maandelijkse kosten

Maak kennis met de verkoper
Seller avatar
emilyknight
5,0
(1)

Ook beschikbaar in voordeelbundel

Thumbnail
Voordeelbundel
Detailed notes on Governance and Regulation of Emerging Technologies (R_GRET)
-
1 6 2022
€ 20,94 Meer info

Maak kennis met de verkoper

Seller avatar
emilyknight Vrije Universiteit Amsterdam
Bekijk profiel
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
4
Lid sinds
3 jaar
Aantal volgers
3
Documenten
25
Laatst verkocht
1 jaar geleden

5,0

1 beoordelingen

5
1
4
0
3
0
2
0
1
0

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Veelgestelde vragen