BlockChain 1,2,3
BlockChain 1,2,3
HOMIES 1
5. History of Blockchain:
• 2008: Satoshi Nakamoto introduced Bitcoin through a paper, suggesting a new kind of digital
money.
• 2009: Bitcoin was officially launched, marking the beginning of blockchain technology.
• 2009-2013: Bitcoin gained attention from cryptography and technology enthusiasts.
• 2015: Vitalik Buterin proposed Ethereum, a new blockchain platform with added capabilities
like smart contracts.
• 2017: The popularity of blockchain projects and cryptocurrencies surged, with the beginning
of the Initial Coin Offerings (ICOs) boom.
• 2016-Present: Big companies started exploring blockchain for uses beyond cryptocurrencies,
such as supply chain management and data security.
• 2018-Present: Governments began issuing rules and regulations regarding cryptocurrencies
and blockchain technology to ensure consumer protection and proper functioning.
• 2020-Present: There has been a rise in decentralized finance (DeFi) projects, offering
financial services without traditional banks.
6. Distributed DBMS:
A Distributed Database Management System (DDBMS) is a software system that manages databases
across multiple computers or nodes in a network. Unlike a traditional centralized database system,
where all data is stored on a single server, a distributed DBMS distributes data across multiple nodes,
often located in different geographical locations.
• Public Blockchains: These are permissionless blockchains where anyone can participate,
read, or write data to the blockchain. Examples include Bitcoin and Ethereum.
HOMIES 2
• Private Blockchains: These are permissioned blockchains where access to read or write data
is restricted to a specific group of participants. They are often used by enterprises for internal
applications.
• Consortium Blockchains: Consortium blockchains are semi-decentralized, where a group of
organizations collaboratively controls the network. Membership is restricted to pre-approved
entities.
.
11. what is Mining Mechanism?
• Mining is the process by which new transactions are validated and added to the blockchain
ledger in a Proof of Work (PoW) consensus mechanism.
• Miners compete to solve complex mathematical puzzles, with the first one to find the solution
being rewarded with newly minted cryptocurrency and transaction fees.
• Mining ensures the security and immutability of the blockchain by making it computationally
expensive to alter transaction history.
HOMIES 3
13. what are the Features of Blockchain?
• Decentralization: No central authority controls the blockchain network.
• Transparency: All transactions are recorded on a public ledger, visible to all participants.
• Immutability: Once recorded, transactions cannot be altered or deleted.
• Security: Cryptography and consensus mechanisms ensure the integrity and security of
transactions.
• Efficiency: Automated processes and elimination of intermediaries streamline
transactions.
• Traceability: Every transaction can be traced back to its origin, enhancing accountability
and auditability.
HOMIES 4
UNIT 2 Cryptography and Cryptocurrency
1. what is cryptography?
Cryptography is the practice and study of techniques for secure communication in the
presence of third parties, often referred to as adversaries. It encompasses various methods for
ensuring the confidentiality, integrity, and authenticity of information. The primary goal of
cryptography is to make data unreadable or unintelligible to unauthorized individuals while
allowing authorized parties to access it.
Cryptography is like a secret code language that helps keep information safe when it's being
sent or stored. Imagine you have a message you want to send to a friend, but you don't want
anyone else to read it except your friend. Cryptography helps you do that.
• Key Pairs: In public-key cryptography, each user has a pair of keys: a public key and
a private key. These keys are mathematically related but are different from each other.
The public key can be freely shared with anyone, while the private key is kept secret.
• Encryption: When someone wants to send a secure message to another person, they
use the recipient's public key to encrypt the message. This means that only the
recipient, who has the corresponding private key, can decrypt and read the message.
Even if someone intercepts the encrypted message, they won't be able to decipher it
without the private key.
• Decryption: The recipient uses their private key to decrypt the encrypted message
and retrieve the original plaintext. Since the private key is kept secret, only the
intended recipient can decrypt the message.
• Digital Signatures: Public-key cryptography can also be used for digital signatures.
In this case, a user signs a message with their private key, and anyone with access to
the corresponding public key can verify the signature. This provides a way to
authenticate the sender and ensure that the message hasn't been tampered with.
• Security: Public-key cryptography relies on the mathematical complexity of certain
algorithms, such as RSA or Elliptic Curve Cryptography (ECC), to ensure security.
Breaking these algorithms would require immense computational power and is
currently considered infeasible with existing technology.
3.
• RSA: Rivest-Shamir-Adleman uses large prime numbers to encrypt and decrypt
data.
• ECC: Elliptic Curve Cryptography uses elliptic curves for creating keys and
ensuring security.
• Diffie-Hellman: Named after Whitfield Diffie and Martin Hellman. Diffie-Hellman
is a method for securely exchanging secret keys over insecure channels.
• DSA: Digital Signature Algorithm is an algorithm for generating digital signatures
based on discrete logarithms.
• ECDSA: Elliptic Curve Digital Signature Algorithm is a variant of DSA that uses
elliptic curves for enhanced security.
HOMIES 5
4. Combination in blockchain security: typically refers to the use of multiple security
measures and techniques to ensure the integrity, confidentiality, and availability of the
blockchain network and its data.
Some common elements of combination in blockchain security:
• Cryptographic Hash Functions
• Consensus Mechanisms
• Digital Signatures
• Encryption
• Multi-factor Authentication (MFA)
• Role-Based Access Control (RBAC)
• Network Security Measures
• Regular Auditing and Monitoring
HOMIES 6
Unit 3
➢ Proof of Work (PoW): PoW involves solving computational puzzles to add new blocks to
the blockchain. Miners compete to solve these puzzles, and the first one to solve it gets to add
the next block and receive a reward.
➢ Proof of Stake (PoS): PoS selects the creator of the next block based on the number of
cryptocurrency tokens (not specifically Bitcoin) they hold and are willing to "stake" as
collateral. Those with more tokens have a higher chance of being chosen to validate and add
the next block.
➢ Proof of Authority (PoA): PoA grants a predefined set of trusted nodes (validators or
authorities) the power to create new blocks and validate transactions based on their authority.
These nodes are typically known and trusted entities within the network.
➢ Proof of Elapsed Time (PoET): In PoET, nodes in the network generate random waiting
times, and the node with the shortest waiting time becomes the leader and can create the next
block. However, the concept of updating the block is more about adding the next block to the
blockchain rather than updating an existing block.
➢ Blockchain architecture:
refers to the design and structure of a blockchain network, including its components, layers, and
interactions. Here's an overview of the key elements of blockchain architecture:
• Network Layer:
o Nodes: These are individual computers or devices that participate in the blockchain
network. Nodes can be categorized as full nodes, which maintain a complete copy of the
blockchain ledger, or lightweight nodes, which only store a subset of the blockchain data.
o Peer-to-Peer (P2P) Communication: Nodes communicate with each other using a peer-
to-peer network protocol. This allows them to share information, propagate transactions,
and synchronize the blockchain ledger.
• Consensus Layer:
o Consensus Mechanism: This layer determines how consensus is reached among network
participants regarding the validity of transactions and the state of the blockchain ledger.
Common consensus mechanisms include Proof of Work (PoW), Proof of Stake (PoS), and
Practical Byzantine Fault Tolerance (PBFT).
o Block Validation: Consensus algorithms ensure that only valid transactions are included
in blocks and that blocks are added to the blockchain in a secure and decentralized
manner.
HOMIES 7
• Data Layer:
o Blocks: Blocks are containers that store a batch of transactions. Each block typically
includes a header containing metadata (such as a timestamp and a reference to the
previous block) and a list of transactions.
o Transactions: Transactions represent the transfer of assets or information between
participants in the blockchain network. They are cryptographically signed and recorded in
blocks.
o Cryptographic Hashing: Hash functions are used to create unique identifiers for blocks
and transactions, ensuring data integrity and immutability.
HOMIES 8