UNIT-II Notes
UNIT-II Notes
UNIT-II Notes
UNIT-2
1. Define a hash function and its properties. Describe how hash functions ensure
data integrity in Blockchain?
Hashing is a process used in computer science and cryptography to convert data of arbitrary
size into a fixed-size value or hash code. The primary purpose of hashing is to quickly and
efficiently retrieve or compare data. Instead of searching through an entire dataset or
comparing large amounts of data directly, you can use a hash function to generate a fixed-length
hash code that represents the original data.
A cryptographic hash function combines hash function message-passing capabilities with
security features. The original data cannot be recovered through decryption after conversion
since the algorithm is a one-way cryptographic function.
Hashing facilitates the generation of cryptographic signatures, which aid in the identification
of genuine transactions.
On the blockchain, hashing facilitates transaction tracking. Instead of looking for a
transaction, it is easier to copy the hash into a blockchain explorer where you may examine
the transaction details.
Hash functions, which condense the data into a small value while maintaining its integrity,
are a crucial component of digital signature algorithms.
Blockchain transactions and blocks are authenticated and data integrity is maintained via
digital signatures.
Hashing functions are crucial to crypto mining
2. Discuss about different types of Blockchain in detail.
Public Blockchain
• Public blockchains are open and permissionless networks where anyone can
participate, validate transactions, and contribute to the consensus process.
• These blockchains are decentralized, meaning they don't rely on a single entity for
control or decision-making.
• Public blockchains typically use a cryptocurrency as an incentive mechanism to reward
participants who perform tasks like mining or validating transactions.
• They provide transparency and immutability since anyone can verify transactions and
access the entire transaction history stored on the blockchain.
• Public blockchains are suitable for applications that require openness, transparency,
and trustless environments, such as decentralized finance (DeFi), tokenized assets, and
public voting systems.
Disadvantages
Heavy energy consumption required to maintain them. The concern is a consensus
mechanism that requires participants to compete to validate the information and
receive a reward for letting the network use their processing power.
Lack of complete privacy and anonymity. Public blockchains allow anyone to view
transaction amounts and the addresses involved. If the address owners become known,
the user loses their anonymity.
Most public blockchains are designed for cryptocurrencies, which by nature of their
value are a prime target for hackers and thieves.
Private Blockchain
Private blockchains, also known as permissioned blockchains, are restricted networks
where participation and access are controlled by a central authority or a group of trusted
entities.
They require permission to join, and participants are typically known and vetted.
Private blockchains often have a centralized governance model, allowing the controlling
entity to define the rules and consensus mechanisms.
Examples of private blockchain use cases include supply chain management, interbank
transactions, and enterprise solutions.
Private blockchains may or may not utilize a cryptocurrency or token, as they prioritize
confidentiality and controlled access over the open participation found in public
blockchains.
While private blockchains provide some level of transparency within the network, they
often limit public visibility to specific authorized parties.
Private blockchains are advantageous for situations where privacy, efficiency, and
scalability are essential, and a trusted network of participants exist
Disadvantages
private blockchains lose out on many of the valuable attributes of permissionless systems
simply because they are not widely applicable. They are instead built to accomplish specific
tasks and functions.
Consortium Blockchain
A consortium blockchain is a combination of multiple private blockchains belonging to
different organizations, where each of them forms a node on the chain as a stakeholder in
the alliance — and can only leave or join the network with the authorization of the
stakeholders.
Disadvantages
Limited Transparency ad Governance Challenge.
Hybrid Blockchain
A type of blockchain technology that combines elements of both private and public blockchain.
It lets organizations set up a private, permission-based system alongside a public
permissionless system, allowing them to control who can access specific data stored in the
blockchain, and what data will be opened up publicly.
Typically, transactions and records in a hybrid blockchain are not made public but can be
verified when needed, such as by allowing access through a smart contract. Confidential
information is kept inside the network but is still verifiable. Even though a private entity may
own the hybrid blockchain, it cannot alter transactions.
When a user joins a hybrid blockchain, they have full access to the network. The user's identity
is protected from other users, unless they engage in a transaction. Then, their identity is
revealed to the other party.
Disadvantages.
This type of blockchain isn't completely transparent because information can be shielded.
Upgrading can also be a challenge, and there is no incentive for users to participate or
contribute to the network.
Public Blockchain
• Public blockchains are open and permissionless networks where anyone can
participate, validate transactions, and contribute to the consensus process.
• These blockchains are decentralized, meaning they don't rely on a single entity for
control or decision-making.
• Public blockchains typically use a cryptocurrency as an incentive mechanism to reward
participants who perform tasks like mining or validating transactions.
• They provide transparency and immutability since anyone can verify transactions and
access the entire transaction history stored on the blockchain.
• Public blockchains are suitable for applications that require openness, transparency,
and trustless environments, such as decentralized finance (DeFi), tokenized assets, and
public voting systems.
Examples
• Bitcoin: The first and most well-known blockchain, primarily used for peer-to-peer
electronic cash transactions.
• Ethereum: A blockchain that supports smart contracts and decentralized applications
(DApps) in addition to cryptocurrency transactions.
As blockchain systems support and encourage transparent oversight, any company that
produces or sells goods that depend on other materials or labor could benefit. Data tracking
with comprehensive oversight in an immutable record lends itself to supply chain
management and logistics.
Supply chains—besides being responsible for bringing you everything in your life from your
tomatoes to your phone to your dinner table—are incredibly difficult to manage. Detailed
records must be preserved and safeguarded in tamper-free environments to ensure that
each raw material makes it across locations and through each stage of the manufacturing
process to become a completed, sellable product.
Bottlenecks have the potential to be disastrous in supply chain management. Paperwork can
be expensive and inefficient, and goods can be mislabeled or sourced unethically. This is
where blockchain tech comes in, streamlining and automating the supply chain process,
increasing transparency and time management, and smoothing logistics.
Entries on a blockchain can be used to queue up events with a supply chain — allocating
goods newly arrived at a port to different shipping containers, for example. Blockchain
provides a new and dynamic means of organizing tracking data and putting it to use.
Blockchain technology in banking and finance
International Payments
Blockchain provides a way to securely and efficiently create a tamper-proof log of sensitive
activity. This makes it excellent for international payments and money transfers.
in April 2018, Banco Santander launched the world’s first blockchain-based money transfer
service. Known as “Santander One Pay FX,” the service uses Ripple’s xCurrent to enable
customers to make same-day or next-day international money transfers.
By automating the entire process on the blockchain, Santander has reduced the number of
intermediaries typically required in these transactions, making the process more efficient.
As a large commercial bank, Santander has numerous retail clients who would benefit from
more efficient and cheaper payments, particularly in the area of international transfers.
Blockchain technology can be used to decrease the cost of these transfers by reducing the
need for banks to manually settle transactions.
Using this tech improves personal security for users of a given network, and data breaches
are much less likely to happen. Besides, blockchain use cases in healthcare can make many
operations faster and automate many of them, saving healthcare providers and patients
costs.
Patient Data Management
Public Blockchain
• Public blockchains are open and permissionless networks where anyone can
participate, validate transactions, and contribute to the consensus process.
• These blockchains are decentralized, meaning they don't rely on a single entity for
control or decision-making.
• Public blockchains typically use a cryptocurrency as an incentive mechanism to reward
participants who perform tasks like mining or validating transactions.
• They provide transparency and immutability since anyone can verify transactions and
access the entire transaction history stored on the blockchain.
• Public blockchains are suitable for applications that require openness, transparency,
and trustless environments, such as decentralized finance (DeFi), tokenized assets, and
public voting systems.
Private Blockchain
Private blockchains, also known as permissioned blockchains, are restricted networks
where participation and access are controlled by a central authority or a group of trusted
entities.
They require permission to join, and participants are typically known and vetted.
Private blockchains often have a centralized governance model, allowing the controlling
entity to define the rules and consensus mechanisms.
Examples of private blockchain use cases include supply chain management, interbank
transactions, and enterprise solutions.
Private blockchains may or may not utilize a cryptocurrency or token, as they prioritize
confidentiality and controlled access over the open participation found in public
blockchains.
While private blockchains provide some level of transparency within the network, they
often limit public visibility to specific authorized parties.
Private blockchains are advantageous for situations where privacy, efficiency, and
scalability are essential, and a trusted network of participants exist
Hash puzzles are used in blockchain networks because they are very difficult to solve but very
easy to verify. This means that it is very difficult for someone to cheat the system by trying to
submit invalid transactions, but it is very easy for the network to verify that a transaction is
valid once it has been solved.
The most common type of hash puzzle used in blockchain networks is the proof-of-work (PoW)
puzzle. In a PoW puzzle, miners try to find a value, called a nonce, that, when added to the
block's header, produces a hash with a certain number of leading zeros. The first miner to find
a nonce that satisfies this condition is awarded a reward for their work, and the block is added
to the blockchain.
Hash puzzles are a key part of the security and integrity of blockchain networks. They help to
ensure that transactions are valid and that the blockchain cannot be tampered with.
Since the hash function used in cryptocurrencies, such as SHA-256 in Bitcoin, is deterministic,
finding a nonce that results in a desired hash value requires a trial-and-error approach. Miners
must perform numerous computations, changing the nonce each time, until they find a valid
solution that satisfies the specified criteria. This process is resource-intensive and requires
substantial computational power.
Hash puzzles serve several important purposes:
• Consensus Mechanism: By making the process of finding a valid solution difficult and
resource-intensive, hash puzzles provide a way to establish consensus among participants
in a decentralized network. Miners invest computational power to compete for the right to
create new blocks, ensuring that only valid and legitimate transactions are added to the
blockchain.
• Block Creation and Reward Distribution: Hash puzzles incentivize miners to contribute
their computational resources to secure the network and maintain the blockchain. Miners
are rewarded with cryptocurrency tokens for successfully solving the hash puzzle and
adding new blocks to the chain.
• Block Time and Blockchain Stability: The difficulty of the hash puzzle can be adjusted
dynamically to regulate the block creation rate and maintain a stable blockchain. This
adjustment helps ensure that blocks are added at a consistent pace and prevents the
blockchain from growing too rapidly or too slowly.
Identity Management
Identity management is the framework of processes, policies, and technologies to ensure that
only authorized people have access to technology resources, information, or services.
A digital identity is the total information about an individual or organization that exists online.
Data that forms a digital identity includes usernames, buying history, ID number, and search
history.
Almost all of our digital identities are connected through devices, services, and apps that have
dominantly used centralized and federated identity systems
There are a number of blockchain-based digital identity verification solutions currently
being developed, including:
• Self-sovereign identity: This is a system where individuals control their own identity data
and can share it with third parties as needed. This can help to improve privacy and security,
as individuals can choose who they share their data with.
• Decentralized identifier (DID): A DID is a unique identifier that can be used to represent a
person or entity on the blockchain. DIDs can be used to create verifiable credentials, which
are digital certificates that can be used to prove identity or other attributes.
• Blockchain-based biometrics: Biometric authentication, such as fingerprint scanning or
facial recognition, can be used to verify identity on the blockchain. This can be a more secure
way to verify identity than traditional methods, such as passwords and PINs.
NFTs shift the crypto paradigm by making each token unique and irreplaceable, making it
impossible for one non-fungible token to be "equal" to another.
They are extensible, meaning you can combine one NFT with another to create a third,
unique NFT.
Examples of NFTs
The most famous use case for NFTs is that of cryptokitties. Launched in November 2017,
cryptokitties are digital representations of cats with unique identifications on Ethereum’s
blockchain.
Each kitty is unique and has a different price. They "reproduce" among themselves and create
new offspring with other attributes and valuations compared to their "parents."
Much of the earlier market for NFTs was centered around digital art
Digital art is a technique used to create any art digitally by using technologies. If these Digital
art is combined with Blockchain Technology for ensuring security and authentication the we
call it as crypto art.
Crypto art is digital art that uses blockchain technology to verify ownership. Just as an original
Matisse can have its authenticity verified, crypto art uses a non-fungible token (NFT) for
verification. The work’s uniqueness is what makes it valuable, because unlike ordinary digital
art that can be easily replicated, crypto art is one-of-a-kind.
How does blockchain add value to digital art
The thing that makes blockchain revolutionary for digital art is the ability to prove authenticity
and scarcity for digital artworks. Before blockchain, a digital artwork could be copied
identically, making it difficult to build a market around digital art.
Authenticity
Blockchain’s ledger technology, which acts as a public record tracking system, makes it possible
for anyone to track the history of an artwork. This allows you (the artist) to show the entirety
of the artwork’s life on this publicly trackable database, therefore proving the authenticity of a
digital artwork in a way that was impossible to do before.
Scarcity
Not only does tracking a digital artwork via blockchain allow you to prove a work is authentic,
but it also allows you to prove its scarcity. Only works that are tracked on the blockchain as
unique tokens are the originals, meaning you can prove which works are original and therefore
create scarcity for your digital pieces
9. What is Blockchain Neutrality. Discuss about the factors that affect Blockchain
neutrality.
• Blockchain neutrality is the principle that all blockchain networks should be treated
equally by regulators and other stakeholders. This means that no single blockchain
network should be given preferential treatment, and that all networks should have the
same opportunities to succeed.
• Blockchain neutrality is important for a number of reasons. First, it helps to ensure that the
market for blockchain technology is fair and competitive. Second, it helps to promote
innovation, as it allows new blockchain networks to enter the market and compete with
existing networks. Third, it helps to protect consumers, as it ensures that they have access
to a variety of blockchain networks to choose from.
• There are a number of challenges to achieving blockchain neutrality. One challenge is that
different blockchain networks have different features and capabilities. This can make it
difficult to compare different networks and to determine which network is best for a
particular application. Another challenge is that there is a lack of consensus on what
constitutes blockchain neutrality. This can lead to disagreements between regulators,
businesses, and other stakeholders about how to implement blockchain neutrality.
51% Attacks
When a miner or group of miners own more than 51% of the computing power in the network,
they can compromise the neutrality of the system.
Centralization Pressure
Corporate interests and governments can pressure network providers to centralize the system,
compromising its neutrality.
Technical Difficulties
Maintaining the protocol's neutrality requires constant attention and technical expertise from
programmers and crypto experts.
The extensibility of a blockchain refers to its ability to accommodate changes and improvements over
time without compromising its core functionalities, security, and consensus mechanisms. Blockchain
extensibility is an important aspect because it allows the technology to evolve and adapt to new
requirements, use cases, and technological advancements.