Notes Module 1 Introduction to Block chain
Notes Module 1 Introduction to Block chain
Business runs on information. The faster it’s received and the more accurate it is, the better.
Blockchain is ideal for delivering that information because it provides immediate, shared and
completely transparent information stored on an immutable ledger that can be accessed only
by permissioned network members. A blockchain network can track orders, payments,
accounts, production and much more. And because members share a single view of the truth,
you can see all details of a transaction end to end, giving you greater confidence, as well as
new efficiencies and opportunities.
Advantages of Centralization
There are undoubtedly multiple benefits or advantages of centralization. They are listed below.
1. Command chain
With centralized, the command chain is clearly defined. If an organization utilizes
centralization, they know the chain of command. This means that every person in the
organization knows their role and whom they need to report too. They also know which person
is under their control and are responsible for their subordinates’ actions as well.
All of these also mean that delegation is easy in the chain. Senior executives can easily delegate
work to their subordinates and finalize and finish the work in the best possible way. If work is
successfully completed, it creates a level of trust among the workers and chain, improving the
confidence required to make it work.
When it comes to a network that utilizes centralization, one central node or a collection of
nodes are responsible for transactional verification.
2. Reduced Costs
One of the biggest advantages of centralization is the cost associated with it. Any centralized
network or infrastructure requires less support and cost. As centralized organizations or
networks are pre-planned, the costs associated with it do not cross budgets until and unless it
is absolutely required to expand the network.
3. Quick Decision Implementation
There is no doubt that centralization organizations or networks enable quick decision
implementation. As centralized networks have fewer nodes or people, it requires less
communication among the different levels of authorization.
Also, if a centralized network decides to implement a change, it can be done in a matter of
minutes. For instance, a centralized network can put more stress on the KYC procedure and
decided to add more requirements for it. As the network is centralized, they can push the new
guidelines or change the KYC procedure which can go live almost instantly after proper testing.
Disadvantages of Centralization
There are also various disadvantages of centralization. Some of them are as below:
1. Trust
Even though centralized organizations are secure and trustable, they are not 100% secure or
trustable. The trust is an agreement that is set by the service provider and the user.
However, that’s an agreement and it can break easily. Big corporations suffer from trust issues
from their users, from time to time.
It happens when there is a lapse of security in the system, people tend to ignore the service for
some time before the service provider mends the trust by offering solutions and remuneration
to those affected.
All of this happens because of centralization and the reason that all the data are stored in a
centralized database.
2. Single point of failure
Centralization also means that the whole network is dependent on a single point of failure.
Organizations know about the disadvantage and hence have deployed measures to contain it.
However, the fact that there is a chance for failure is a big disadvantage for mission-critical
services.
3. Scalability Limitation
As a single server is used in most cases, it leads to scalability limitations.
What’s the current state of Centralization?
Centralization is undoubtedly an effective way to manage organizations or networks. It has
been effectively used by big organizations such as Microsoft, Facebook, Yahoo, and so on. In
fact, our governments are also reliant on a centralized approach.
In the case of a centralized government, the political executives coordinate the power. You can
also exert the power in multiple cases.
For a big corporation, centralization ensures that its data remains safe. This is needed so that
their trade secrets do not get leaked. However, there is a modified way of handling the data
with the option to use decentralized networks such as blockchain.
We can easily say that centralization is still very prevalent in the current market. And, not all
businesses don’t need to adopt decentralization just for the sake of it. Different business models
thrive in a centralized network and it will take a while before more and more business move
towards decentralized models.
What is Decentralization? And, How Does It Work?
The idea of decentralization is new. It came to light with the release of bitcoin in 2009. It also
introduced one new cool concept that makes decentralization possible, i.e., blockchain
technology. Here if one user sends bitcoin to another user, it doesn’t have to go through a
centralized authority.
However, this doesn’t mean that the transaction is not verified. The transactions are verified
with the use of consensus algorithms.
The network used by bitcoin is connectable by anyone.
That means it is open. It also exhibited other key features such as transparency, where anyone
can verify the transactions if needed. In such a network, a person or machine that connects to
the network is termed as “node.” In the end, there will be a network with thousands of nodes
that are capable of sending and receiving funds from each other.
Let’s take a real-world example to understand the concept.
A decentralized energy network is where people can connect and buy energy from other
independent entries. This way, they do not have to pay the intermediaries for accessing energy
in the first place.
The distributed energy network relies on blockchain technology with no need for a centralized
authority. The nodes that are generating the energy can share it with the network and get paid
for it.
Advantages of Decentralization
There are multiple advantages of decentralization.
1. Full Control
One of the most significant advantages of decentralization is that the users are in full control
of their transactions.
This means that they can start a transaction when they want without the need to authorize it
from a centralized authority. In simple terms that the verification process is not dependent on
third-parties and a decentralized network utilizes consensus methods to verify the information.
2. Data cannot be altered or deleted
Blockchain technology’s data structure is append-only. This means that there is no chance for
anyone to modify or alter the data once it is stored. There is another blockchain technology that
utilizes different data models such as Corda, but they also follow the immutability property.
3. Secure
Decentralized networks are secure because of how they handle data and transactions. They use
cryptography to ensure that the data ledgers are secure. Also, the data in the current block
require data from the adjacent block so that it can use cryptography to validate the data.
4. Censorship
Decentralization also means less censorship. In a centralized system, there are more chances
that information can be censored. However, the decentralized network is less prone to
censorship, as there is no central authority that controls the data. Let’s take an example to
understand the scenario.
Twitter, for example, is known to censor accounts as it finds some offensive posts or does it
when the government tries to censor accounts if it goes against their agenda.
In the case of decentralization, peers can interact directly, and hence there is no or less
censorship.
5. Open development
Decentralized networks mostly support open development. This is because of its nature and
how it operates. By having an open development environment, the network gets amazing
services, tools, and products built on top of it.
Linux, for example, is open-source and has an ecosystem that enables anyone to improve on it.
The same is true for decentralized networks. In comparison, a centralized network or closed
solutions do not get the chance to have open development. This limits development to a great
extent.
Disadvantages of Decentralization
There are of course many disadvantages of decentralization. Some of the disadvantages include
the following:
1. Conflict: Decentralization can lead to conflict if it is not well maintained in an
organizational structure
2. Cost: In an organizational setting, decentralization can cost more than centralization as
it requires setting up of systems that can make communication more automatic.
3. Crime: When it comes to decentralized blockchain, then the crime can be one big
disadvantage. As everything is done on the network is anonymous and can lead to
misuse.
4. Volatility: Decentralized cryptocurrency shows volatile behavior where the prices
fluctuate a lot!
What is the current state of Decentralization?
Decentralization is here to stay. You’ll see that many of the major companies, organizations,
and even governments are adopting it as it offers more efficiency to the network in the long
run.
Dubai is one of the first waves of governments that are currently adopting blockchain to its
whole governance structure. It is now termed as the blockchain development world capital, as
decentralization or blockchain technology is influencing it.
At the time of writing, Dubai has been able to integrate blockchain into eight industry sectors,
including real estate, tourism, security, transportation, finance, health, and education. The end
result is to become the world’s first blockchain city.
IBM is also at the forefront of embracing blockchain technology and using it to improve the
food supply chain.
They created IBM Food Trust, which is all about bringing efficiency and transparency to food
supply chains. They are working in conjunction with Walmart and benefit all the participants
in the network with actionable and traceable information.
There are also various decentralized ledger projects out there including the likes of
Hyperledger, Corda, and others.
Use-cases Centralized vs Decentralized
All these use-cases will help you better understand how each of these concepts differentiates
and how decentralization can really help to solve some of the key core problems of centralized
systems.
Payments System
One of the most obvious use-cases of decentralization is the payment system. After all, the
concept itself arose with the introduction of bitcoin, the first event decentralized currency.
All the currencies in the world that are operated by banks work on top of centralized servers.
By doing so, they have full control over all the operations and also know about all your entire
financial activities.
This means that they know about your spending habits. However, one of the worst things about
using a centralized currency is that if someone gets hold of your bank credentials, they can
easily access all your money and use it for their own benefit.
Another disadvantage of centralized payment systems is that there can be a disruption or failure
and you will not be able to access your funds when you need it.
So, how does a decentralized system solve all of these? Well, by being decentralized. As there
is no central authority or point of failure, your funds are always available.
It also removes the chance of your funds getting hacked or accessed by a malicious actor. So,
if you use cryptocurrency as a way to receive and send payments, you take out the role of the
centralized entity from the process — improving it in all the way. You can term these
cryptocurrencies as peer-to-peer digital currencies.
Another benefit of the payment system is the removal of intermediate fees. The only fees that
are associated with the process are either small or non-existent. They are also borderless and
secure.
So, what are the pros of using a global payment system? They are as below.
Quick transactions
Cheap transactions
No information is shared among the third party
Secure
No single point of failure
Transparent
Government Voting
Voting has always been a controversial topic among the government and the people who
choose the government. The opposing parties are also keen to use the topic to find a way to
defend themselves. So, what actually happens.
The whole voting scenario is dealing with one most important issue, transparency. The current
way of carrying out the vote doesn’t take transparency into account. This results in a lot of
conspiracy theories on how the votes are manipulated internally. As these theories exist, there
is no way to validate them as the system is not transparent.
That’s where a decentralized voting platform can come into rescue. Governments can use it to
run the votes and provide transparent voting. This way, they can rest all the theories that come
out when general election results are declared.
By using a transparent voting system or a voting system running on a decentralized network,
the voters can easily verify the votes. This also means that no party can do frauds when it comes
to counting of votes. Another benefit of using this approach is that results can be declared as
soon as voting is finished.
So, what are the benefits of a decentralized voting system?
There won’t be any manipulation or fraud
No conspiracy theories
No threats
Energy
Right now, centralized entities mainly control and distribute the energy who decide where they
want to provide their services and at what price.
To solve this, decentralization can come up with a unique solution. It can use a decentralized
power grid which you can use to cut the middleman.
Both centralized and decentralized have their own benefits. There is no doubt that governments,
organizations, and companies want control over their assets, even when they have to give up
efficiency for the sake of it.
But, decentralization is here to stay! And, with time, it will grow as more companies will realize
the benefit of it. Also, you can also implement decentralization with a sustainable close
environment and with the help of hybrid or federated blockchain solutions.
This leads us to the end of our decentralized vs centralized guide. By now, you should have a
good idea of what each of them has to offer.
Problem to be solved
Over the internet, we need intermediaries to solve the integrity problem. Though you can
share data files, photos, etc., easily over the internet, the same doesn’t hold for money
because there is the risk of double-spending.
Breakthrough
The blockchain offers a consensus mechanism that could solve the double-spend problem
through the time stamping of the first transaction and all the transactions thereon.
To be valid, every new block on the chain must refer to the preceding block. In addition, the
proof of work mechanism ensures integrity over the bitcoin blockchain.
Implication
The authors say — “Trust is the sine qua non of the digital economy, and a platform for
secure and reliable mass collaboration holds many possibilities for a new kind of
organization and society.”
2. Distributed Power
Principle
The power is distributed across the network with no single point of control. As a result, no
single party can shut the system down. And, if someone tries to do that, the system will still
survive.
Problem to be solved
Big organizations or central powers have proven time and again that they can use the power
of data without the user’s knowledge and implement large-scale changes without the user’s
consent.
Breakthrough
Blockchain means mass collaboration at its best. The user has the power over their data and
the level of participation.
broadcasted to everyone. Nothing is with a central third party; nothing is stored on a central
server.
Implication
A platform to enable distributed models of wealth creation
A peer-to-peer collaboration to transfer real powers to the citizens
3. Value as Incentive
Principle
A blockchain is designed to incentivize its users and people who want to hold on to these
incentives.
Problem to be solved
The concentration of power over the internet
Improper use of data because of invariable incentives over the dot com era
People who receive the incentive do not bother when the data gets leaked because it is
the consumers who ultimately clean up the mess themselves. For example — when
your credit card details are leaked, it's not the financial institution that takes care of
the mess but leaves you to block the old and order a fresh one.
Breakthrough
The extreme resources requirement and the reward mechanism ensure that participants do the
right thing. And, even if their intentions are not right, it ultimately benefits the overall
system.
Implication
The internet era does not punish the offenders in any way. But imagine a troll on
blockchain social media — they can lose their reputation score for bad behaviour.
Plus, the good performers who collaborate effectively are rewarded.
4. Security
Principle
The use of cryptography is efficient and provides confidentiality, authenticity, and
nonrepudiation.
Consequences of reckless behaviour are isolated to the person who behaves
recklessly.
Problem to be solved
Hacking, identity theft, frauds, cyberbullying, phishing, spam, malware, ransomware
The current reliance on ‘strong’ passwords because the service provider essentially is
not responsible for our safety
If the next stage of the digital revolution involves communicating money directly
between multiple parties, then communication needs to be hackproof.
Breakthrough
PKI — Public Key Infrastructure
Encryption is based on two keys — one for encryption and another for decryption.
The bitcoin blockchain runs on the very well-known and established SHA-256
published by the U.S. National Institute of Standards and Technology.
Digital currencies like Bitcoin aren’t stored on a file; A cryptographic hash represents
them.
Implication
A secure design that is transparent and protects what happens to our data.
5. Privacy
Principle
People get to be in complete control of their data.
Problem to be solved
Double privacy offenses — Firstly, collecting and using our data without our understanding
and permission. Secondly, it does not ensure protection from hackers.
Breakthrough
On a blockchain like bitcoin, you need not provide an identity. In addition, because the
software is open-source, it is unnecessary to store data and use it for marketing.
Credit cards are a very identity-centric model, so hackers are keen to steal this data from big
companies and use it.
On a blockchain, information is available for everyone to read and digest, yet it doesn't
breach the fort of privacy.
Implication
A complete shift from ‘BIG Data’ to “LITTLE Data’
6. Rights Preserved
Principle
The author says — “Ownership rights are transparent and enforceable. Individual freedoms
are recognized and respected. We hold this truth to be self-evident — that all of us are born
with certain inalienable rights that should and can be protected.”
Problem to be solved
Anonymous online censorship
Authorities or software blocking privacy and online rights
Intermediaries and the cost attached
Piracy
Breakthrough
Proof of Existence (PoE) is a site that creates and registers cryptographic digests of deeds,
titles, receipts, or licenses on the blockchain. It doesn’t maintain a copy of any original
document; the document's hash is calculated on the user’s machine, not on the PoE site, thus
ensuring the confidentiality of content.
In addition to such a concept, smart contracts over the blockchain allow assigning usage
rights to another party. A smart contract also allows owners of assets to pool their resources
and create a corporation on the blockchain.
Implication
Clarity, enforcement, and correct usage of property/assets rights over the blockchain
economy.
7. Inclusion
Principle
The economy works best when it works for everyone. That means lowering the barriers to
participation.
Problem to be solved
A large population on our planet is still excluded from the internet and the financial system,
hence economic opportunities.
And though platforms assist or provide a solution to this problem, the costs are too high.
Consumers at the bottom of the pyramid still can’t afford minimum account balances,
minimum payment amounts, or transaction fees to use the system.
Breakthrough
Blockchain works over the internet, but they can work without it too. So anyone with a
simple phone can participate in the blockchain.
When governments are in financial trouble, they print more money and then profit from the
difference between the cost of manufacturing and the face value of the currency. But for the
poor and the larger audience, it means a loss of savings and the value of their current
holdings.
Implication
The first era of the internet benefited many, but the overall prosperity flows to few hands.
The foundation of prosperity is inclusion, and blockchains can help.
High Security –
It is secure Due to Mining (51% rule).
Open Environment –
The public blockchain is open for all.
Anonymous Nature –
In public blockchain every one is anonymous. There is no need to use your real name,
or real identity, therefore everything would stay hidden, and no one can track you
based on that.
No Regulations –
Public blockchain doesn’t have any regulations that the nodes have to follow. So,
there is no limit to how one can use this platform for their betterment
Full Transparency –
Public blockchain allow you to see the ledger anytime you want. There is no scope for
any corruption or any discrepancies and everyone has to maintain the ledger and
participate in consensus.
True Decentralization –
In this type of blockchain, there isn’t a centralized entity. Thus, the responsibility of
maintaining the network is solely on the nodes. They are updating the ledger, and it
promotes fairness with help from a consensus algorithm .
Immutable –
When something is written to the blockchain, it can not be changed.
Distributed –
The database is not centralized like in a client-server approach, and all nodes in the
blockchain participate in the transaction validation.
Permissioned or private blockchain.
A private, or permissioned, blockchain allows organizations to set controls on who can access
blockchain data. Only users who are granted permissions can access specific sets of data.
Oracle Blockchain Platform is a permissioned blockchain.
A private blockchain is managed by a network administrator and participants need consent to
join the network i.e., a private blockchain is a permissioned blockchain. There are one or
more entities which control the network and this leads to reliance on third-parties to transact.
In this type of blockchain only entity participating in the transaction have knowledge about
the transaction performed whereas others will not able to access it i.e. transactions are
private.
Some of the features of private blockchain are :
Full Privacy –
It focus on privacy concerns.
Better Scalability –
Being able to add nodes and services on demand can provide a great advantage to the
enterprise.
Difference between Public and Private blockchain :
S.no Basis of Comparison Public BlockChain Private BlockChain
According to some blockchain professionals, there are five layers of blockchain technology:
Layer 0
Layer 1
Layer 2
Layer 3
Hardware infrastructure layer
The blockchain's content is stored on a server in a data center somewhere on this lovely
globe. Clients request content or data from application servers while browsing the web or
utilizing any apps, which is known as the client-server architecture.
Clients can now connect with peer clients and share data. A peer-to-peer (P2P) network is a
large group of computers that share data. Blockchain is a peer-to-peer network of computers
that computes, validates and records transactions in an orderly manner in a shared ledger. As
a result, a distributed database is created, storing all data, transactions and other pertinent
data. A node is a computer in a P2P network.
Data layer
A blockchain's data structure is expressed as a linked list of blocks in which transactions are
ordered. The data structure of the blockchain consists of two fundamental elements: pointers
and a linked list. A linked list is a list of chained blocks with data and pointers to the previous
block.
Pointers are variables that refer to the position of another variable, and a linked list is a list of
chained blocks with data and pointers to the previous block. The Merkle tree is a binary tree
of hashes. Each block contains the root hash of the Merkle tree and information like the
preceding block's hash, timestamp, nonce, block version number and current difficulty goal.
For blockchain systems, a Merkle tree provides security, integrity and irrefutability. The
blockchain system is built on Merkle trees, cryptography and consensus algorithms. Because
it is the first in the chain, the genesis block, i.e., the first block, does not contain the pointer.
To protect the security and integrity of the data contained in blockchain, transactions are
digitally signed. A private key is used to sign transactions, and anyone with the public key
may verify the signer. The digital signature detects information manipulation. Because the
data that is encrypted is also signed, digital signatures ensure unity. As a result, any
manipulation will render the signature invalid.
The data cannot be discovered because it is encrypted. It cannot be tampered with again, even
if it is caught. The sender's or owner's identity is also protected by a digital signature. As a
result, a signature is legally linked to its owner and cannot be disregarded.
Network layer
The network layer, commonly referred to as the P2P layer, is responsible for inter-node
communication. Discovery, transactions and block propagation are all handled by the
network layer. Propagation layer is another name for this layer.
This P2P layer ensures that nodes can find one other and interact, disseminate and
synchronize to keep the blockchain network in a legitimate state. A P2P network is a
computer network in which nodes are distributed and share the workload of the network to
achieve a common purpose. The blockchain's transactions are carried out by nodes.
Consensus layer
The consensus layer is essential for blockchain platforms to exist. The consensus layer is the
most necessary and critical layer in any blockchain, whether it is Ethereum, Hyperledger or
another. The consensus layer is in charge of validating the blocks, ordering them and
guaranteeing that everyone agrees.
Application layer
Smart contracts, chaincode and decentralized applications (DApps) make up the application
layer. The application layer protocols are further subdivided into the application and the
execution layers. The application layer comprises the programs that end-users utilize to
communicate with the blockchain network. Scripts, application programming interfaces
(APIs), user interfaces and frameworks are all part of it.
The blockchain network serves as the back-end technology for these applications, and they
communicate with it via APIs. Smart contracts, underlying rules and chaincode are all part of
the execution layer.
Although a transaction moves from the application layer to the execution layer, it is validated
and executed at the semantic layer. Applications give instructions to the execution layer,
which executes transactions and ensures the blockchain's deterministic nature.
1.8 Cryptography and Data structures for BCT (Tree, Merkel Tree)
A blockchain is a database that is distributed among the nodes of a computer network. It stores
the database in a digital format. The innovation of blockchain is that it guarantees the security
of records of data and generates trust without the involvement of a third party. Blockchain is a
shared database that stores information and encrypts data in blocks and is linked with the
method of cryptography, as the new block enters the network it is chained to the previous block
and makes the data chained together.
Cryptography
Cryptography is a technique or a set of protocols that secure the information from any third
party during a process of communication. It is also made up of two Greek terms, Kryptos term
meaning “hidden” and Graphein, a term meaning “to write”. Some terminologies related to
Cryptography:
Encryption: Conversion of normal text to a random sequence of bits.
Key: Some amount of information is required to get the information of the
cryptographic algorithm.
Decryption: The inverse process of encryption, conversion of Random sequence of
bits to plaintext.
Cipher: The mathematical function, i.e. a cryptographic algorithm which is used to
convert plaintext to ciphertext(Random sequence of bits).
Types of Cryptography
The two types of cryptography are:
Symmetric-key cryptography.
Asymmetric-key cryptography.
1. Symmetric-key Encryption: It focuses on a similar key for encryption as well as
decryption. Most importantly, the symmetric key encryption method is also applicable to
secure website connections or encryption of data. It is also referred to as secret-key
cryptography. The only problem is that the sender and receiver exchange keys in a secure
manner. The popular symmetric-key cryptography system is Data Encryption System(DES).
The cryptographic algorithm utilizes the key in a cipher to encrypt the data and the data must
be accessed. A person entrusted with the secret key can decrypt the data. Examples: AES, DES,
etc.
Some important points:
It is also known as – Secret key cryptography.
Both the parties have the same key to keeping secrets.
It is suited for bulk encryptions.
It requires less computational power and faster transfer.
Symmetric Cryptography
2. Asymmetric-key Encryption: This cryptographic method uses different keys for the
encryption and decryption process. This encryption method uses the public and private key
methods. This public key method help completely unknown parties to share information
between them like email id. private key helps to decrypt the messages and it also helps in the
verification of the digital signature. The mathematical relation between the keys is that the
private key cannot be derived from the public key, but the public key can be derived from the
private key. Example: ECC,DSS etc.
Some important points:
It is also known as Public-key cryptography.
It is often used for sharing secret keys of symmetric cryptography.
It requires a long processing time for execution.
Plays a significant role in website server authenticity.
Asymmetric Cryptography
Cryptography Hash Function in Blockchain
One of the most notable uses of cryptography is cryptographic hashing. Hashing enables
immutability in the blockchain. The encryption in cryptographic hashing does not involve any
use of keys. When a transaction is verified hash algorithm adds the hash to the block, and a
new unique hash is added to the block from the original transaction. Hashing continues to
combine or make new hashes, but the original footprint is still accessible. The single combined
hash is called the root hash. Hash Function helps in linking the block as well as maintaining
the integrity of data inside the block and any alteration in the block data leads to a break of the
blockchain. Some commonly used hashed function is MD5 and SHA-1.
Properties of Cryptographic Hash:
For a particular message hash function does not change.
Every minor change in data will result in a change in a major change in the hash value.
The input value cannot be guessed from the output hash function.
They are fast and efficient as they largely rely on bitwise operations.
Benefits of Hash function in Blockchain:
5. Reduce the bandwidth of the transaction.
6. Prevent the modification in the data block.
7. Make verification of the transaction easier.
Role of Cryptography in Blockchain
Blockchain is developed with a range of different cryptography concepts. The development of
cryptography technology promotes restrictions for the further development of blockchain.
In the blockchain, cryptography is mainly used to protect user privacy and transaction
information and ensure data consistency.
The core technologies of cryptography include symmetric encryption and asymmetric
encryption.
Asymmetric cryptography uses digital signatures for verification purposes, every
transaction recorded to the block is signed by the sender by digital signature and ensures
that the data is not corrupted.
Cryptography plays a key role in keeping the public network secure, so making it fit to maintain
the integrity and security of blockchain.
Use of Cryptographic Hash Functions
As the blockchain is also public to everyone it is important to secure data in the blockchain and
keeps the data of the user safe from malicious hands. So, this can be achieved easily by
cryptography.
When the transaction is verified through a hash algorithm, it is added to the blockchain,
and as the transaction becomes confirmed it is added to the network making a chain of
blocks.
Cryptography uses mathematical codes, it ensures the users to whom the data is
intended can obtain it for reading and processing the transaction.
Many new tools related to the application of cryptography in blockchain have emerged
over the years with diverse functionalities.
Benefits of Cryptography in Blockchain
There are a huge number of benefits of cryptography in blockchain some of them are stated
below:
Encryption: Cryptography uses asymmetric encryption to ensure that the transaction
on their network guards the information and communication against unauthorized
revelation and access to information.
Immutability: This feature of cryptography makes it important for blockchain and
makes it possible for blocks to get securely linked by other blocks and also to ensure
the reliability of data stored in the blockchain, it also ensures that no attacker can derive
a valid signature for unposed queries from previous queries and their corresponding
signatures.
Security: Cryptography makes the records of transactions easier using encryption of
data, and accessing of data using public and private keys. Cryptographic hashing
tampering with data is not possible, making blockchain more secure.
Scalability: Cryptography makes the transaction irreversible giving the assurance that
all users can rely on the accuracy of the digital ledger. It allows limitless transactions
to be recorded securely in the network.
Non-repudiation: The digital signature provides the non-repudiation service to guard
against any denial of a message passed by the sender. This benefit can be associated
with the collision resistance i.e.; since every input value has a unique hash function so
there is no clash between the messages that are sent and one message can be easily
differentiated from the other.
Prevent hackers: The digital signature prevents hackers from altering the data because
if the data changes, the digital signature becomes invalid. With the help of
cryptography, it protects the data from hackers and makes cryptography in blockchain
unstoppable.