Block Chain Material
Block Chain Material
History of Blockchain
Timelin
e Blockchain Bitcoin Ethereum
Satoshi Nakamoto
conceptualized the concept
of “Distributed Blockchain”
2008 NA NA
in his white paper: ”A Peer
to Peer Electronic Cash
System”.
● James Howells
was an IT
worker in the
United
Kingdom, who
2009 starts mining NA
bitcoin.
● Satoshi
Nakamoto
Releases Bitcoin
White Paper
Ethereum
Blockchain Is
2014 Blockchain 2.0 is born. NA
Funded By
Crowdsale
Timelin
e Blockchain Bitcoin Ethereum
Ethereum
Linux Foundation launched Frontier
2015 NA
the Hyperledger project. Network was
launched
Block.one company
introduced the EOS Japan recognized Bitcoin
2017 NA
blockchain operating as a legal currency.
system.
Ethereum
network
2019 NA NA transactions
exceeded 1
million per day.
Ethereum
launched
2020 Stablecoins saw a rise. NA Beacon Chain in
preparation for
Ethereum 2.0.
2022 NA NA Ethereum
Merge.
Ethereum’s
consensus
mechanism is
Timelin
e Blockchain Bitcoin Ethereum
now PoS.
Characteristics of blockchain
Below are some of the important features of blockchain that make it super!
1. Data immutability: This is the top-most feature as it ensures that no data
is corrupted. How this works is that every node on the system has a copy
of the ledger. So, to alter any data, there must be an unanimous
agreement of every node. This makes blockchain secure and transparent.
2. Decentralized: Blockchain is decentralized, meaning that no authority or
government, a group of persons, or a single individual controls this
technology. Rather, it is a group of nodes that manage the whole
transaction.
3. Single source of truth: In a blockchain, there is only one source of truth,
the distributed ledger. So, to know who owns what, or to study a
particular transaction, you only need to go to one place.
4. Transparency or provenance: Every transaction, be it tangible or non-
tangible, can be traced from the start to the finish with blockchain.
5. Consensus algorithm: For a transaction to be accepted and recorded on
the blockchain, all the participants or nodes must agree to follow the
same rules.
6. Anonymous: It is true that every transaction is transparent and open to the
public, but the actual persons are kept anonymous through the addresses.
For example, suppose a person sends a sum of money, the receiver will
know that the sender is linked to a bitcoin address, but they will not know
the actual address. There are several reasons for this – one of them is
privacy.
FUNDAMENTALS OF BLOCK CHAIN
Distributed ledger technology
All network participants have access to the distributed ledger and its
immutable record of transactions. With this shared ledger, transactions are
recorded only once, eliminating the duplication of effort that’s typical of
traditional business networks.
Immutable records
No participant can change or tamper with a transaction after it’s been
recorded to the shared ledger. If a transaction record includes an error, a
new transaction must be added to reverse the error, and both transactions
are then visible.
Smart contracts
To speed transactions, a set of rules that are called a smart contract is stored
on the blockchain and run automatically. A smart contract defines conditions
for corporate bond transfers, include terms for travel insurance to be paid
and much more.
How blockchain works
●
A blockchain is a digital ledger of transactions distributed across the
entire network of computers (or nodes) on the blockchain.
Distributed ledgers use independent nodes to record, share, and
synchronize transactions in their respective electronic ledgers
instead of keeping them in one centralized server. A blockchain uses
several technologies like digital signatures, distributed networks,
encryption/ decryption methods, and distributed ledger technology
to enable blockchain applications. Blockchain is one of the types of
DLT in which transactions are recorded with an unchangeable
cryptographic signature called a hash. That is why distributed
ledgers are often called blockchains.
1. Blocks: Blocks are the fundamental units of the blockchain, containing a list of
transactions. Each block is cryptographically linked to the previous one, forming a
chain of blocks that is immutable and tamper-proof.
2. Nodes: Nodes are network participants that maintain a copy of the blockchain
and validate transactions. Miners, who perform the process of adding new blocks
to the blockchain through mining, are a type of node in the network.
3. Transactions: Transactions represent agreements or transfers of assets between
parties recorded on the blockchain. Each transaction is cryptographically secured
and added to a block for validation.
4. Consensus Mechanisms: Consensus mechanisms are protocols that ensure
agreement among nodes in the network on the validity of transactions. Proof of
Work (PoW), Proof of Stake (PoS), and Proof of Authority (PoA) are common
consensus algorithms used in blockchain networks.
Advantages and Disadvantages of Blockchain Architecture
Advantages
Transaction in Blockchain
The transaction lifecycle in blockchain refers to the stages a transaction goes
through from its initiation to its final confirmation on the blockchain. Here is
an overview of the steps involved in transaction lifecycle in Blockchain:
1. Initiation of a Transaction
1. Creation: A user creates a transaction using a wallet or application,
specifying the amount and recipient’s address.
2. Signing: The transaction is signed with the sender’s private key to
ensure authenticity.
3. Broadcasting: The signed transaction is broadcast to the blockchain
network.
2. Transaction Propagation
1. Node Communication: Nodes receive the transaction and verify its
format and validity.
2. Transaction Pool (Mempool): Valid transactions are stored in the
mempool until picked up by miners.
3. Validation by Nodes: Each node independently checks that the
transaction meets network rules (e.g., sufficient balance).
3. Mining and Confirmation
1. Mining Process: Miners collect transactions from the mempool and
attempt to include them in a new block by solving cryptographic
puzzles.
2. Consensus Mechanisms: The network reaches agreement on the state of
the blockchain (e.g., Proof of Work or Proof of Stake).
3. Adding to the Blockchain: Once a block is mined, it is added to the
blockchain, and the transactions within it are considered confirmed.
4. Transaction Settlement
1. Recording on the Blockchain: The transaction is permanently recorded,
ensuring immutability.
2. Immutability of Transactions: Once confirmed, a transaction cannot be
altered or deleted.
3. Transaction Fee Distribution: Miners receive fees for processing
transactions, incentivizing their participation.
Challenges in the Transaction Lifecycle
Here are the challenges in the transaction lifecycle in Blockchain:
1. Network Congestion: As user adoption increases, the volume of
transactions can lead to congestion, resulting in slower processing
times and higher transaction fees.
2. Limited Throughput: Many blockchains have a limited number of
transactions they can process per second (TPS), which can hinder
their ability to handle large-scale applications.
3. Delay in Transaction Confirmation: Transactions may take longer to
confirm during periods of high network activity, which can be
frustrating for users expecting instant transactions.
4. Inconsistent Times: Different blockchains have varying confirmation
times, which can lead to uncertainty in transaction finality.
5. 51% Attacks: In proof-of-work systems, if a single entity gains control
of more than 50% of the network’s mining power, they could
potentially manipulate transactions.
6. KYC/AML Challenges: Implementing Know Your Customer (KYC) and
Anti-Money Laundering (AML) procedures within decentralized
systems can be difficult.
7. Fragmented Ecosystems: Different blockchain networks often operate in
silos, making it difficult to transfer assets or data between them
seamlessly.
8. Lack of Standardization: The absence of common standards for
interoperability can hinder collaboration between different
blockchain systems.
9. Error-Prone Processes: Mistakes in sending transactions, such as
entering incorrect addresses or amounts, can lead to irreversible
losses.
CHAINING BLOCKS
The Chaining Process
The chaining process in blockchain refers to how individual blocks are linked
together to form a secure and immutable ledger. Here is an overview of the
steps involved:
1. Transaction Initiation: A user initiates a transaction, which is broadcast
to the network of nodes for verification.
2. Block Creation: Validated transactions are grouped together into a
new block. This block contains essential information, including the
transaction data, a timestamp, a nonce (if applicable), and the hash
of the previous block.
3. Hashing: Each block undergoes a cryptographic hashing process,
generating a unique hash that represents the data within the block.
This hash is critical for linking the block to its predecessor.
4. Linking Blocks: The newly created block includes the hash of the
previous block, forming a chain. This linking mechanism ensures that
each block is securely tied to the one before it.
5. Consensus Verification: The new block is distributed across the
network. Nodes validate the block and the transactions it contains,
ensuring consensus is reached before adding it to the blockchain.
6. Block Addition: Once validated, the new block is added to the existing
blockchain, making the data within it a permanent part of the ledger.
The chain of blocks continues to grow as new transactions occur.
Applications of Chaining Blocks
Here are some key applications:
1. Cryptocurrencies: Chaining blocks is the core mechanism behind
cryptocurrencies like Bitcoin and Ethereum, where each transaction
is recorded in a secure and immutable ledger. This allows for peer-
to-peer digital currency exchanges without the need for
intermediaries.
2. Supply Chain Management: Blockchain can track the movement of
goods in real-time, providing transparency and accountability.
Chaining blocks enables all parties in the supply chain to access a
single version of the truth, improving traceability and reducing fraud.
3. Healthcare: In the healthcare sector, blockchain can securely store
patient records, ensuring that they are tamper-proof and accessible
only to authorized individuals. Chaining blocks helps maintain the
integrity and confidentiality of sensitive health data.
4. Digital Identity Verification: Blockchain can provide a secure and
decentralized solution for identity management. By chaining blocks
that store personal information and verification data, individuals can
control their identities and share them with trusted parties without
risking data breaches.
5. Voting Systems: Blockchain technology can enhance the security and
transparency of electoral processes. Chaining blocks can securely
record votes, making them tamper-resistant and easily auditable,
thus increasing public trust in elections.
network. Each node has equal status and can initiate transactions or
transactions.
consensus algorithms.
platforms.
Etherium
What Is Ethereum?
Ethereum is a decentralized global software platform powered by blockchain
technology. It is most commonly known by investors for its native cryptocurrency,
ether (ETH), and by developers for its use in blockchain and decentralized finance
application development.
Anyone can use Ethereum—it's designed to be scalable, programmable, secure, and
decentralized—to create any secured digital technology. Its token is designed to pay
for work done supporting the blockchain, but participants can also use it to pay for
tangible goods and services if accepted.
Ethereum is like a decentralized computing network. It allows developers
to create
Within two years of its release, it was ranked the second-best blockchain
network,
Bitcoin is the first. The Ethereum network acquired more global interest
when China
are met.
holds.
History of Ethereum
2014: In 2014, EVM was specified in a paper by Gavin Wood, and the
formal
of the platform.
capitalization.
Features of Ethereum
—--------------------------
originates.
3. Receiver Address: The Ethereum address that will receive the value
perform.
complete. Verify that the recipient has received the funds or that the
1. Mobile Wallets
Mobile wallets are apps installed on your smartphone that allow you to
manage your Ethereum transactions on the go. Examples include
MetaMask Wallet, Trust Wallet, etc.
Steps to Check:
recent activity.
2. Desktop Wallets
Steps to Check:
1. Open your desktop wallet application.
3. Web-Based Wallets
Web-based wallets are accessed through a web browser and allow you to
track your Ethereum transactions online. Examples include MyEtherWallet
(MEW), Coinbase Wallet, etc.
Steps to Check:
transactions list.
4. Blockchain Explorers
Blockchain explorers are online tools for viewing detailed information about
Ethereum transactions and blockchain data. Examples include Etherscan,
Ethplorer, etc.
Steps to Check:
relevant information.
1. Etherscan
1. Search for Your Transaction: Paste your transaction hash into the
confirmations.
7 . Ethplorer
1. Access Ethplorer: Visit Ethplorer.io.
3. View Information:
8. Blockchair
2. Search for Your Transaction: Input your transaction hash into the
3. Check Details:
browser.
smart contracts.
validate and verify the transactions, yet every transaction in the Blockchain is
which all the peers of the Blockchain network reach a common agreement
about the present state of the distributed ledger. In this way, consensus
Proof of Work (PoW): This consensus algorithm is used to select a miner for
the next block generation. Bitcoin uses this PoW consensus algorithm. The
and easily give out a solution. This mathematical puzzle requires a lot of
computational power and thus, the node who solves the puzzle as soon as
possible gets to mine the next block. For more details on PoW, please read
mines the block will distribute the rewards to the users who
There also exist other consensus algorithms like Proof of Activity, Proof of
committed.
—-----------------------------------
UNIT 3 SECURITY
Cryptography in Blockchain
Cryptography in Blockchain
is used to secure the block information and the link blocks in a blockchain.
individuals for whom the transaction data is intended can obtain, read and
corrupted.
Cryptography
of two Greek terms, Kryptos term meaning “hidden” and Graphein, a term
bits.
sequence of bits).
Types of Cryptography
● Symmetric-key cryptography.
● Asymmetric-key cryptography.
that the sender and receiver exchange keys in a secure manner. The
popular symmetric-key cryptography system is Data Encryption
encrypt the data and the data must be accessed. A person entrusted with
the secret key can decrypt the data. Examples: AES, DES, etc.
Features:
Symmetric Cryptography
2. Asymmetric-key Encryption: This cryptographic method uses different
keys for the encryption and decryption process. This encryption method
uses public and private key methods. This public key method help
id. private key helps to decrypt the messages and it also helps in the
the keys is that the private key cannot be derived from the public key, but
the public key can be derived from the private key. Example: ECC,DSS etc.
Features:
cryptography.