Skip to main content

What is Cryptocurrency and Blockchain Technology?

Cryptocurrency:

A digital currency in which transactions are verified and records maintained by a decentralized system using cryptography, rather than by a centralized authorities like banks.
  • It’s peer-to-peer network that enables anyone can send or receive payments from anywhere.
  • Crypto works like Distributed public ledger (blockchain plays the vital role here) which stores all transaction details held by the currency holders.
  • Cryptocurrencies are created through a process called mining, which involves using computer power to solve complicated mathematical problems that generate coins.

Blockchain Technology:

Blockchain technology is a structure that stores transactional records, also known as the block, of the public in several databases, known as the “chain,” in a network connected through peer-to-peer nodes.
It uses Hash function to generate a non-readable and non-understandable value.

Hash function:

  • We can send data of any size but the output is fixed.
  • Hash(data) -- > fixed size output (random string)
  • If we send the same data again and again it will output the same random.
  • Those random numbers are like half are 1s and other halves are 0s.
  • It’s more like Avalanche effect: if we made a small change in the input data, it will change the whole output data.

Drawbacks:

  • Preimage Resistance: for given Y a hash value, you can’t able to find X input data Such that hash(X) == Y. But you can able to find that it would take 2256 times to achieve.
  • Collision Resistance: there are two different input data which is X and Z,  X is not equals Z but hash(X) == hash(Z). Its not happens frequently its happens when we try 2128 times. But this type of collision not happens in today’s modern world computers.
For example: sha-256, md-5
  1. md-5: Collision resistance happens at the iteration 264, So its easily broken by the modern computers within a second. Because md-5 output size is 16 bytes.
  2. Sha-256: Collision resistance happens at the iteration 2256, So its harder broken by the modern computers but it can be broken. Because sha-256 output size is 256 bytes.

History of Blockchain Technology:

2008 - Bitcoin whitepaper by satoshi Nakamoto.
2009 - Bitcoin(BTC) First decentralized currency
2011 - More Cryptocurrencies clones and specialized projects
2014 - Bitcoin adoption more businesses uses bitcoin

Comments

Popular posts from this blog

Crypto ED25519 Signing and Verifying using Golang

The Edwards-curve Digital Signature Algorithm (ECDSA) is used to create a digital signature using an enhancement of the Schnorr signature with Twisted Edwards curves. Overall it is faster that many other digital signature methods, and is strong for security. One example of ECDSA is Ed25519, and which is based on Curve 25519. It generates a 64-byte signature value of (R,s), and has 32-byte values for the public and the private keys. Example : package main import ( "crypto/ed25519" "crypto/rand" "encoding/hex" "fmt" "log" ) func main() { publickey, privatekey, err := ed25519.GenerateKey(rand.Reader) if err != nil { fmt.Println("cannot generate ecdsa keys") log.Fatal(err) } msg := "hello" signedBytes := ed25519.Sign(privatekey, []byte(msg)) fmt.Println("Signed Message :", hex.EncodeToString(signedBytes)) if !ed25519.Verify(publickey, []byte(msg), signedBytes) { fmt.Println("ver...

Crypto RSA Signing and Verification in Golang

  RSA [Rivest-shamir-Adleman] encryption is one of the most widely used algorithms for secure data encryption. Signing and Verification:   RSA works by generating form of key pair of private and public keys. For Signing:  we need to provide some inputs,  A random reader used for generating random bits because if we provide the same input, it doesn't give the same output as last time. Before signing, we need to hash our message. we also need to provide which hash function is used for message hashing. Finally, private key.  For Verifying: we need to provide some inputs,  hash of our message. which hash function is used for message hashing while signing. Finally, public key and signature what we obtained while signing.  Example: package main import ( "crypto" "crypto/rand" "crypto/rsa" "crypto/sha256" "encoding/hex" "fmt" "log" ) func main() { privatekey, publickey := GenerateRsaKeys() message := ...

Smart contract with remix IDE and Ganache

  Previous Topic:  Simple transaction with ganache using Golang In the Previous topic, we learned how to do transaction with ganache using Golang. Now, we will learn what is smart contract and how to write smart contract and how to deploy it and how to call the contract using remix. To learn what is smart contract, we already write a blog about that. Please feel free to take a look.  Ethereum Smart contract . For beginners, use the Remix IDE for learning smart contract and understand how it works. Then we will use Truffle framework. REMIX:  Remix IDE Link Remix will provide a default workspace for developing smart contract. Now you can able to create a new file and start writing contracts, compile it with solidity compiler and deploy that contract and test the contracts. Simple Smart Contract: First create new file called store.sol  and start writing a simple contract. Contract Functionality: Store a record using SetRecord method. View the latest record . [reco...