This shows you the differences between two versions of the page.
| Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
| en:iot-reloaded:key_concepts_of_blockchain_technology [2024/09/24 08:40] – ajurenoks | en:iot-reloaded:key_concepts_of_blockchain_technology [2024/12/09 11:48] (current) – pczekalski | ||
|---|---|---|---|
| Line 1: | Line 1: | ||
| ====== Key Concepts of Blockchain ====== | ====== Key Concepts of Blockchain ====== | ||
| - | In this chapter, we will explore how blockchain technology, originally developed and can be applied in various fields. While we will primarily use examples related to financial transaction processing, it’s important | + | This chapter will explore how blockchain technology can be applied in various fields. While we will primarily use examples related to financial transaction processing, it's essential |
| - | The term ' | + | The term ' |
| - | At its core, blockchain is a new type of data structure that merges cryptography with distributed computing. | + | At its core, blockchain is a new type of data structure that merges cryptography with distributed computing. Satoshi Nakamoto |
| - | Blockchain technology demonstrates that when it is used, people anywhere in the world can trust each other and conduct business directly within large networks without | + | Blockchain technology demonstrates that people anywhere in the world can trust each other and conduct business directly within large networks without |
| **What is blockchain in simple terms?** | **What is blockchain in simple terms?** | ||
| Line 13: | Line 13: | ||
| A blockchain is a method of storing data. Data is stored in blocks that are linked to the previous block. | A blockchain is a method of storing data. Data is stored in blocks that are linked to the previous block. | ||
| - | Each block contains, | + | Each block contains: |
| - | * a list of transactions; | + | * a list of transactions, |
| - | * a unique ID for all the data in the block called a hash; | + | * a unique ID for all the data in the block called a hash, |
| * a hash of the previous block' | * a hash of the previous block' | ||
| Data in the block usually consists of transactions, | Data in the block usually consists of transactions, | ||
| - | A hash generated from transaction record is a unique combination of letters and numbers. It's always unique to every block on the blockchain. When the data in the block changes, the hash will also change. When Hash is applied to transaction data it disable | + | A hash generated from a transaction record is a unique combination of letters and numbers. It's always unique to every block on the blockchain. When the data in the block changes, the hash will also change. When a hash is applied to transaction data, it turns off the option to make changes in a record, as the resulting hash of the new record |
| + | Each block also contains the previous block' | ||
| - | Each block also contains | + | As a result, if a transaction in any block changes, the block' |
| + | This gives blockchain the property of being tamper-resistant as it becomes very easy to identify when data in a block has changed. | ||
| + | Blockchain has one more property that makes it secure. A blockchain is not stored on one computer or server, which is usually the case with a database. Instead, it is stored in a large network of computers called | ||
| - | As result if a transaction | + | Peer-to-peer is a network |
| - | This gives blockchain | + | |
| - | Blockchain has one more property that makes it secure. A blockchain is not stored on one computer or server which is usually the case with database. Instead, it is stored in a large network | + | |
| - | Per to peek is a network | + | Every time a new block of transactions is added to the network, |
| + | If all nodes in the network | ||
| - | Every time a new block of transactions has to be added to network, all members or nodes of the network must check and verify if all transactions in the block are valid. | + | This process is called consensus. Hence, any attacker who tries to tamper with the data on the blockchain must tamper with the data in most of the computers in the peer-to-peer network. |
| - | If all nodes in the network are in agreement that the transactions in the block are correct, then the new block will get added to every node's blockchain. | + | |
| - | + | ||
| - | This process is called consensus. Hence, any attacker who tries to tamper with the data on the blockchain must tamper with the data in most of the computers in the peer to peer network. | + | |
| - | + | ||
| - | **Transactions** | + | |
| - | + | ||
| - | Block chain technology uses two main types of cryptographic keys to provide the security of transactions and data: public keys and private key. These keys work together to protect the integrity of the blockchain, enabling secure exchanges of digital records and protect user identities. Consider the example of a mailbox. The public key is your email ID which everyone knows about and can send you messages. The private key, on the other hand, is like the password to that mailbox. Only you own it and only you can read the messages inside. | + | |
| - | + | ||
| - | A public key is a cryptographic code that is openly shared and used by others to interact with your blockchain account. It's generated from your private key using a specific mathematical process. Public keys are used to verify digital signatures and to encrypt data that only the private key can decrypt. This ensures that messages or transactions are intended for the correct recipient. | + | |
| - | + | ||
| - | A private key is a secret cryptographic code that grants access to your blockchain records. It must be kept confidential because anyone with access to the private key can control the records associated with the corresponding public key. This key is used for authorizing transactions on the blockchain. When it is necessary to transfer information (make transaction), | + | |
| - | + | ||
| - | Public and private keys work together to secure blockchain operations: | + | |
| - | * Encryption and Decryption: When data is encrypted using a public key, only the corresponding private key can decrypt it. This mechanism ensures that even if the data is intercepted, | + | |
| - | * Digital Signatures: When a transaction is signed with a private key, the signature can be verified by others using the public key. This verification process confirms that the transaction is authentic and has not been tampered with. | + | |
| - | * Secure Transactions: | + | |
| - | + | ||
| - | **Categories of blockchain.** | + | |
| - | + | ||
| - | There are three categories of blockchain: | + | |
| - | + | ||
| - | __Public blockchains__, | + | |
| - | + | ||
| - | Public blockchains process transactions more slowly because they are decentralized, | + | |
| - | + | ||
| - | __Private blockchains__ (in some literature is mentioned as managed blockchains) are closed network that are accessible to authorized or select verified users only. They are often owned by companies or organizations, | + | |
| - | + | ||
| - | Private blockchain is very similar to existing databases in terms of access restrictions, | + | |
| - | + | ||
| - | Since it is accessible only by certain people, there is no requirement for mining of blocks (validating), | + | |
| - | + | ||
| - | __Hybrid or consortium blockchains__ are permissioned based blockchains but in comparison to private blockchains control is provided by group of organizations rather than one coordinator. Such blockchains have more restrictions than public ones, but are less restrictive than private ones. For this reason, they are also known as hybrid blockchains. New nodes are accepted based on a consensus with the consortium. Blocks are validated according to predefined rules defined by the consortium. Access rights can be public or limited to certain nodes. User rights might differ from user to user. Hybrid blockchains are partly decentralized. | + | |