0% found this document useful (0 votes)
122 views43 pages

BCT Unit-1

Blockchain technology is a digital database where information is stored in blocks that are linked together using cryptography. It allows transactions to be verified by a network of computers and permanently recorded in a way that is difficult to modify. There are different types of blockchains including public blockchains that anyone can participate in, private blockchains that are permissioned, and hybrid blockchains that combine public and private elements. The key components that make blockchain secure and decentralized include cryptographic hashes, distributed networks, and consensus algorithms.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
122 views43 pages

BCT Unit-1

Blockchain technology is a digital database where information is stored in blocks that are linked together using cryptography. It allows transactions to be verified by a network of computers and permanently recorded in a way that is difficult to modify. There are different types of blockchains including public blockchains that anyone can participate in, private blockchains that are permissioned, and hybrid blockchains that combine public and private elements. The key components that make blockchain secure and decentralized include cryptographic hashes, distributed networks, and consensus algorithms.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 43

BLOCKCHAIN TECHNOLOGIES

What Is Blockchain?
• Blockchain technology is a digital database where information or data is
stored in blocks that are linked together to form a chain using cryptographic
hashes as unique IDs.

• Blockchain is a ledger i.e file that constantly grows and keeps the record of
all transactions permanently.

• It consists of a chain of blocks and each block contains a secure group of


transactions of money, bitcoins, contracts, property, etc. without any need
for third-party middle-man such as central authorities, banks, government,
etc.

• Transactions are verified by a network of computers. Once a block of


History of block chain
• 1991: In 1991, researcher scientists named Stuart Haber and W. Scott Stornetta introduce
Blockchain Technology.

• 1992: After that in 1992, Merkle Trees formed a legal corporation by using a system developed
by Stuart Haber and W. Scott Stornetta with some more features.

• 2000: In the year 2000, Stefan Konst published his theory of cryptographic secured chains, plus
ideas for implementation.

• 2004: In the year 2004, Cryptographic activist Hal Finney introduced a system for digital cash
known as “Reusable Proof of Work”.


• 2008: After that 2008, Satoshi Nakamoto conceptualized the concept of
“Distributed Blockchain” in his white paper: ”A Peer to Peer Electronic Cash
System”.

• 2009: After that, the evolution of Blockchain is steady and promising and became
a need in various fields. In 2009, Satoshi Nakamoto Releases Bitcoin White
Paper.

• 2014: The year 2014 is marked as the turning point for blockchain technology.
Blockchain technology is separated from the currency and Blockchain 2.0 is born.

• 2015: In 2015, Ethereum Frontier Network was launched, thus enabling


developers to write smart contracts and dApps that could be deployed to a live
network.
• 2016: The word Blockchain is accepted as a single word instead of two
different concepts as they were in Nakamoto’s original paper

• 2017: In the year 2017, Japan recognized Bitcoin as a legal currency.

• 2018: Bitcoin turned 10 in the year 2018. The bitcoin value continued to
drop, reaching the value of $3,800 at the end of the year

• 2019: In the year 2019, Ethereum network transactions exceeded 1 million


per day.

• 2020: Stablecoins were in demand as they promised more stability than


traditional cryptocurrencies. The same year Ethereum launched Beacon
Chain in preparation for Ethereum 2.0.

• 2022 : Ethereum has shifted from Proof of Work(PoW) to Proof of


Stake(PoS) consensus mechanism.

Why Do We Need Different Types of Blockchain
• To carry out transactions or data transfers across a secure network.

• The way people use Blockchain and distributed ledger technologies or networks, on
the other hand, differs from context to situation.

• For example, Bitcoin is a digital cryptocurrency transacted using Blockchain and DLT
technology. because anyone from anywhere in the world can become a node, verify
other nodes, and exchange bitcoins, this form of a blockchain network is a public
network.
Types of Blockchain
1. Public Blockchain
• As the name is public this blockchain is open to the public, which
means it is not owned by anyone.
• Anyone having internet and a computer with good hardware can
participate in this public blockchain.
• All the computer in the network hold the copy of other nodes or
block present in the network
• In this public blockchain, we can also perform verification of
transactions or records.
Advantages:
• Trustable: There are algorithms to detect no fraud. Participants need
not worry about the other nodes in the network
• Secure: This blockchain is large in size as it is open to the public. In a
large size, there is greater distribution of records
• Anonymous Nature: It is a secure platform to make your transaction
properly at the same time, you are not required to reveal your name
and identity in order to participate.
• Decentralized: There is no single platform that maintains the
network, instead every user has a copy of the ledger.
Disadvantages:
• Processing: The rate of the transaction process is very slow, due to its large size.
Verification of each node is a very time-consuming process.
• Energy Consumption: Proof of work is high energy-consuming. It requires good
computer hardware to participate in the network
• Acceptance: No central authority is there so governments are facing the issue to
implement the technology faster.
Use Cases: Public Blockchain is secured with proof of work or proof of stake they can
be used to displace traditional financial systems.
Examples of public blockchain are Bitcoin, Ethereum.
2. Private Blockchain

• These blockchains are not as decentralized as the public blockchain


only selected nodes can participate in the process, making it more
secure than the others.
• These are not as open as a public blockchain.
• They are open to some authorized users only.
• These blockchains are operated in a closed network.
• In this few people are allowed to participate in a network within a
company/organization.
Advantages:
Speed: The rate of the transaction is high, due to its small size. Verification of each
node is less time-consuming.
Scalability: We can modify the scalability. The size of the network can be decided
manually.
Privacy: It has increased the level of privacy for confidentiality reasons as the
businesses required.
Balanced: It is more balanced as only some user has the access to the transaction which
improves the performance of the network.
Disadvantages:

• Security- The number of nodes in this type is limited so chances of


manipulation are there. These blockchains are more vulnerable.
• Centralized- Trust building is one of the main disadvantages due to its
central nature. Organizations can use this for malpractices.
• Count- Since there are few nodes if nodes go offline the entire system of
blockchain can be endangered.
Use Cases: With proper security and maintenance, this blockchain is a great
asset to secure information without exposing it to the public eye. Therefore
companies use them for internal auditing, voting, and asset management.
An example of private blockchains is Hyperledger.
3. Hybrid Blockchain
► It is the mixed content of the private and public blockchain, where some part
is controlled by some organization and other makes are made visible as a
public blockchain.
► It is a combination of both public and private blockchain.
► Permission-based and permissionless systems are used.
► User access information via smart contracts
► Even a primary entity owns a hybrid blockchain it cannot alter the
transaction
Advantages:
► Ecosystem: Most advantageous thing about this blockchain is its hybrid nature.
It cannot be hacked as 51% of users don’t have access to the network
► Cost: Transactions are cheap as only a few nodes verify the transaction. All the
nodes don’t carry the verification hence less computational cost.
► Architecture: It is highly customizable and still maintains integrity, security,
and transparency.
► Operations: It can choose the participants in the blockchain and decide which
transaction can be made public.
Disadvantages
► Efficiency: Not everyone is in the position to implement a hybrid Blockchain.
The organization also faces some difficulty in terms of efficiency in
maintenance.
► Transparency: There is a possibility that someone can hide information from
the user. If someone wants to get access through a hybrid blockchain it
depends on the organization whether they will give or not.
► Ecosystem: Due to its closed ecosystem this blockchain lacks the incentives
for network participation.
Use Case: It provides a greater solution to the health care industry, government,
real estate, and financial companies. It provides a remedy where data is to be
accessed publicly but needs to be shielded privately.
Examples of Hybrid Blockchain are Ripple network and XRP token.
Consortium Blockchain

It is a creative approach that solves the needs of the organization. This blockchain
validates the transaction and also initiates or receives transactions.

► Also known as Federated Blockchain.


► This is an innovative method to solve the organization’s needs.
► Some part is public and some part is private.
► In this type, more than one organization manages the blockchain.
Advantages:
► Speed: A limited number of users make verification fast. The high speed makes
this more usable for organizations.
► Authority: Multiple organizations can take part and make it decentralized at
every level. Decentralized authority, makes it more secure.
► Privacy: The information of the checked blocks is unknown to the public view.
but any member belonging to the blockchain can access it.
► Flexible: There is much divergence in the flexibility of the blockchain. Since it is
not a very large decision can be taken faster.
Disadvantages:

► Approval: All the members approve the protocol making it less flexible. Since
one or more organizations are involved there can be differences in the vision of
interest.
► Transparency: It can be hacked if the organization becomes corrupt.
Organizations may hide information from the users.
► Vulnerability: If few nodes are getting compromised there is a greater chance
of vulnerability in this blockchain

Use Cases: It has high potential in businesses, banks, and other payment
processors. Food tracking of the organizations frequently collaborates with their
sectors making it a federated solution ideal for their use.
Examples of consortium Blockchain are Tendermint and Multichain.
Components of blockchain

The technology behind Bitcoins is the Blockchain Network. Following are the
components of a Blockchain network –
1. Node
2. Ledger
3. Wallet
4. Nonce
5. Hash
1. Node –
It is of two types – Full Node and Partial Node.
Full Node –
It maintains a full copy of all the transactions. It has the capacity
to validate, accept and reject the transactions.
Partial Node –
It is also called a Lightweight Node because it doesn’t maintain
the whole copy of the blockchain ledger.
• It maintains only the hash value of the transaction. The whole
transaction is accessed using this hash value only.
• These nodes have low storage and low computational power.
2. Ledger –
It is a digital database of information. Here, we have used the term ‘digital’
because the currency exchanged between different nodes is digital i.e
cryptocurrency. There are three types of ledger. They are –
1. Public Ledger –
It is open and transparent to all. Anyone in the blockchain network can read or
write something.
2. Distributed Ledger –
In this ledger, all nodes have a local copy of the database. Here, a group of
nodes collectively execute the job i.e verify transactions, add blocks in the
blockchain.
3. Decentralized Ledger –
In this ledger, no one node or group of nodes has a central control. Every node
participates in the execution of the job.
3. Wallet –
It is a digital wallet that allows user to store their cryptocurrency. Every node in
the blockchain network has a Wallet.
► Privacy of a wallet in a blockchain network is maintained using public and
private key pairs
1. Hot Wallet –
These wallets are used for online day-to-day transactions connected to the
internet. Hackers can attack this wallet as it is connected to the internet. Hot
wallets are further classified into two types –
a. Online/ Web wallets –
These wallets run on the cloud platform. Examples – MyEther Wallet,
MetaMask Wallet.
b. Software wallets –
It consists of desktop wallets and mobile wallets. Desktop wallets can be
downloaded on a desktop and the user has full control of the wallet. An
example of a desktop wallet is Electrum.
c. Mobile wallets –
They are designed to operate on smartphone devices. Example – mycelium.
2. Cold Wallet –
These wallets are not connected to the internet. It is very safe and hackers cannot attack it.
These wallets are purchased by the user. Example – Paper wallet, hardware wallet.
a. Paper wallet –
They are offline wallets in which a piece of paper is used that contains the crypto address.
The private key is printed in QR code format. QR code is scanned for cryptocurrency
transactions.
b. Hardware wallet –
It is a physical electronic device that uses a random number generator that is associated with
the wallet.
The focus of wallets is on these three things –
1. Privacy
2. Transactions should be secure
3. Easy to use
► Privacy of a wallet is maintained using public and private key pairs. Transactions are made
secure as a private key is used both to send fund and to open the encrypted message.
4. Nonce –
A nonce is an abbreviation for “number only used once,” which is a number
added to a hashed or encrypted block in a blockchain.
► It is the 32-bit number generated randomly only one time that assists to create a
new block or validate a transaction. It is used to make the transaction more
secure.
► It is hard to select the number which can be used as the nonce. It requires a
vital amount of trial-and-error.
► First, a miner guesses a nonce. Then, it appends the guessed nonce to the hash
of the current header.
► After that, it rehashes the value and compares this to the target hash. Now it
checks that whether the resulting hash value meets the requirements or not.
► If all the conditions are met, it means that the miner has created an answer and
is granted the block.
5. Hash –
The data is mapped to a fixed size using hashing. It plays a very important role
in cryptography.
• In a blockchain network hash value of one transaction is the input of another
transaction. Properties of the hash function are as follows –
• Collision resistant
• Hiding
• Puzzle friendliness
Blockchain Architecture

A single blockchain structure can be understood by dividing into two parts:


► Block Header
► Block Body
Block Header
Block header is a portion of a block which contains a set of information.
These 6 main attributes or information are given below:

• Timestamp
• Blockchain Version
• Merkle Root
• Difficulty Target
• Nonce
• Previous Hash
Timestamp
• Timestamp is a small size data, which is stored in block header as a unique
serial.
• Its main function is to determine the exact moment in which the block has been
mined and validated by the network.
Block Version
• Block version’s function is used to talk about which kind of version of block is
using. Most of the block versions are:
• Blockchain Version 1.0 (Cryptocurrency): It is mainly used in public ledgers
containing systems. For example: Bitcoin, Bitcoin Cash
• Blockchain Version 2.0 (Smart Contracts):
• Blockchain Version 3.0 (DAPPS): It talks about decentralized applications.
• Blockchain Version 4.0 (Blockchain for Industry)
Merkle Root
• To understand Merkle root, we will have to understand the concept of Merkle
Tree. to get a hash value of each block we use this concept. A block within the
blockchain system, contains a number of transactions, and each transaction is
assumed as the leaf of the Merkle tree, and these leaves or transaction have their
own hash values.
A number of leaves or transactions make sub-branches. And, eventually all of the
branches’ hash values refers to the hash value of Merkle Root .
Difficulty Target
• Difficulty target refers to the measurement of difficulty level within block
mining. Where mining is a peer-to-peer process (P-2-P process), which is used
to secure and verify transactions.
• This blockchain mining process is done by blockchain miners who add data
transactions to the distributed public ledger.
Nonce
► Nonce is a number that can be used once, in cryptography it is a one-time code.
► In mining process, the main of miners is to find the hash value below a target number,
which is calculated based on the difficulty level.
► The server generates the nonce (a nonce) and sends it to the client. The client uses the
received code, adding it to the password before encryption, encrypts the received
string, and returns the resulting message to the server.
• The server decrypts the message from the received string to "subtract" the known
nonce and verifies the password.
• This nonce is used once and only once, all subsequent transfers of passwords with
the same nonce will be rejected by the server, so an attacker who intercepts a
message with an encrypted password will not be able to gain access by resending
the intercepted message to the server.
Previous Hash
• Previous hash is the hash value of previous block lying within the blockchain
system.
• Through a combination of pointer and hash function, blocks connect themselves
and do the chain formation. And the same reason is behind tamperproof ledger,
which is if any person tries to break the chain or edit any information, he will have
to change the whole nodes. Otherwise, it will regain its previous form.
Block Body

► Block body contains depends number of transactions, size of blocks.


Basics of Consensus Algorithm
• A consensus algorithm is a mechanism or protocol employed in a distributed
decentralized network for reaching an agreement on activities or transactions
being carried out in the network.
• It ensures these network activities are done in a secure and reliable manner,
therefore establishing trust among peers in the network.
• The consensus algorithm in blockchain networks validates and verifies
transactions that are stored in blocks.
• Before a block of transactions is added to the blockchain, it must be validated
and verified to have happened and to be correct. This is done to ensure that the
network remains secure, reliable, and immutable.
The two most commonly used consensus algorithms are the Proof of Work and the
Proof of Stake.
Proof of Work (PoW): The validators in this type of consensus algorithm are
called miners.
• For a new block of transactions to be created and added to the blockchain, the
miners are required to solve a complex mathematical puzzle that involves a lot
of computational power.
• The first miner to solve the puzzle gets to create the next block and add it to
the blockchain, and this process is known as mining.
• In addition, a certain amount of the network’s native coin is given to the first
miner as a block reward.
Proof of Stake (PoS): This consensus algorithm was designed as an alternative to
Proof of Work because of the large computational power and hardware
requirements of Proof of Work.
• Here, the validators participate in the validation and verification of transactions
by locking up some of their coins in a wallet as their stake.
• The validator with the highest stake is selected to create a new block and add it
to the blockchain.
• This validator receives transaction fees as a reward.
• Examples of blockchain networks that use Proof of Stake include Ethereum
2.0, Cardano, Polygon, and others.
Properties of Blockchain:
1. Immutability:If you have stored data on the blockchain it is guaranteed that
data cannot be changed later. This is very important when you want to trust
something or when you want to make something more trustable. Because if I
am building an application and if I want to change data because everything is
in my control, I can change the data and change the data in any way I want to.
But with blockchain, That is not possible.
2. Decentralized:Blockchain needs a group of nodes to be able to serve that
work as points where all the data is stored in a decentralized manner. And
these nodes work together to make sure that the correct provenance of data is
maintained, which means that the correct timeline of data is maintained.
3. third property is that blockchains are Timestamped by default. This means
that it helps in a decentralized manner. So, that helps, again in trying to see
what data how the data has changed when some record was updated. Who
updated it on this kind of thing. So these properties are what make blockchain
interesting.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy