Blockchain introduction Flashcards

1
Q

Digital signatures and hash functions
what is Cryptography?

A
  • Practice and study of techniques for secure communication in the presents of third parties called adversaries
    • Cryptocurrencies make heavy use of cryptography, (provides a mechanism for securely encoding the rules of a cryptocurrency system in the system itself.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Digital signatures and hash functions
what is encryption?

A

process of turning plain text into ciphertext

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

what is Decryption?

A

process of turning ciphertext into readable plain text

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

what is Breaking ciphertext?

A

working out how to decrypt ciphertext without being given the key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Public key cryptography:
what is Asymmetric cryptography?

A
  • Key used to decrypt messages, not the same key used to encrypt it
    • Uses mathematically linked key pair
      > public key: can be shared with everyone
      > private key: known only to you
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Different public-private schemes exist: name 2

A
  • PGP (pretty good privacy) software
  • ECDSA: Elliptic curve digital signature algorithm
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

what is the ECDSA Process:

A

Use random number as input (remember it):
- Is your private key (256-bit number in hexadecimal)
then, Do ECDSA maths to generate a public key
the Bitcoin address is generated from ESDSA public key :
- Possible destination for BTC payment
- 26-35 alphanumeric characters
- Start with 1,3, or bc1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

what is a Hash function:

A

algorithm that transforms arbitrary amount of input (message) into a fixed size output
> originally developed at IMB in the early 1950s

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

what is a Hash:

A

the value returned by hash function

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

what is a Hash pointer

A

pointer to where some information is stored together with cryptographic hash of the information at fixed point in time
Hash functions are deterministic - output is determined by input

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

what are two types of hash functions

A

> Basic hash function- example:
- input/message: “use first character of the input”
- Hash (“what time is it”)= ‘W’
-Output ‘W’ is called the digest, or hash value, or hash

> Cryptographic hash function:
- Ideal cryptographic hash function has 5 properties, which makes them useful in cryptography and for cryptocurrencies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

5 Properties of cryptographic hash functions:

A

-Deterministic
-Quick to compute
-Cant go backwards (hiding)
-Small input changes makes big output difference
-Hard to create hash clash (collision resistant)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Use of hash functions

A
  • Can be used to prove that two things are the same without revealing the two things (eg. secret prediction that is revealed later)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

In bitcoin, cryptographic hashes used in? (5 points)

A

> bitcoin address = hash of public key
mining process
identifiers for transactions
identifiers for blocks to list them in a chain
ensure that data tampering is immediately evident

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Uses of hash functions outside of bitcoin?

A

Authentication:
> a password protected website would store the hash function of your password, rather than storing the password itself
> a “digital passport” could be a hash function of your fingerprint stored by the Dept. of homeland security.

security:
> if somebody steals the hash function, they cannot invert it to recreate the input data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

what does a Decentralised payment system require?

A

-Perfectly accurate identification of ownership

  • Perfectly accurate transfer of ownership

-Fraud proof:
> cannot be spent twice by the same person
> ownership identification cannot be changed retrospectively

17
Q

what is the problem with Decentralised payment system, and what is the solution

A

Problem: transaction ordering
Solution: Blocks
- Slowing down data entry process
- Need to agree on order of block, not order of transactions
- Blocks created every 10 minutes on average

18
Q

what does a bitcoin block consist of ?

A

Bitcoin block consists of header, transaction count, and block content
Content of block header:
- Block version number (software version)
- 256-bit hash of the previous block header
- 256-bit hash derived from merkle root
- Time stamp
- Current difficulty target
- Nonce <= changeable by miners to solve hash puzzle