Lecture 1 - Introduction to Cryptography and Cryptocurrencies Flashcards
Why would you want to use Blockchain technologies?
Applications can run:
* In a decentralized fashion, by eliminating /limiting the need for a central authority
and Achieve the same functionality with the same amount of certainty
What is Blockchain?
Blockchain is decentralized distributed data structure that is replicated and shared among the members of a network.
It uses cryptographic methods (Hash functions), peer-to-peer networks and a distributed consensus protocol
What is meant by trust-less networks?
Blockchain enables trust-less networks since parties can transact even though they do not trust each other
What is the result of using cryptography in blockchain?
Use of cryptography in blockchain brings authoritativeness/proofs behind all the interactions
What makes smart contracts smart?
Smart contracts which are self-executing scripts over blockchain allow for distributed and heavily automated workflows
What are the five properties of blockchain?
- Decentralization
- Immutability
- Chronology
- Transparency
- Pseudonymity
Explain Immutability
Data written to database cannot be changed or deleted without consensus leading to data integrity
Explain the Decentralization property
No single point of failure/control achieved by decentralized architecture and a distributed database
Explain the Transparency property
All data sent through the blockchain is visible to all network participants
Explain the pseudonymity property
The identity of data senders and receivers is unknown
Explain the Chronology property
Every transaction is time-stamped and can be traced back
What is a hash function?
You take an input, parse it through a cryptographic hash function, then the output will be a digest(string) of fixed length (256 bits for example)
Two identical inputs to the same hash function will produce identical hash digests. True or False
TRUE
Two different inputs to the same hash function will produce identical hash digests. True or False
FALSE
What are the three security properties of hash functions?
- Collision-free
- Hiding
- Puzzle-friendly