lecture 3 Flashcards

1
Q

What is cryptography?

A

Practice and study of techniques for secure communication in the presence of third parties called adversaries.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the role of cryptography in crypto currency?

A

Provides a mechanism for securing the rules of the cryptocurrency system in the system itself.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is encryption?

A

Process of turning plain text into cypher text

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

what is decryption?

A

Process of turning cyphertext into readable plain text

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is breaking cyphertext?

A

Working out how to decrypt cypher text without being given the key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is asymmetric cryptography

A

A pair of keys is used that are mathematically related but not identical, public key can be shared with everyone, private key known only to you

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the purpose of ECDSA?

A

Generate public/ private key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the ECDSA process?

A

1) use random number as input ( remember it)
2) Do ECDSA maths to generate public key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the bitcoin address generated from?

A

ECDSA Public key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What does the bitcoin address do?

A

possible destination for bitcoin payment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the configuration of the bitcoin address?

A

26-35 alphanumeric characters, starts with 1,3 or bc1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What makes up a digital signature?

A

Message + private key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are the 2 properties of a digital signature?

A
  • only you can make the signature but anyone can verify it
  • tied to one document: cannot be copied
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a hash function?

A

algorithm that transforms arbitrary amount of input in a fixed sized output

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

what is hash?

A

value returned by hash function

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

what is a hash pointer?

A

pointer to where some information is stored together with cryptographic hash of the info at a fixed point in time

17
Q

What are the 2 types of hash function?

A

1) basic
2) cryptographic

18
Q

What are the 5 ideal functions of a cryptographic hash function?

A
  • deterministic
  • quick to compute
  • can’t go backwards
  • small input change makes big output change
  • collusion resistant
19
Q

what does SHA-256 create?

A

almost unique 256-bit, 64 character, 32 bytes hexadecimal number

20
Q

what is the use of hash functions?

A

Used for proving that 2 things are the same without revealing the 2 things.

21
Q

In Bitcoin, what is hash used in?

A
  • bitcoin address
  • mining process
  • identifiers for transaction
    etc
22
Q

what are the 2 uses of hash functions outside of bitcoin?

A

1) authentication
2) security

23
Q

What does a blockchain consist of?

A

a list of hashes and hash pointers

24
Q

how do you create a new block?

A

Hashing the old block along with the transaction

25
Q

What does each new block contain?

A

the new transaction and an encryption of the previous block

26
Q

what are the 3 things that make up a bitcoin block

A

header, transaction count and block content

27
Q

What is a Merkle tree?

A

A binary tree with hash pointers