0% found this document useful (0 votes)
18 views3 pages

Blockchain Assignment 2

The document discusses blockchain technology, focusing on its mining process and cryptographic principles. It highlights the role of hashing algorithms, particularly SHA-256, in securing transactions and ensuring data integrity. Additionally, it touches on the efficiency of blockchain in verifying and recording transactions in a decentralized manner.

Uploaded by

Udit Shrivastava
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
18 views3 pages

Blockchain Assignment 2

The document discusses blockchain technology, focusing on its mining process and cryptographic principles. It highlights the role of hashing algorithms, particularly SHA-256, in securing transactions and ensuring data integrity. Additionally, it touches on the efficiency of blockchain in verifying and recording transactions in a decentralized manner.

Uploaded by

Udit Shrivastava
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

Name Vdit Shriyosla

Rof1?

Blocechoin Asnrment - 2
bjmy has tee's
Menle Tree oalso nown
Notte Trees, aso tonputen gience
2ort of dota
þvevelant cohencij tey ane
cnpto
bitcoin ard otes
blockchain do o more effienty
’In
to enerybt
used to encypt
2echely Tob HaSh
and
hass HaSh D
}
Hash
Housh o
Has fash o, o hash
hash o,!

Hos
Hash 1-1
ash Hash
hashlli3) hasc)
hashlt2)
hashl)

Cormva, roces,Blecfehain mining


Blocean ining ngnes'ons.
tyanhons.
to venf bitcoin to
þees gecre and venify
A peer
bloctcin mhers who had bitcoin
invo lves global pvblik leasey
Ming tota to biteoin 8
transacthion
af est toancho,
hronßachon u callad mining
The proces ot vesifins
Probably heffecd to as minirg ap it o analosous
mining of comod.'t (tfe quld - mining guld hequirey
to
imited upbly gold.
that s mned euehy yea
Jhe amnount
Jeghly -he 8ame .
Jhemains ConSumed n the
Comptng oue) a hiteoint-
A lot of ess of mining
process
in the bror
of the SHA 2
SHAs6 is ( q patst Stans fox
256 alqonithms, whebere
Aa3. SHA
2ecwre of
family ash [Link]
NSA ound
NSA NIST,
hl the
the
Jojnt efos t the HA1 Jamily,
a SucresSer t a_ainst b te
intnduce Shengh
to Slowy losing
iohich 9as name siAns
fusce atacks in the
the of
the 25% resfechve
Sisnifcat of Value ie he hash hash alue
The higbest

the fnalAnad hasSh lea teat.
sintevtI
Size of be 296 bits.
the
be
lusays
Sid aleoa
Alsonthm.
of SHA tyit Shoub
Featunes of the Chs
The lensth
Messase length!-
than 2 64b6s hash digest Shovk
be leße Rngth of the
(ernsth ! - The
Di_est
tneh'n8 Such as
264 biS -
design, l hash
Inevesble ! By
.ahe inevesibe
SMA
Arndt Cnyptoqyathy n Bloe ehain! from
of geceing dota
Cyptgnphy is me fhod
tnathokted blale betoe2n the
toangacHong ttins
Secoe hain, hetort P?p
a 6loc kc megsage fn a
hoes enengt to 2ecye
Cure the
used t
Cyptography hashing blbc ?n a
and the Lin K
netwotk
bloe k infomason
the
bloechain ensiing
Similasty focuses gofeuandy
and
Cryptogaphy pant'ipants, trasach'ong,
Becunity ofdouhle sbendins.
transachons
dffenene
secunn
in
It heehs
blockehoin etsoye

that only
the
entended Can obdein
enSuye dat
-transaehong
þrocess
and

You might also like