Documente Academic
Documente Profesional
Documente Cultură
What is Blockchain?
Blockchain is the technology the underpins digital currency (Bitcoin, Litecoin,
Ethereum, and the like). The tech allows digital information to be distributed, but not copied.
That means each individual piece of data can only have one owner. A block is record of a
new transactions. When a block is completed, it’s added to the chain. Bitcoin owners have the
private password (a complex key) to an address on the chain, which is where their ownership
is recorded. Crypto-currency proponents like the distributed storage without a middle man
— you don’t need a bank to verify the transfer of money or take a cut of the transaction.
Cryptography
Cryptography is associated with the process of converting ordinary plain text into
unintelligible text and vice-versa. It is a method of storing and transmitting data in a
particular form so that only those for whom it is intended can read and process it.
Cryptography not only protects data from theft or alteration, but can also be used for user
authentication.
Confidentiality
Encryption : A very key component of protecting information confidentiality
would be encryption. Encryption ensures that only the right people (people who
knows the key) can read the information.
The sections that follow introduce the use of keys for encryption and decryption.
Symmetric-Key Encryption
Public-Key Encryption
Key Length and Encryption Strength
Symmetric-Key Encryption
Both the sender and receiver share a single key. The sender uses this key to encrypt plaintext
and send the cipher text to the receiver. On the other side the receiver applies the same key to
decrypt the message and recover the plain text.
Public-Key Encryption
The most commonly used implementations of public-key encryption are based on algorithms
patented by RSA Data Security. Therefore, this section describes the RSA approach to public-
key encryption.
Public-key encryption (also called asymmetric encryption) involves a pair of keys-a public key
and a private key-associated with an entity that needs to authenticate its identity electronically
or to sign or encrypt data. Each public key is published, and the corresponding private key is
kept secret. Data encrypted with your public key can be decrypted only with your private key.
One method of breaking a symmetric algorithm is to simply try every key within the full
algorithm until the right key is found. For public key algorithms, since half of the key pair is
publicly known, the other half (private key) can be derived using published, though complex,
mathematical calculations. Manually finding the key to break an algorithm is called a brute
force attack.
Integrity
integrity is the assurance that digital information is uncorrupted and can only be
accessed or modified by those authorized to do so. Integrity involves maintaining the
consistency, accuracy and trustworthiness of data over its entire lifecycle. To maintain
integrity, data must not be changed in transit and steps must be taken to ensure that data
cannot be altered by an unauthorized person or program. Such measures include
implementing user access controls and version control to prevent erroneous changes or
accidental deletion by authorized users. Other measures include the use
of checksums and cryptographic checksums to verify integrity. Network administration
measures to ensure data integrity include documenting system administration procedures,
parameters and maintenance activities, and creating disaster recovery plans for occurrences
such as power outages, server failure or security attacks. Should data become
corrupted, backups or redundancies must be available to restore the affected data to its correct
state.
Hash Function :
Hash functions are extremely useful and appear in almost all information security
applications.A hash function is a mathematical function that converts a numerical input
value into another compressed numerical value. The input to the hash function is of arbitrary
length but output is always of fixed length.Values returned by a hash function are
called message digest or simply hash values.
Accountability
Digital Signature :
Similarly, a digital signature is a technique that binds a person/entity to the digital data. This
binding can be independently verified by receiver as well as any third party.
Digital signature is a cryptographic value that is calculated from the data and a secret key
known only by the signer.
In real world, the receiver of message needs assurance that the message belongs to the
sender and he should not be able to repudiate the origination of that message. This
requirement is very crucial in business applications, since likelihood of a dispute over
exchanged data is very high.
Authentication
the user is not sure about the originator of the message. Message authentication can
be provided using the cryptographic techniques that use secret keys as done in case of
encryption. MAC algorithm is a symmetric key cryptographic technique to provide message
authentication. For establishing MAC process, the sender and receiver share a symmetric
key K.Essentially, a MAC is an encrypted checksum generated on the underlying message
that is sent along with a message to ensure message authentication.
Digital Certificate
Digital certificate is issued by a trusted third party which proves sender's identity to the
receiver and receiver’s identity to the sender.
Bitcoin
When someone makes a bitcoin transaction, it is verified and broadcast across the entire
network. Depending on the transaction fee (which the sender decides - a higher fee verifies
faster) the transaction may take less than 10 minutes to verified, and put into what is called
a block.
The bitcoin network consists of many computers attempting to "mine" blocks - each time a
block is found, all pending transactions on the network are sealed within it on the blockchain,
and they are considered verified. This bitcoin mining process essentially involves computers
making millions of guesses as to the block solution, which is designed to take roughly 10
minutes regardless of how many computers are mining bitcoin. The mining process is also
the only way new bitcoins are brought into existence - each block found has a reward value,
that decreases every 4 years until eventually it will reach zero.
Blockchain platform
1. BigChainDB, an open source system that “starts with a big data distributed database and
then adds blockchain characteristics — decentralized control, immutability and the
transfer of digital assets”.
2. Chain Core, a blockchain platform for issuing and transferring financial assets on a
permissioned blockchain infrastructure.
10. Hyperledger Fabric, which supports the use of one or more networks, each managing
different Assets, Agreements and Transactions between different sets of Member nodes.
Blockchain Advantages
1. Distributed
Since blockchain data is often stored in thousands of devices on a distributed network of
nodes, the system and the data are highly resistant to technical failures and malicious attacks.
Each network node is able to replicate and store a copy of the database and, because of this,
there is no single point of failure: a single node going offline does not affect the availability
or security of the network.
2. Stability
Confirmed blocks are very unlikely to be reversed, meaning that once data has been
registered into the blockchain, it is extremely difficult to remove or change it. This makes
blockchain a great technology for storing financial records or any other data where an audit
trail is required because every change is tracked and permanently recorded on a distributed
and public ledger.
3. Trustless system
In most traditional payment systems, transactions are not only dependent on the two
parties involved, but also on an intermediary - such as a bank, credit card company, or
payment provider. When using blockchain technology, this is no longer necessary because
the distributed network of nodes verify the transactions through a process known as mining.
For this reason, Blockchain is often referred to as a 'trustless' system.
Blockchain Disadvantage
1. 51% Attacks
The Proof of Work consensus algorithm that protects the Bitcoin blockchain has
proven to be very efficient over the years. However, there are a few potential attacks that can
be performed against blockchain networks and 51% attacks are among the most discussed.
Such an attack may happen if one entity manages to control more than 50% of the network
hashing power, which would eventually allow them to disrupt the network by intentionally
excluding or modifying the ordering of transactions.
2. Data modification
Another downside of blockchain systems is that once data has been added to the
blockchain it is very difficult to modify it. While stability is one of blockchain’s advantages,
it is not always good. Changing blockchain data or code is usually very demanding and often
requires a hard fork, where one chain is abandoned, and a new one is taken up.
3. Private keys
4. Inefficient
Blockchains, especially those using Proof of Work, are highly inefficient. Since
mining is highly competitive and there is just one winner every ten minutes, the work of
every other miner is wasted. As miners are continually trying to increase their computational
power, so they have a greater chance of finding a valid block hash, the resources used by the
Bitcoin network has increased significantly in the last few years, and it currently consumes
more energy than many countries, such as Denmark, Ireland, and Nigeria.
5. Storage
Blockchain ledgers can grow very large over time. The Bitcoin blockchain currently
requires around 200 GB of storage. The current growth in blockchain size appears to be
outstripping the growth in hard drives and the network risks losing nodes if the ledger
becomes too large for individuals to download and store.
CONCLUSION
Despite the downsides, blockchain technology presents some unique advantages, and
it is definitely here to stay. We still have a long road to mainstream adoption, but many
industries are getting to grips with the advantages and disadvantages of blockchain systems.
The next few years will likely see businesses and governments experimenting with new
applications to find out where blockchain technology adds the most value.