KEMBAR78
Cryptographic Primitives in Blockchain | PDF | Cryptography | Key (Cryptography)
0% found this document useful (0 votes)
148 views8 pages

Cryptographic Primitives in Blockchain

Ddfgh ok va va va va va va va va va ???? na edhum solala nitha sollura think panuringala ilaya one ? to you da best friend ha ha ha
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
148 views8 pages

Cryptographic Primitives in Blockchain

Ddfgh ok va va va va va va va va va ???? na edhum solala nitha sollura think panuringala ilaya one ? to you da best friend ha ha ha
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 8

Cryptographic Primitives

in Blockchain
Blockchain technology relies on a set of fundamental cryptographic
primitives to ensure security, integrity, and decentralization.
These core building blocks form the foundation for the many
applications and use cases of blockchain.

by Vicky Vignes h
Hash Functions
1 Irreversibility 2 Collision
Resistance
Hash functions are one-
way, meaning it is It is extremely difficult
computationally infeasible to find two different
to recover the original inputs that produce the
input from the hash same hash value.
output.

3 Deterministic
The same input will always produce the same hash output,
allowing for data verification and integrity checks.
Digital Signatures
Authentication Non-repudiation Tamper Evidence

Digital signatures allow the The signer cannot deny that they Any alteration to the signed data
recipient to verify the identity of created the signature, providing will invalidate the signature,
the sender and the integrity of the proof of origin and intent. alerting the recipient of potential
message. tampering.
Public Key Cryptography
1 Key Pair
Each user generates a pair of cryptographic keys - a
public key and a private key.

2 Encryption
Data encrypted with the public key can only be decrypted
with the corresponding private key.

3 Key Exchange
Public keys can be shared freely, allowing secure
communication without the need for a shared secret.
Consensus Protocols

Proof of Work
Miners compete to solve complex cryptographic puzzles to add new blocks to the
blockchain.

Proof of Stake
Validators with a stake in the network are selected to propose and validate new
blocks.

Byzantine Fault Tolerance


The network can reach consensus even in the presence of malicious or faulty
nodes.
Secure Random Number
Generation
Hardware-based Software-based RNG
RNG
Relies on pseudorandom
Uses physical phenomena like algorithms seeded by entropy
thermal noise or radioactive sources to generate
decay to generate truly unpredictable numbers.
random numbers.

Cryptographic RNG
Combines hardware and software techniques to produce highly
secure random numbers for cryptographic applications.
Encryption Algorithms
Symmetric Key
The same secret key is used for both encryption and
decryption, providing confidentiality.

Asymmetric Key
Public and private keys are used for encryption and
decryption, ensuring data privacy.

Hybrid Encryption
A combination of symmetric and asymmetric algorithms,
balancing efficiency and security.
Trusted Execution
Environments
Isolation Sensitive code and data are
isolated from the untrusted
main operating system.

Attestation The integrity of the TEE and


its contents can be verified,
ensuring security.

Confidentiality Data and code within the TEE


are protected from
unauthorized access or
modification.

You might also like