🏠
dev-angelist
HomeGitHubPortfolioTwitter/XMediumCont@ct
  • 🏠Home
  • 📒Certification Notes
    • Certified Ethical Hacker (CEH) Practical
    • CRTP
    • eWPTXv3
    • eCPPTv3
    • eWPTv2
    • eJPTv2
  • ✍️WRITEUPS & WALKTHROUGHS
    • TryHackMe (THM)
    • HackTheBox (HTB)
    • VulnHub
    • DockerLabs.es
    • PortSwigger - Web Sec Academy
    • HomeMade Labs
  • 🕸️WEB
    • eWPTXv3
    • eWPTv2
    • WAPT
    • DVWA
    • Secure Bank
    • Mutillidae II
    • WebSafeHub (WSH)
    • PortSwigger - Web Sec Academy
  • Common Services Pentest
    • Web Services - 80/443/8080
      • Tomcat
        • Lab Setup & Configuration
        • Enumeration
        • Exploitation
        • Mitigation & Hardening
    • SMB - 139/445
  • 👩‍💻CODING
    • 🐍Python
      • Python Offensive
      • Email Header Analyzer
      • Dir-Brute
      • Port-Scanner
      • Finger User Enumeration
    • DevSecOps
    • 🔹Powershell
  • 🔴Offensive Security
    • Active Directory (AD)
      • CRTP
      • AD HomeMade Lab
  • Privilege Escalation
    • Windows Privilege Escalation
  • 🔐Crypto & AI/ML
    • Crypto & Blockchain
      • Blockchain Security
        • Blockchain Architecture
          • 1.1 Characteristics and Features
          • 1.2 Core Components
          • 1.3 Consensus Algorithm
          • 1.4 Cryptography
          • 1.5 Cryptocurrency
        • Front-end Risks
          • 2.1 MFA and Blockchain
          • 2.2 Front-end
          • 2.3 OWASP Modeling for Blockchain
          • 2.4 Wallet Attacks
          • 2.5 Client Vulnerabilities
        • Back-end Risks
          • 3.1 Consensus Vulnerabilities
          • 3.2 Mining Pool Vulnerabilities
          • 3.3 Network Vulnerabilities
            • 3.3.1 DoS/DDoS/BDoS Attacks
            • 3.3.2 Delay Attacks
            • 3.3.3 Partition Attacks
            • 3.3.4 Sybil Attacks
            • 3.3.5 Time Jacking
            • 3.3.6 Transaction Attacks
        • Mining-Risks
          • 4.1 Mining Overview
          • 4.2 Proof of Stake Post Merge Ethereum
          • 4.3 Crypto Mining Malware (Cryptojacking)
          • 4.4 Zero Trust Models
          • 4.5 Byzantine Fault Tolerance
        • Blockchain as a Service
    • AI/ML Pentest
  • ACTIVE DIRECTORY
    • AD Enumeration
  • Guides & Articles
    • My Articles
    • Guides & Tutorials
      • Burp Suite - Configuration
      • Quickemu - VM
      • Setting Up SSH Keys
      • Building an AD Lab
      • Work Guidelines
  • Windows
    • Windows Enumeration
    • Windows Privilege Escalation
  • INTELLIGENCE GATHERING
    • OSINT
  • LINUX (tbd)
    • Linux Enumeration
    • Linux Privilege Escalation
Powered by GitBook
On this page
  • Consensus Algorithm
  • Key Concepts
  • Types of Consensus Algorithms
  • Importance of Consensus Algorithms
  1. Crypto & AI/ML
  2. Crypto & Blockchain
  3. Blockchain Security
  4. Blockchain Architecture

1.3 Consensus Algorithm

Previous1.2 Core ComponentsNext1.4 Cryptography

Last updated 6 months ago

Consensus Algorithm

A consensus algorithm is the mechanism by which participants in a blockchain network agree on the validity of transactions and the state of the ledger. Since blockchains are decentralized, consensus ensures that all nodes maintain a consistent and accurate copy of the ledger without relying on a central authority.

Key Concepts

  1. Decentralization

    • All nodes work collaboratively to validate transactions, ensuring no single point of failure.

  2. Fault Tolerance

    • Blockchain networks are designed to operate even if some nodes are malicious or fail to respond (Byzantine Fault Tolerance).

  3. Finality

    • Once a block is added to the blockchain, it is considered final and cannot be altered without consensus.

Types of Consensus Algorithms

  1. Proof of Work (PoW)

    • Mechanism: Miners compete to solve complex mathematical puzzles to validate transactions and add a new block.

    • Energy Consumption: High, due to the computational power required.

    • Security: Resistant to tampering but vulnerable to 51% attacks if a single entity controls the majority of the network's hash power.

    • Examples: Bitcoin, Ethereum (pre-merge).

  2. Proof of Stake (PoS)

    • Mechanism: Validators are chosen to create blocks based on the amount of cryptocurrency they stake as collateral.

    • Energy Efficiency: Much lower than PoW since it doesn’t require intensive computations.

    • Security: Malicious validators risk losing their stake, discouraging dishonest behavior.

    • Examples: Ethereum (post-merge), Cardano, Solana.

  3. Delegated Proof of Stake (DPoS)

    • Mechanism: Token holders vote to elect a small number of delegates to validate transactions and add blocks.

    • Speed: Faster than PoW and PoS due to fewer participants in block validation.

    • Examples: EOS, TRON.

  4. Practical Byzantine Fault Tolerance (PBFT)

    • Mechanism: Nodes exchange messages to reach a consensus, tolerating malicious nodes as long as they are fewer than one-third of the total.

    • Use Case: Ideal for private or permissioned blockchains.

    • Examples: Hyperledger Fabric, Ripple.

  5. Proof of Authority (PoA)

    • Mechanism: Validation is performed by a pre-approved group of trusted nodes.

    • Use Case: Common in private and consortium blockchains.

    • Examples: VeChain, Binance Smart Chain.

  6. Proof of Burn (PoB)

    • Mechanism: Validators "burn" (permanently destroy) cryptocurrency to demonstrate commitment to the network.

    • Use Case: Alternative to PoW that avoids high energy consumption.

Importance of Consensus Algorithms

  • Security: Ensures the integrity of transactions and blocks.

  • Decentralization: Prevents a single entity from controlling the blockchain.

  • Scalability: Determines the speed and efficiency of block validation.

  • Energy Usage: Varies significantly between algorithms, impacting sustainability.


🔐
https://images.ctfassets.net/8cjpn0bwx327/7DYKd4mAzvhzZ8RBbGgkf/f03c81473c12644b796905aff2c2535a/Understanding_Consensus_Mechanisms_in_Blockchain.jpg