🏠
dev-angelist
HomeGitHubPortfolioTwitter/XMediumCont@ct
  • 🏠Home
  • 📒Certification Notes
    • Certified Ethical Hacker (CEH) Practical
    • CRTP
    • eWPTXv3
    • eCPPTv3
    • eWPTv2
    • eJPTv2
  • ✍️WRITEUPS & WALKTHROUGHS
    • TryHackMe (THM)
    • HackTheBox (HTB)
    • VulnHub
    • DockerLabs.es
    • PortSwigger - Web Sec Academy
    • HomeMade Labs
  • 🕸️WEB
    • eWPTXv3
    • eWPTv2
    • WAPT
    • DVWA
    • Secure Bank
    • Mutillidae II
    • WebSafeHub (WSH)
    • PortSwigger - Web Sec Academy
  • Common Services Pentest
    • Web Services - 80/443/8080
      • Tomcat
        • Lab Setup & Configuration
        • Enumeration
        • Exploitation
        • Mitigation & Hardening
    • SMB - 139/445
  • 👩‍💻CODING
    • 🐍Python
      • Python Offensive
      • Email Header Analyzer
      • Dir-Brute
      • Port-Scanner
      • Finger User Enumeration
    • DevSecOps
    • 🔹Powershell
  • 🔴Offensive Security
    • Active Directory (AD)
      • CRTP
      • AD HomeMade Lab
  • Privilege Escalation
    • Windows Privilege Escalation
  • 🔐Crypto & AI/ML
    • Crypto & Blockchain
      • Blockchain Security
        • Blockchain Architecture
          • 1.1 Characteristics and Features
          • 1.2 Core Components
          • 1.3 Consensus Algorithm
          • 1.4 Cryptography
          • 1.5 Cryptocurrency
        • Front-end Risks
          • 2.1 MFA and Blockchain
          • 2.2 Front-end
          • 2.3 OWASP Modeling for Blockchain
          • 2.4 Wallet Attacks
          • 2.5 Client Vulnerabilities
        • Back-end Risks
          • 3.1 Consensus Vulnerabilities
          • 3.2 Mining Pool Vulnerabilities
          • 3.3 Network Vulnerabilities
            • 3.3.1 DoS/DDoS/BDoS Attacks
            • 3.3.2 Delay Attacks
            • 3.3.3 Partition Attacks
            • 3.3.4 Sybil Attacks
            • 3.3.5 Time Jacking
            • 3.3.6 Transaction Attacks
        • Mining-Risks
          • 4.1 Mining Overview
          • 4.2 Proof of Stake Post Merge Ethereum
          • 4.3 Crypto Mining Malware (Cryptojacking)
          • 4.4 Zero Trust Models
          • 4.5 Byzantine Fault Tolerance
        • Blockchain as a Service
    • AI/ML Pentest
  • ACTIVE DIRECTORY
    • AD Enumeration
  • Guides & Articles
    • My Articles
    • Guides & Tutorials
      • Burp Suite - Configuration
      • Quickemu - VM
      • Setting Up SSH Keys
      • Building an AD Lab
      • Work Guidelines
  • Windows
    • Windows Enumeration
    • Windows Privilege Escalation
  • INTELLIGENCE GATHERING
    • OSINT
  • LINUX (tbd)
    • Linux Enumeration
    • Linux Privilege Escalation
Powered by GitBook
On this page
  • Cryptography in Blockchain
  • Key Cryptographic Concepts
  1. Crypto & AI/ML
  2. Crypto & Blockchain
  3. Blockchain Security
  4. Blockchain Architecture

1.4 Cryptography

Previous1.3 Consensus AlgorithmNext1.5 Cryptocurrency

Last updated 6 months ago

Cryptography in Blockchain

Cryptography is fundamental to blockchain technology, providing security, integrity, and privacy in a trustless environment. It ensures that transactions are secure and tamper-proof while enabling participants to maintain anonymity.

Key Cryptographic Concepts

  1. Hashing

    • A hash function transforms input data into a fixed-size output (hash).

    • Properties:

      • Deterministic: The same input always produces the same hash.

      • Irreversible: Impossible to derive the original input from the hash.

      • Collision-Resistant: Two different inputs should not produce the same hash.

    • Use Cases:

      • Linking blocks in the blockchain (e.g., SHA-256 in Bitcoin).

      • Verifying data integrity.

  2. Public-Key Cryptography (Asymmetric Cryptography)

    • Mechanism: Involves two keys:

      • Public Key: Shared with others to receive messages.

      • Private Key: Kept secret and used to sign or decrypt messages.

    • Use Cases:

      • Digital signatures to verify transaction authenticity.

      • Generating wallet addresses.

  3. Digital Signatures

    • Mechanism:

      • A private key signs the transaction, creating a unique digital signature.

      • The public key verifies the signature’s validity.

    • Use Cases:

      • Ensures the sender is authorized to spend funds.

      • Prevents tampering with transaction data.

  4. Elliptic Curve Cryptography (ECC)

    • A lightweight cryptographic technique used in blockchain to generate public and private keys.

    • Advantages:

      • High security with smaller key sizes compared to RSA.

      • Efficient for resource-constrained devices.

  5. Merkle Trees

    • A hierarchical data structure that summarizes all transactions in a block.

    • Properties:

      • Efficient verification of large datasets.

      • Any tampering in the transaction data invalidates the root hash.

    • Use Cases:

      • Block validation.

      • Ensuring data integrity.

  6. Zero-Knowledge Proofs (ZKPs)

    • A cryptographic method where one party proves to another that they know a value without revealing the value itself.

    • Use Cases:

      • Enhancing privacy in blockchain (e.g., ZCash).

      • Secure authentication.

🔐
https://techvidvan.com/tutorials/wp-content/uploads/2022/06/blockchain-public-key-cryptography.webp