IT PARK
    Most Popular

    What is the difference between cloud computing and virtualization?

    May 30, 2023

    Types of Big Data Analytics Data

    May 25, 2023

    How to delete all alarms on iPhone in one step?

    May 25, 2023

    IT PARK IT PARK

    • Home
    • Encyclopedia

      Why does the phone turn off when the remaining battery is not zero

      Jun 05, 2023

      Internet era! How to prevent personal information leakage

      Jun 04, 2023

      Which one to choose for mobile power? Analysis of the three major types of battery cells

      Jun 03, 2023

      What is IMEI code

      Jun 02, 2023

      Mobile phone battery is not durable? 14 tips to extend battery life

      Jun 01, 2023
    • AI

      What is the core issue of AI technology?

      Jun 05, 2023

      How to prove you're human in the AI jungle?

      Jun 04, 2023

      What is AI?

      Jun 03, 2023

      Microsoft for ChatGPT self-research AI chip, TSMC 5nm, as early as next year to open with

      Jun 02, 2023

      Will the latest AI "kill" programming

      Jun 02, 2023
    • Big Data

      Talking about data lake and data warehouse

      Jun 05, 2023

      To read big data, you have to master these core technologies first

      Jun 04, 2023

      Your privacy, how does big data know

      Jun 03, 2023

      Accurate data is more important than more data in the healthcare industry

      Jun 02, 2023

      Has the development of big data come to an end?

      Jun 01, 2023
    • CLO

      Major Cloud Computing Service Providers

      Jun 05, 2023

      On the Importance of Cloud Access Security Agent CASB

      Jun 04, 2023

      The importance of cloud technology for agile supply chain

      Jun 03, 2023

      The importance of financial governance in cloud computing

      Jun 02, 2023

      Building a Smart City: The Importance of Cloud Storage

      Jun 01, 2023
    • IoT

      Seven ways for the Internet of Things to play a role in e-commerce

      Jun 05, 2023

      The role of IoT devices in intelligent workplace technology

      Jun 04, 2023

      What is the Internet of Things

      Jun 03, 2023

      How does the Internet of Things affect business?

      Jun 02, 2023

      What are the key factors that enterprises need to consider when designing IoT devices?

      Jun 01, 2023
    • Blockchain

      Explanation of the consensus mechanism of blockchain

      Jun 05, 2023

      Introduction to Blockchain 4.0

      Jun 04, 2023

      Blockchain insulation, the universe is open

      Jun 03, 2023

      Blockchain technology helps track new crown virus

      Jun 02, 2023

      Blockchain Foundation - What is Blockchain Technology

      Jun 02, 2023
    IT PARK
    Home » Blockchain » Blockchain Foundation - What is Blockchain Technology
    Blockchain

    Blockchain Foundation - What is Blockchain Technology

    The Internet surprised us again with blockchain. We often hear words about cryptocurrency, bitcoin and other crypto related topics. If you want to know, "What is blockchain?" or "How does blockchain work?" you have come to the right place. In this article, we will learn all about blockchain, including its working principle and how to use it in our daily life.
    Updated: Jun 02, 2023
    Blockchain Foundation - What is Blockchain Technology

    The Internet surprised us again with blockchain. We often hear words about cryptocurrency, bitcoin and other crypto related topics. If you want to know, "What is blockchain?" or "How does blockchain work?" you have come to the right place. In this article, we will learn all about blockchain, including its working principle and how to use it in our daily life.

    History of Blockchain

    Blockchain was first introduced in 2008 as a public ledger for keeping Bitcoin transaction records. This method of recording transactions is transparent. Each record is time stamped, immutable (meaning that no one can change/delete records after adding records), and decentralized.

    It may be invented by one person or a group of people, or even by an AI named Dorian Satoshi Nakamoto.

    At that time, the term blockchain was not thrown away as often as it is now. This ledger technology created by Nakamoto has helped solve some major problems. First, it supports point-to-point transactions and does not require intermediary services to process transactions. In addition, it also solves the problem of double spending, which usually occurs in digital currency rather than physical cash.

    Double flower means that the same digital currency can be consumed twice.

    Around 2014, blockchain began to attract attention. People began to invest in it after seeing that it has more applications than just cryptocurrencies. It can be used in insurance and finance, health care, voting, transportation and other fields.

    What is blockchain?

    Blockchain is a distributed database or record keeping system, which is used to store digital records in a structure that is difficult to crack. Unlike traditional databases, blockchain does not store data in a centralized location. On the contrary, each node/computer on the network has a complete copy of the blockchain. When data is stored on the system, it is distributed to thousands of network nodes.

    How does the blockchain work?

    Blockchains store data sets in collections called blocks. Blocks are like containers. Each container has a limit or the maximum amount of content it can hold. In terms of blocks, the total amount of data it can contain is called block size limit.

    The capacity of each block is called the block size, which varies according to the blockchain (from several thousand bytes to about 1 megabyte).

    Bitcoin's block size is about 1MB, and Ethereum's block size is about 80KB..

    Although the block size looks small, they can carry up to 2000 transactions. Each block is stored in linear and chronological order, and each new block is added to the end of the chain. When a block reaches its maximum block size, it is closed and connected to another block using a hash algorithm, which is a cryptographic verification. Therefore, a continuous blockchain has been formed, giving rise to the name blockchain. However, if a block exceeds the block size, the network will reject it and will not be added to the chain.

     

    What makes blockchain secure and immutable?

    The unchangeability of the blockchain is due to the hash value of the block. Hash values are similar to fingerprints. Human beings have different fingerprints. In the case of blocks, the hash value is used as the unique identifier/fingerprint. Each block is digitally signed by the unique hash value generated by the hash algorithm/hash function. The current block, the previous block and a timestamp are used to generate these hash values. Minor changes in the input will result in a new hash value.

     

    The hash value is usually as follows: 3a42c503953909637f78dd8c99b3b85ddde362415585afc11901bdefe8349102

     

    Think of the hash function as a grinder. The grinder works in one direction only. It starts with an original project and grinds it into small pieces. The hash function is similar in that it converts raw data into an encrypted format that cannot be reverse engineered. There is no way to restore the original hash value generated, just as the ground meat cannot be converted back to the original form after passing through the grinder.

     

    Suppose a hacker wants to change a blockchain record. First, the hacker must run his node and find the block he wants to modify. If he successfully changes the block/makes the change, the newly generated hash value will not match the original hash value, making the block invalid on the chain.

    Keep in mind that this modification is currently only available on his node. More importantly, before a record is added to the primary public chain, it must be verified by other nodes. If most nodes (at least 51%) confirm the validity of the new modification, it can be added to the chain; Otherwise, it is considered invalid and rejected. Therefore, to achieve this, hackers need to make this exact change on most nodes/computers, which requires a lot of resources, which is actually impossible.

    Characteristics of blockchain

    Decentralization. This is one of the key features of blockchain. Except for private blockchain, blockchain has no central organization to manage network activities; Instead, the node maintains the network and validates the transaction. You can store important digital assets on the chain and directly control these assets through your private key. The private key is like a password generated by encryption, which is used to sign transactions and prove the ownership of the blockchain address.

    Transparent and open. Blockchain publicly stores all records and transactions, and anyone can access them at any time. Blockchain is designed so that no one can hide anything and use it for personal gain.

    Enhanced security and immutability. Each piece of data on the blockchain is hashed. That is, you cannot specify the actual content of the data. In addition, since hashes cannot be reverse engineered, it adds an additional layer of security. And because of the advanced cryptography and uniqueness of block hash, tampering with any block requires changing all the hashes of other blocks on most nodes, which is a lot of work and resources.

    blockchain technology foundation
    Previous Article Is it too early to exit the IoT?
    Next Article The importance of cloud technology for agile supply chain

    Related Articles

    Blockchain

    What causes the bitcoin network hash rate to increase?

    May 25, 2023
    CLO

    Cloud computing, what are the main security challenges

    May 29, 2023
    Blockchain

    Introduction to Blockchain 4.0

    Jun 04, 2023
    Most Popular

    What is the difference between cloud computing and virtualization?

    May 30, 2023

    Types of Big Data Analytics Data

    May 25, 2023

    How to delete all alarms on iPhone in one step?

    May 25, 2023
    Copyright © 2023 itheroe.com. All rights reserved. | Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.