1.3 How Does Cryptocurrency Work - New Background
1.3 How Does Cryptocurrency Work - New Background
Cryptocurrency Work?
Cryptography Hash Functions
● Hash is a mathematical function used in creating a digital fingerprint of data.
● Hash functions are used in SSL internet connections, cryptocurrency, and password security.
● For example, Bitcoin uses the SHA-256 cryptographic hash function for verifying transaction integrity.
● RSA (Rivest, Shamir, and Adleman) algorithm allows for generating two keys
that are mathematically linked: one private and one public.
Keys + Digital Signatures
● Alice who is creating the digital signature uses their own private key along
with bob’s public key to encrypt the message.
● The only way Bob can decrypt that data is with his private key along with
the Alice’s public key.
Consensus Algorithms
● As the name suggests, “consensus” means agreement .
● Consensus Algorithms are protocols that every node in a blockchain network follow in order to reach a shared
agreement about the state of the network.
● The consensus protocol in the blockchain network solves mainly two challenges.
○ Attackers: The consensus algorithms has to prevent an attacker who tries to add a malicious block at the end
of the chain.
○ Competing Chains: In the blockchain network, each and every block is distributed across the network in the
world. There will be a situation when two miners mine the block at the same time.
Wallets
● Cryptocurrency wallets are software programs that allow users to interact with the blockchain by performing
operations such as sending and receiving transactions.
● Wallets store the public and private keys for the user and provide digital signatures under the hood.
● The receiver of the transaction must have a private key corresponding to the public key where the bitcoins were sent.
● When a bitcoin transaction takes place, there is only a transfer of ownership of the bitcoins.
Wallets & UTXO
Duration for the Course
Security Highly secure because of miners competing with each other
to add blocks to the blockchain
Fraud Reduction Only way to spend crypto is by using the private key of the
owner