BlockychainDistributed ConsensusDistributed consensus is the way to reach a common agreement in distributed or decentralized platforms. In blockchain applications, most…Jul 23, 2022Jul 23, 2022
BlockychainRSA-Public Key Encryption algorithmIn this algorithm, the encryption key is public and decryption key is kept as private. Anyone can encrypt the data but only the intended…Jul 22, 2022Jul 22, 2022
BlockychainPublic Key CryptographyPublic key cryptography, also known as asymmetrical cryptography, is a cryptographic system that uses a pair of keys for encryption and…Jul 17, 2022Jul 17, 2022
BlockychainCryptographyCryptography is a technique of protecting information using algorithms that modify the plain text ( original information ) to a cipher text…Jul 17, 2022Jul 17, 2022
BlockychainSHA256 ExampleIn this post, https://medium.com/@blockychain/sha-256-hashing-559452a61620 we would have explained about the SHA256 algorithm. Here, we…Jul 13, 2022Jul 13, 2022
BlockychainMerkle TreeMerkle tree is a data structure used for data verification and synchronization. Merkle tree also called hash tree, in which all leaf node…Jul 12, 2022Jul 12, 2022
BlockychainDigital SignatureDigital Signature is a digital code that is unique to each user. This can be included with an electronically transmitted document to verify…Jul 10, 2022Jul 10, 2022
BlockychainHash Function and it’s PropertiesHash Functions is a mathematical algorithm that transforms an arbitrary-sized input to an output where this process is irreversible. In…Jul 8, 2022Jul 8, 2022
BlockychainHash pointer and tamper detectionA Cryptographic Hash pointer is a pointer to a location where hash of information is stored. Hash pointer can also be called as a Hash…Jul 5, 2022Jul 5, 2022
BlockychainSHA-256 HashingSecure Hash Algorithm(SHA) is used for cryptographic security of information. The algorithm produces unique and irreversible hashes that…Jul 4, 2022Jul 4, 2022