BLOCKCHAIN TECHNOLOGY Harness thepower of the most disruptive technology since the internet through real life examples! Dr. Jyoti Yadav Department of Computer Science Savitribai Phule Pune University 1
2.
Plan of Attack Historyof Blockchain Applications of Blockchain Client Server Vs Peer to Peer Systems Centralized Vs Decentralized Vs Distributed Centralized Databases Vs Blockchain What is Blockchain? Understanding SHA256 Hash Immutable Ledger Distributed P2P Network How Mining Works? (The Nonce, Cryptographic Puzzle) Byzantine Fault Tolerance Consensus Protocol (Defense Against Attackers, Competing Chains)
9 Verticals ofBlockchain Transformation Technology Entertainment Media Law & Crime Transportation Government Services Contracts Finance Human Rights & Contributions
5.
Blockchain – FoundationalConcepts The Blockchain will do to the Financial System What the Internet did to the Media Harvard Business Review
Understanding SHA256 Hash 28 Fingerprintis an identifier of a person •https://tools.superdatascience.com/blockchain/hash/ •https://tools.superdatascience.com/blockchain/public-private-keys/signatures
The blockchainalgorithm will set a target for the miners to accomplish a certain hash. Any hash above the target does not count. The target is set just to make it difficult for the miners or create a hurdle for them. If a miner finds a hash above the target for the block, the block won’t be created.
63.
Except Nonce nothingin the block can be changed Data: X Y 100 Rs X Amazon 1000 Rs Y Z 900 Rs
The Miners Win…asthey find a hash within the target and the nonce is called the GOLDEN NONCE. The miners can then add the block to the blockchain. The miners also get a reward. The nonce are located randomly in the Hash Pool and are unpredictable.
70.
70 The concept offinding the correct HASH is called the CRYPTOGRAPHIC PUZZLE.