Cryptography for Blockchain Technology

Chapter 1: Introduction
What to expect?
Decentralized Money
Banking
The Blockchain
Decentralizing the Blockchain
Chapter 2: Cryptography
Hashing
Properties of Hash Functions
Current Hash Functions
SHA-256 as an example
Brute Force Attacks
The Birthday Paradox
Switching Hash Functions
Keyed Hash Functions
Symmetric Encryption
The Diffie-Hellman Key Exchange
Man in the Middle Attacks
Digital Signatures
Public Key Infrastructure
Digital Signatures with RSA
Chapter 3: Applications on the Blockchain
Transactions on the Blockchain
The SECP256K1-Standard
From Key to Address
Key Generation in Python
Brute Forcing Keys in Python
The Odds for the Brute Force Attack
Chapter 4: Mining – Proof of Work
Double Spending
Mining – Proof of Work
The Mining Algorithm
Soft Forks
Maliciously Produced Uncle Blocks
Mining Rewards
Mining Pools
P2Pool
Is Mining worth it?
Merkle Trees
Hashing Algorithms in PoW-Coins
Disadvantages of Proof of Work
Chapter 5: Privacy
Bitcoin is not anonymous
Short Introduction to Tor
Tor under attack
Simplified Payment Verfication Clients
Bloom Filter
Mixer
Coinjoin
Ring Signatures
Pedersen Commitments
The Maths Behind Pedersen
Zero-knowledge Proofs
Final Exam: Cryptography for Blockchain Technology (incl. Participation Certificate)
Previous Lektion
Next Lektion

The Blockchain

  1. Cryptography for Blockchain Technology
  2. Chapter 1: Introduction
  3. The Blockchain

Link

GitHub Bitcoin
Previous Lektion
Back to Kapitel
Next Lektion
Login
Accessing this masterclass requires a login. Please enter your credentials below!

Lost Your Password?
Register
Don't have an account? Register one!
Register an Account