Search icon CANCEL
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Conferences
Free Learning
Arrow right icon
Foundations of Blockchain
Foundations of Blockchain

Foundations of Blockchain: The pathway to cryptocurrencies and decentralized blockchain applications

Arrow left icon
Profile Icon Koshik Raj
Arrow right icon
€18.99 per month
Paperback Jan 2019 372 pages 1st Edition
eBook
€17.99 €26.99
Paperback
€32.99
Subscription
Free Trial
Renews at €18.99p/m
Arrow left icon
Profile Icon Koshik Raj
Arrow right icon
€18.99 per month
Paperback Jan 2019 372 pages 1st Edition
eBook
€17.99 €26.99
Paperback
€32.99
Subscription
Free Trial
Renews at €18.99p/m
eBook
€17.99 €26.99
Paperback
€32.99
Subscription
Free Trial
Renews at €18.99p/m

What do you get with a Packt Subscription?

Free for first 7 days. $19.99 p/m after that. Cancel any time!
Product feature icon Unlimited ad-free access to the largest independent learning library in tech. Access this title and thousands more!
Product feature icon 50+ new titles added per month, including many first-to-market concepts and exclusive early access to books as they are being written.
Product feature icon Innovative learning tools, including AI book assistants, code context explainers, and text-to-speech.
Product feature icon Thousands of reference materials covering every tech concept you need to stay up to date.
Subscribe now
View plans & pricing
Table of content icon View table of contents Preview book icon Preview Book

Foundations of Blockchain

A Bit of Cryptography

This chapter will cover all the basics of cryptography that are required for you to understand the vital role it plays in blockchain technology. We will delve deeply into all the aspects of cryptography that blockchain relies on. We will explain a few concepts in practical terms so that we can implement them with ease in later chapters. These include the following:

  • Cryptography in blockchain
  • Classical cryptography
  • Cryptographic primitives
  • Merkle trees
  • Encoding schemes

Modern cryptography is the study of private or secure communication. The fundamental objective of cryptography is to enable two people to communicate over an unsecure medium. This is achieved by encrypting a plaintext from the sender to form a ciphertext that can only be decrypted by the receiver, with whom the sender shares a secret. However, third parties can access the channel by which...

Cryptography in blockchain

Although we have mentioned that cryptography is crucial to the success of blockchain technology, we haven't explored any topic in particular. Most cryptographic primitives have some role or other in the creation of a decentralized blockchain application. We will study all the primitives that contribute to blockchain in this chapter.

Hashing is used in most blockchain applications to create links between blocks. It is also used in consensus algorithms such as proof-of-work, which basically exploits the hashing power of the computing systems that form the blockchain network. Digital signatures are used to sign and verify events such as transactions. Asymmetric key cryptography is a core concept in blockchain applications that gives identity to the participants of the network or can prove the ownership of assets.

Hence, cryptography is an excellent...

Classical cryptography

In this section, we'll look at a number of cryptographical techniques that have been used in historical ciphers. These ad hoc ciphers are not secure enough to be used in modern applications, but because of their simplicity, they can encourage us to learn more about cryptography. Exploring the weaknesses of classical cryptography also helps us to learn more about some of the principles of cryptography. Take a look at the following diagram:

Figure 2.1: Model of conventional encryption

Figure 2.1 shows the conventional encryption model used to encrypt a plaintext using a secret key that is shared with the other user over a secure channel. The user who wants to read the text will decrypt the ciphertext using the secret key, which will return the original plaintext. The key is private, and the encryption and decryption algorithms are made public because...

Cryptographic primitives

Cryptographic primitives are low-level cryptographic algorithms that are used to construct cryptographic protocols used by applications. These are the building blocks of designing a cryptographic system. A designer planning to implement a cryptographic protocol in a system doesn't have to worry about the low-level abstraction of the primitives and can concentrate entirely on building the application:

Figure 2.2: Taxonomy of cryptographic primitives

Figure 2.2 shows a detailed classification of cryptographic primitives. Blockchain technology makes use of most of these cryptographic primitives to achieve basic blockchain functionalities and secure data on the decentralized network: asymmetric cryptography for managing keys; digital signatures for transactions; and, most importantly, hashing, which is the backbone of the blockchain, are some of the...

Symmetric key cryptography

The symmetric key is a key-based cryptography whose algorithms use the same keys to perform encryption of plaintext and decryption of the ciphertext. These keys are shared between two parties over a secure channel. Any participant owning the shared key can perform both encryption and decryption operations on the data. A symmetric key cipher can either be stream encrypted or block encrypted.

Symmetric key cryptography doesn't play any significant role in blockchain-based applications. However, it will provide a better insight into key-based cryptography before we look into asymmetric cryptography.

Stream cipher

The stream cipher uses symmetric key cryptography. Each plaintext character is encrypted...

Asymmetric key cryptography

Asymmetric key cryptography is a widely used encryption technique in modern cryptography. It has a lot of applications other than encryption. It is also commonly used in several elements of blockchain, so we will cover this cryptography technique in depth, along with its primitives.

Symmetric key cryptography uses a shared key for both encryption and decryption. The biggest problem with this is that the shared key needs to be exchanged between participants over a secure channel, which can be quite hard to achieve. It also defeats the objective of encryption if we have a secure channel for communication in the first place. This is where asymmetric cryptography comes in. It uses a pair of keys called a public/private pair. The public key is constructed from the private key and can be freely broadcasted to other users.

In 1978, Ronald Rivest, Adi Shamir...

Cryptographic hashing

A cryptographic hash function is a type of function that maps arbitrary sized data to a fixed size string called a hash. Hash functions possess certain properties that make them ideal for use in cryptography.

Hash functions are widely used in hash table data structures. A hash table stores the data in a key-value pair. Hash tables are used when large keys need to be converted into smaller keys using a hash function, and then the values are mapped to these smaller keys. This makes the mapping of key to value quite easy, and this could be achieved in O(1) time complexity. This is due to the fact that hash functions have a constant time complexity.

We have repeatedly mentioned that hashing is the backbone of blockchain architecture, and it has several properties that make it really valuable and ideal for blockchain implementation.

Every hash function has the...

Encoding schemes

Encoding schemes are generally used in data storage or the transmission of textual data over a medium. You can often observe the conversion of binary to text-encoding schemes in primitive cryptographic implementations.

Encoding schemes provide a compact way of representing long sequences of characters using a base. For example, a decimal system uses base 10, which uses characters from 0-9, and a hexadecimal system uses additional characters from A-F, along with the numbers from the decimal system. The bigger the base of a system, the smaller the size of the encoded string.

Base64 is an encoding scheme that is widely used to store and transmit large files such as an image. It uses 26 lowercase letters, 26 uppercase letters, 10 numerical characters, and 2 special characters ("+" and "/").

Base58 is an encoding scheme developed for Bitcoin and...

Summary

This chapter covered all the essential cryptography topics, from classic cipher techniques to advanced cryptographic primitives. We began the chapter by discussing the classical cipher techniques. We explored both symmetric and asymmetric cryptography, along with a few examples. Cryptographic primitives, such as hashing and digital signatures, were covered in greater detail as they will act as the foundation for the blockchain concepts covered throughout this book.

Since we have covered some of the essential concepts in cryptography and looked at their respective applications, in the next chapter, we will try to implement some of the cryptography concepts that are applicable to the blockchain protocol by looking at a simple blockchain example.

Left arrow icon Right arrow icon
Download code icon Download Code

Key benefits

  • Learn the core concepts and foundations of the blockchain and cryptocurrencies
  • Understand the protocols and algorithms behind decentralized applications
  • Master how to architect, build, and optimize blockchain applications

Description

Blockchain technology is a combination of three popular concepts: cryptography, peer-to-peer networking, and game theory. This book is for anyone who wants to dive into blockchain from first principles and learn how decentralized applications and cryptocurrencies really work. This book begins with an overview of blockchain technology, including key definitions, its purposes and characteristics, so you can assess the full potential of blockchain. All essential aspects of cryptography are then presented, as the backbone of blockchain. For readers who want to study the underlying algorithms of blockchain, you’ll see Python implementations throughout. You’ll then learn how blockchain architecture can create decentralized applications. You’ll see how blockchain achieves decentralization through peer-to-peer networking, and how a simple blockchain can be built in a P2P network. You’ll learn how these elements can implement a cryptocurrency such as Bitcoin, and the wider applications of blockchain work through smart contracts. Blockchain optimization techniques, and blockchain security strategies are then presented. To complete this foundation, we consider blockchain applications in the financial and non-financial sectors, and also analyze the future of blockchain. A study of blockchain use cases includes supply chains, payment systems, crowdfunding, and DAOs, which rounds out your foundation in blockchain technology.

Who is this book for?

This book is for anyone who wants to dive into blockchain technology from first principles and build a foundational knowledge of blockchain. Familiarity with Python will be helpful if you want to follow how the blockchain protocols are implemented. For readers who are blockchain application developers, most of the applications used in this book can be executed on any platform.

What you will learn

  • The core concepts and technical foundations of blockchain
  • The algorithmic principles and solutions that make up blockchain and cryptocurrencies
  • Blockchain cryptography explained in detail
  • How to realize blockchain projects with hands-on Python code
  • How to architect the blockchain and blockchain applications
  • Decentralized application development with MultiChain, NEO, and Ethereum
  • Optimizing and enhancing blockchain performance and security
  • Classical blockchain use cases and how to implement them

Product Details

Country selected
Publication date, Length, Edition, Language, ISBN-13
Publication date : Jan 29, 2019
Length: 372 pages
Edition : 1st
Language : English
ISBN-13 : 9781789139396
Category :
Languages :
Concepts :
Tools :

What do you get with a Packt Subscription?

Free for first 7 days. $19.99 p/m after that. Cancel any time!
Product feature icon Unlimited ad-free access to the largest independent learning library in tech. Access this title and thousands more!
Product feature icon 50+ new titles added per month, including many first-to-market concepts and exclusive early access to books as they are being written.
Product feature icon Innovative learning tools, including AI book assistants, code context explainers, and text-to-speech.
Product feature icon Thousands of reference materials covering every tech concept you need to stay up to date.
Subscribe now
View plans & pricing

Product Details

Publication date : Jan 29, 2019
Length: 372 pages
Edition : 1st
Language : English
ISBN-13 : 9781789139396
Category :
Languages :
Concepts :
Tools :

Packt Subscriptions

See our plans and pricing
Modal Close icon
€18.99 billed monthly
Feature tick icon Unlimited access to Packt's library of 7,000+ practical books and videos
Feature tick icon Constantly refreshed with 50+ new titles a month
Feature tick icon Exclusive Early access to books as they're written
Feature tick icon Solve problems while you work with advanced search and reference features
Feature tick icon Offline reading on the mobile app
Feature tick icon Simple pricing, no contract
€189.99 billed annually
Feature tick icon Unlimited access to Packt's library of 7,000+ practical books and videos
Feature tick icon Constantly refreshed with 50+ new titles a month
Feature tick icon Exclusive Early access to books as they're written
Feature tick icon Solve problems while you work with advanced search and reference features
Feature tick icon Offline reading on the mobile app
Feature tick icon Choose a DRM-free eBook or Video every month to keep
Feature tick icon PLUS own as many other DRM-free eBooks or Videos as you like for just €5 each
Feature tick icon Exclusive print discounts
€264.99 billed in 18 months
Feature tick icon Unlimited access to Packt's library of 7,000+ practical books and videos
Feature tick icon Constantly refreshed with 50+ new titles a month
Feature tick icon Exclusive Early access to books as they're written
Feature tick icon Solve problems while you work with advanced search and reference features
Feature tick icon Offline reading on the mobile app
Feature tick icon Choose a DRM-free eBook or Video every month to keep
Feature tick icon PLUS own as many other DRM-free eBooks or Videos as you like for just €5 each
Feature tick icon Exclusive print discounts

Frequently bought together


Stars icon
Total 111.97
Blockchain By Example
€36.99
Hands-On Blockchain with Hyperledger
€41.99
Foundations of Blockchain
€32.99
Total 111.97 Stars icon

Table of Contents

13 Chapters
Introduction Chevron down icon Chevron up icon
A Bit of Cryptography Chevron down icon Chevron up icon
Cryptography in Blockchain Chevron down icon Chevron up icon
Networking in Blockchain Chevron down icon Chevron up icon
Cryptocurrency Chevron down icon Chevron up icon
Diving into Blockchain - Proof of Existence Chevron down icon Chevron up icon
Diving into Blockchain - Proof of Ownership Chevron down icon Chevron up icon
Blockchain Projects Chevron down icon Chevron up icon
Blockchain Optimizations and Enhancements Chevron down icon Chevron up icon
Blockchain Security Chevron down icon Chevron up icon
When Shouldn't We Use Blockchain? Chevron down icon Chevron up icon
Blockchain Use Cases Chevron down icon Chevron up icon
Other Books You May Enjoy Chevron down icon Chevron up icon
Get free access to Packt library with over 7500+ books and video courses for 7 days!
Start Free Trial

FAQs

What is included in a Packt subscription? Chevron down icon Chevron up icon

A subscription provides you with full access to view all Packt and licnesed content online, this includes exclusive access to Early Access titles. Depending on the tier chosen you can also earn credits and discounts to use for owning content

How can I cancel my subscription? Chevron down icon Chevron up icon

To cancel your subscription with us simply go to the account page - found in the top right of the page or at https://subscription.packtpub.com/my-account/subscription - From here you will see the ‘cancel subscription’ button in the grey box with your subscription information in.

What are credits? Chevron down icon Chevron up icon

Credits can be earned from reading 40 section of any title within the payment cycle - a month starting from the day of subscription payment. You also earn a Credit every month if you subscribe to our annual or 18 month plans. Credits can be used to buy books DRM free, the same way that you would pay for a book. Your credits can be found in the subscription homepage - subscription.packtpub.com - clicking on ‘the my’ library dropdown and selecting ‘credits’.

What happens if an Early Access Course is cancelled? Chevron down icon Chevron up icon

Projects are rarely cancelled, but sometimes it's unavoidable. If an Early Access course is cancelled or excessively delayed, you can exchange your purchase for another course. For further details, please contact us here.

Where can I send feedback about an Early Access title? Chevron down icon Chevron up icon

If you have any feedback about the product you're reading, or Early Access in general, then please fill out a contact form here and we'll make sure the feedback gets to the right team. 

Can I download the code files for Early Access titles? Chevron down icon Chevron up icon

We try to ensure that all books in Early Access have code available to use, download, and fork on GitHub. This helps us be more agile in the development of the book, and helps keep the often changing code base of new versions and new technologies as up to date as possible. Unfortunately, however, there will be rare cases when it is not possible for us to have downloadable code samples available until publication.

When we publish the book, the code files will also be available to download from the Packt website.

How accurate is the publication date? Chevron down icon Chevron up icon

The publication date is as accurate as we can be at any point in the project. Unfortunately, delays can happen. Often those delays are out of our control, such as changes to the technology code base or delays in the tech release. We do our best to give you an accurate estimate of the publication date at any given time, and as more chapters are delivered, the more accurate the delivery date will become.

How will I know when new chapters are ready? Chevron down icon Chevron up icon

We'll let you know every time there has been an update to a course that you've bought in Early Access. You'll get an email to let you know there has been a new chapter, or a change to a previous chapter. The new chapters are automatically added to your account, so you can also check back there any time you're ready and download or read them online.

I am a Packt subscriber, do I get Early Access? Chevron down icon Chevron up icon

Yes, all Early Access content is fully available through your subscription. You will need to have a paid for or active trial subscription in order to access all titles.

How is Early Access delivered? Chevron down icon Chevron up icon

Early Access is currently only available as a PDF or through our online reader. As we make changes or add new chapters, the files in your Packt account will be updated so you can download them again or view them online immediately.

How do I buy Early Access content? Chevron down icon Chevron up icon

Early Access is a way of us getting our content to you quicker, but the method of buying the Early Access course is still the same. Just find the course you want to buy, go through the check-out steps, and you’ll get a confirmation email from us with information and a link to the relevant Early Access courses.

What is Early Access? Chevron down icon Chevron up icon

Keeping up to date with the latest technology is difficult; new versions, new frameworks, new techniques. This feature gives you a head-start to our content, as it's being created. With Early Access you'll receive each chapter as it's written, and get regular updates throughout the product's development, as well as the final course as soon as it's ready.We created Early Access as a means of giving you the information you need, as soon as it's available. As we go through the process of developing a course, 99% of it can be ready but we can't publish until that last 1% falls in to place. Early Access helps to unlock the potential of our content early, to help you start your learning when you need it most. You not only get access to every chapter as it's delivered, edited, and updated, but you'll also get the finalized, DRM-free product to download in any format you want when it's published. As a member of Packt, you'll also be eligible for our exclusive offers, including a free course every day, and discounts on new and popular titles.