In this chapter, we have addressed the cryptographic aspects necessary to understand the core mechanisms of blockchain and DLTs. We focused in particular on asymmetric cryptography, used extensively in the implementation of the functionalities of the blockchain, analyzing in detail the implementation of the RSA algorithm, which constitutes the reference model of the PKI architecture.
We then looked at an alternative solution in the generation and validation of asymmetric keys, consisting of the use of elliptic curve cryptography. Furthermore, we focused our attention on analyzing hash functions and digital signatures, which complete the range of opportunities that asymmetric cryptography offers for key management, authentication, and data integrity.
Finally, we analyzed the main data structure that supports the blockchain, the Merkle tree, showing a concrete example of...