SlideShare a Scribd company logo
Block Chain
Introduction
• Blockchain was introduced in 2008 by Satoshi Nakamoto or a group of people with alias
who developed bitcoin.
Illustration of a Blockchain
• Blockchain technology decentralizes the entire network.
• Data cannot be tampered with in blockchain technology as it is cryptographically secured.
Introduction
• Blockchain is a distributed digital ledger of immutable records.
• Blockchain is composed of cryptographically linked blocks like a linked
list of a data structure and hash as a pointer.
• Chain of blocks in blockchain in chronological order.
• Hash represents each block uniquely.
Introduction
The properties of hash function are as follows:
• It is a one-way function, that is, given the input, the hash value can be
computed easily. However, given the hash value, it is very difficult to
produce the input back. This is like a trapdoor function in ECC.
• It is deterministic, that is, for the same input, the output is also the same.
• A small change in the input, there would be a big change in the output.
Blockchain and Its Versions
• The blockchain is shared among all the users of the networks.
• Each user has the same copy of it and can see the history of transactions. The
details are since the first block was added to the blockchain network.
• The first block is also called genesis block.
• There are three versions of Blockchain.
1. Blockchain 1.0 is used in digital currency like bitcoin or other
cryptocurrencies in a decentralized system.
2. Blockchain 2.0 is used in smart contracts and the transfer of stock and bonds
3. Blockchain 3.0 is used in government organizations, hospitals, and many
more.
Blocks in Blockchain
• Version number: Sequence number of the block.
• Previous hash: Hash of the previous block to which the
current block is linked.
• Merkle root hash: Hashes of all transactions are
structured in binary Merkle tree. The root of the tree is
called Merkle root hash.
• Timestamp: When the block is verified and mined.
• Nonce: A random number used to create the hash.
• Target: The generated hash should be less than the target
set by the network.
Miner
• The miner varies the nonce, while the previous hash and Merkle root
remain the same, to generate a hash value lower than the target.
• If the hash value meets the target set by the networks, then process stop.
Otherwise, the process is repeated and this is called proof of work
consensus algorithm.
• All the nodes of the network agrees on the same version of the fact in the
consensus algorithm.
Miner
• The miner verifies and validates the transactions and
adds the block.
• The first miner who gets the hash that meets the
target is rewarded.
• Since the miner invests resources and computing
power, he or she is rewarded for the same in terms of
bitcoin or other forms of remuneration.
• The miner also verifies if the sender has a sufficient
amount to be transferred.
• The target hash is decided months in advance for
every block.
• It is difficult to generate a nonce that satisfies the
target but it is easy to verify by other miners.
Role of Digital Signature in Blockchain
• Confidentiality is defined as the state of keeping secret or private. This
is carried out using public key for encryption and private keys for
decryption.
• Authentication is defined as the process of showing something
legitimate. This is achieved using digital signature.
Byzantine Generals Problem
Transaction Pool and Candidate Block
• Transaction pool stores all the unverified transactions before getting
included in a new block.
• Candidate block is a temporary current block that does not have valid
proof of work.
Tie in Generating Hashes or Adding Blocks by Miners:
Fork
• The blockchain diverges into a different chain with different rules or
protocols. The users of networks are not in agreement.
• There are two types of forks:
1. Soft fork: The new version works well with the old version, that is,
there is backward compatibility. Hence, there is flexibility.
2. Hard fork: This is rigid as there are different rules for different chains
and the users have to choose one.

More Related Content

PPTX
Blockchain and bitcoin fundamentals (usages and applications)
PPTX
Blockchain Blockchain Blockchain Lec 1.pptx
DOCX
UNIT I.docxcloud service management document anna university regulation 2021
PDF
Blockchain Fundamental_KIPMI_2022.02.26.pdf
PDF
Bitcoin, Banking and the Blockchain
PDF
Blockchain - Things you need to know
PPTX
Blockchain Interview Questions And Answers | Blockchain Technology Interview ...
PPTX
Introduction to Blockchain & development
Blockchain and bitcoin fundamentals (usages and applications)
Blockchain Blockchain Blockchain Lec 1.pptx
UNIT I.docxcloud service management document anna university regulation 2021
Blockchain Fundamental_KIPMI_2022.02.26.pdf
Bitcoin, Banking and the Blockchain
Blockchain - Things you need to know
Blockchain Interview Questions And Answers | Blockchain Technology Interview ...
Introduction to Blockchain & development

Similar to Block chain and its basic terminology include mining (20)

PPTX
Blockchain Basics
PPTX
Introduction to Blockchain
PDF
Blockchain, Hyperledger, DeFi, Web 3.0 - understanding and concepts
PPTX
Introduction to Blockchain
PDF
Blockchain - a formal introduction
PPTX
chapter 4 Selected Topics in computer.pptx
PPTX
chapter 4 Selected Topics in computer.pptx
PDF
Blockchain Computing: Prospects and Challenges for Digital Transformation  Pr...
DOCX
38 C O M M U N I C AT I O N S O F T H E A C M M A.docx
PDF
The presentation on the Blockchain_Introduction_KR.pdf
PDF
Blockchain Presentation
PDF
Blockchain overview, use cases, implementations and challenges
PPTX
Blockchain Technology
PPTX
Blockchain Technology
PDF
PPTX
BlockchainConf.tech - Build a private blockchain workshop
PPTX
Introduction to Blockchain technology .pptx
PPTX
Introduction to Blockchain technology.pptx
PPTX
Blockchain ppt
PDF
Introduction to Blockchain
Blockchain Basics
Introduction to Blockchain
Blockchain, Hyperledger, DeFi, Web 3.0 - understanding and concepts
Introduction to Blockchain
Blockchain - a formal introduction
chapter 4 Selected Topics in computer.pptx
chapter 4 Selected Topics in computer.pptx
Blockchain Computing: Prospects and Challenges for Digital Transformation  Pr...
38 C O M M U N I C AT I O N S O F T H E A C M M A.docx
The presentation on the Blockchain_Introduction_KR.pdf
Blockchain Presentation
Blockchain overview, use cases, implementations and challenges
Blockchain Technology
Blockchain Technology
BlockchainConf.tech - Build a private blockchain workshop
Introduction to Blockchain technology .pptx
Introduction to Blockchain technology.pptx
Blockchain ppt
Introduction to Blockchain
Ad

More from AvinashAvuthu2 (20)

PPTX
Different Internet of Things Applications
PPTX
Computer Networks Packet Switchings.pptx
PPTX
Game Programming Module - 6 AR and VR.pptx
PPT
Information Security Analysis and Audit 1
PPT
Security issues in the wireless networks.ppt
PPTX
M.Tech Internet of Things Unit - III.pptx
PPTX
M.Tech Internet of Things Unit - IV.pptx
PPTX
M.Tech Internet of Things Embeed Systems
PPTX
III CSE Internet of Things Unit - II.pptx
PPT
Information Security Audit and Analysis Module
PPT
Module - 2 - Security Device Management.ppt
PPT
Module - 3 - Device Configuration ISM.ppt
PPT
Module - 6 - Data and Information Management.ppt
PPT
Module - 5 - Managing Health and Safety.ppt
PPT
Module - 4 - Team Work and Communication.ppt
PPTX
Internet of Things Communication API and Levels
PPTX
Internet of Things Basics and its protocols
PPTX
Cyber Security Hacking and Attack Tree Analysis
PPTX
Cyber Security Penetration Testing Tools
PPTX
Game Programming Module for Sprite, Scripting
Different Internet of Things Applications
Computer Networks Packet Switchings.pptx
Game Programming Module - 6 AR and VR.pptx
Information Security Analysis and Audit 1
Security issues in the wireless networks.ppt
M.Tech Internet of Things Unit - III.pptx
M.Tech Internet of Things Unit - IV.pptx
M.Tech Internet of Things Embeed Systems
III CSE Internet of Things Unit - II.pptx
Information Security Audit and Analysis Module
Module - 2 - Security Device Management.ppt
Module - 3 - Device Configuration ISM.ppt
Module - 6 - Data and Information Management.ppt
Module - 5 - Managing Health and Safety.ppt
Module - 4 - Team Work and Communication.ppt
Internet of Things Communication API and Levels
Internet of Things Basics and its protocols
Cyber Security Hacking and Attack Tree Analysis
Cyber Security Penetration Testing Tools
Game Programming Module for Sprite, Scripting
Ad

Recently uploaded (20)

PPTX
Pharma ospi slides which help in ospi learning
PDF
Abdominal Access Techniques with Prof. Dr. R K Mishra
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PDF
Computing-Curriculum for Schools in Ghana
PDF
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
PDF
2.FourierTransform-ShortQuestionswithAnswers.pdf
PPTX
Pharmacology of Heart Failure /Pharmacotherapy of CHF
PPTX
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
PPTX
Lesson notes of climatology university.
PDF
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
PPTX
GDM (1) (1).pptx small presentation for students
PDF
TR - Agricultural Crops Production NC III.pdf
PDF
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
PDF
01-Introduction-to-Information-Management.pdf
PDF
FourierSeries-QuestionsWithAnswers(Part-A).pdf
PDF
Supply Chain Operations Speaking Notes -ICLT Program
PDF
Basic Mud Logging Guide for educational purpose
PDF
Anesthesia in Laparoscopic Surgery in India
PDF
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
PDF
102 student loan defaulters named and shamed – Is someone you know on the list?
Pharma ospi slides which help in ospi learning
Abdominal Access Techniques with Prof. Dr. R K Mishra
Final Presentation General Medicine 03-08-2024.pptx
Computing-Curriculum for Schools in Ghana
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
2.FourierTransform-ShortQuestionswithAnswers.pdf
Pharmacology of Heart Failure /Pharmacotherapy of CHF
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
Lesson notes of climatology university.
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
GDM (1) (1).pptx small presentation for students
TR - Agricultural Crops Production NC III.pdf
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
01-Introduction-to-Information-Management.pdf
FourierSeries-QuestionsWithAnswers(Part-A).pdf
Supply Chain Operations Speaking Notes -ICLT Program
Basic Mud Logging Guide for educational purpose
Anesthesia in Laparoscopic Surgery in India
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
102 student loan defaulters named and shamed – Is someone you know on the list?

Block chain and its basic terminology include mining

  • 2. Introduction • Blockchain was introduced in 2008 by Satoshi Nakamoto or a group of people with alias who developed bitcoin. Illustration of a Blockchain • Blockchain technology decentralizes the entire network. • Data cannot be tampered with in blockchain technology as it is cryptographically secured.
  • 3. Introduction • Blockchain is a distributed digital ledger of immutable records. • Blockchain is composed of cryptographically linked blocks like a linked list of a data structure and hash as a pointer. • Chain of blocks in blockchain in chronological order. • Hash represents each block uniquely.
  • 4. Introduction The properties of hash function are as follows: • It is a one-way function, that is, given the input, the hash value can be computed easily. However, given the hash value, it is very difficult to produce the input back. This is like a trapdoor function in ECC. • It is deterministic, that is, for the same input, the output is also the same. • A small change in the input, there would be a big change in the output.
  • 5. Blockchain and Its Versions • The blockchain is shared among all the users of the networks. • Each user has the same copy of it and can see the history of transactions. The details are since the first block was added to the blockchain network. • The first block is also called genesis block. • There are three versions of Blockchain. 1. Blockchain 1.0 is used in digital currency like bitcoin or other cryptocurrencies in a decentralized system. 2. Blockchain 2.0 is used in smart contracts and the transfer of stock and bonds 3. Blockchain 3.0 is used in government organizations, hospitals, and many more.
  • 6. Blocks in Blockchain • Version number: Sequence number of the block. • Previous hash: Hash of the previous block to which the current block is linked. • Merkle root hash: Hashes of all transactions are structured in binary Merkle tree. The root of the tree is called Merkle root hash. • Timestamp: When the block is verified and mined. • Nonce: A random number used to create the hash. • Target: The generated hash should be less than the target set by the network.
  • 7. Miner • The miner varies the nonce, while the previous hash and Merkle root remain the same, to generate a hash value lower than the target. • If the hash value meets the target set by the networks, then process stop. Otherwise, the process is repeated and this is called proof of work consensus algorithm. • All the nodes of the network agrees on the same version of the fact in the consensus algorithm.
  • 8. Miner • The miner verifies and validates the transactions and adds the block. • The first miner who gets the hash that meets the target is rewarded. • Since the miner invests resources and computing power, he or she is rewarded for the same in terms of bitcoin or other forms of remuneration. • The miner also verifies if the sender has a sufficient amount to be transferred. • The target hash is decided months in advance for every block. • It is difficult to generate a nonce that satisfies the target but it is easy to verify by other miners.
  • 9. Role of Digital Signature in Blockchain • Confidentiality is defined as the state of keeping secret or private. This is carried out using public key for encryption and private keys for decryption. • Authentication is defined as the process of showing something legitimate. This is achieved using digital signature.
  • 11. Transaction Pool and Candidate Block • Transaction pool stores all the unverified transactions before getting included in a new block. • Candidate block is a temporary current block that does not have valid proof of work. Tie in Generating Hashes or Adding Blocks by Miners:
  • 12. Fork • The blockchain diverges into a different chain with different rules or protocols. The users of networks are not in agreement. • There are two types of forks: 1. Soft fork: The new version works well with the old version, that is, there is backward compatibility. Hence, there is flexibility. 2. Hard fork: This is rigid as there are different rules for different chains and the users have to choose one.