SlideShare a Scribd company logo
Introduction to
Blockchain Technology
AISHWARYA
Blockchain Myths
• Blockchain ≠ Bitcoin (or any other cryptocurrencies)
•You cannot replace a database with a blockchain
Blockchain is not a distributed database
Blockchain is not designed to securely store ANY data
•Anything and everything in the world cannot be solved using a blockchain
Blockchain is good but it cannot change the society in a week or a month
or a year
Decentralization
Requirements for a Successful Supply
Chain
1. Minimization of material procurement
2. Maximization of manufacturing capacity and sales
3. Meet demand numbers
4. Respond quickly to market opportunity by purchasing the production shortfall
from other players
5. Objective of each production unit would be to maximize the throughput and
its margin
6. Procurement would purchase the feedstock with not the best yields at lowest
cost
Requirements for a Successful Supply
Chain
Needs Strong Coordination among the Players
How do we obtain Real-time information from the
Stakeholders A web-based portal???
How do we obtain Real-time information from the Stakeholders?
We need a decentralized solution- Noone trust each other, buy they should
cooperate.
Blockchain is the answer!!!!
Decentralization and Blockchain
oYou have a network of different players (businesses, enterprises, commercial
establishments, Government or Private bodies, or even the individuals)
oEveryone has their own interest – they want to fulfill their goal
oThey do not trust each other
oIf they cooperate, the society gets benefited
oTrustless Decentralization = Blockchain
Solution to successful Supply Chain
Needs Strong Coordination among the Players
Hashing
Hashing is the process of converting raw data into an irreversible scrambled
format.
It applies a mathematical function, known as a hash function, to the input,
transforming it into a fixed-length output known as the hash value or digest. This
process ensures that the original information cannot be reconstructed from the
hash.
Requirement of Hashing
1. One Way : Data Encrypted
2. Deterministic : XYZ 2025205
3. Fast Computation:
4. Withstand Collision: No hacker should hack easily
5. Avalanche Effect:
Data
Password Hash Storage
If the recalculated hash matches the hash stored on the servers, during initial sign
up the log in is allowed
Integrity Verification
Hashing can be also for integrity checks to ensure the data isn’t corrupted . The
hash value/ digest will always be the same for similar input.
Hashing illustration
http://www.blockchain-basics.com/HashFunctions.html
Information hiding through Hashing
Given an H(x), it is “computationally difficult” to find x
• The difficulty depends on the size of the message digests
• Hiding helps to commit a value and then check it later
• Compute the message digest and store it in a digest store –
commit
• To check whether a message has been committed, match the
message digest at the digest store
What is SHA?
Secure Hash Algorithms
NSA & NIST joint development
Has multiple families such as SHA-0
SHA-1: Produces a 160-bit hash value, but is considered insecure due to
vulnerabilities.
SHA-2: A family of hash functions including SHA-224, SHA-256, SHA-384,
and SHA-512. SHA-256 is the most widely used in blockchain.
SHA-3: A newer standard designed to offer a higher level of security and
efficiency.
Website: https://en.wikipedia.org/wiki/Secure_Hash_Algorithms
Comparison of SHA Parameters
SHA-1
In cryptography, SHA-1 (Secure Hash Algorithm 1) is a hash function which
takes an input and produces a 160-bit (20-byte) hash value known as a message
digest – typically rendered as 40 hexadecimal digits.
It was designed by the United States National Security Agency, and is a U.S.
Federal Information Processing Standard.
Hash Function – SHA256
•Hashing is the process of converting raw data into an irreversible scrambled
format.
•It applies a mathematical function, known as a hash function, to the input,
transforming it into a fixed-length output known as the hash value or digest.
•This process ensures that the original information cannot be reconstructed from
the hash.
SHA-256
The “256” in SHA-256 signifies its fixed hash digest size, always producing a
256-bit value, regardless of the input plaintext or cleartext size. This
characteristic ensures consistent and strong cryptographic hashing.
Padd
Steps of SHA Working
Input Data: You provide some data (a message). This could be text, numbers, a file,
etc.
Padding: The message is first padded so that its length becomes a multiple of 512 bits.
Padding involves adding some extra bits to the message to ensure it's compatible with
the SHA-256 algorithm.
Message Blocks: The padded message is broken into chunks of 512 bits (64 bytes).
Initial Hash Values: SHA-256 starts with 8 initial hash values (these are constants).
Hashing Process: The algorithm processes each 512-bit block through 64 rounds of
mathematical operations (mixing, shifting, and rotating bits). These steps mix up the
data in a specific way.
Final Hash: After all the blocks are processed, the result is a fixed 256-bit (64-
character hexadecimal) hash value, which is the "fingerprint" of the input data.
Important Characteristics:
Fixed Size: Always produces a 256-bit output, regardless of input size.
Deterministic: Same input always produces the same hash.
Irreversible: It’s practically impossible to reverse the hash to get the original
input.
Unique: A small change in input drastically changes the hash (this is called the
avalanche effect).
Example
Input: "abc“
The word "abc" will be processed through SHA-256 to produce a 256-bit hash value.
Here’s an outline of the main steps involved in SHA-256:
First, the input string "abc" is converted into binary format using the ASCII values of
the characters:
'a' = 97 → 01100001
'b' = 98 → 01100010
'c' = 99 → 01100011
Step 1: Convert Input to Binary
The binary representation of "abc"
becomes:
01100001 01100010 01100011
Step 2: Padding the Input
SHA-256 requires the message length to be a multiple of 512 bits. If the input
message is shorter than 512 bits, it is padded. Padding is done by:
• Adding a single "1" bit.
• Adding "0" bits until the message length is 448 bits.
• Adding the original message length as a 64-bit binary number at the end (in
this case, 24 bits for "abc").
So, the padded message for "abc" looks like:
01100001 01100010 01100011 10000000 ...
00000000000000000000000000011000
This padded message is now 512 bits long.
Step 3: Initialize Hash Values
SHA-256 uses 8 initial hash values (these are constants):
H0 = 6a09e667
H1 = bb67ae85
H2 = 3c6ef372
H3 = a54ff53a
H4 = 510e527f
H5 = 9b05688c
H6 = 1f83d9ab
H7 = 5be0cd19
1.414213562...
0 . 0110 1010 0000 1001 1110 0110 0110 0111
6 a 0 9 e 6 6
7
Step 4: Process the Message in Blocks
SHA-256 processes the message in 512-bit blocks (in our case, there is only
one block). The message undergoes 64 rounds of operations, which involve:
Logical operations like XOR, AND, OR, and bitwise shifts and rotations.
Mixing the message bits with constants and the initial hash values.
Each round updates the hash values through a series of mathematical
functions. The goal of these operations is to mix up the input bits in a way
that results in a seemingly random output.
Step 5: Final Hash Value
After processing the block, the final hash values are concatenated to form the
256-bit output.
For the input “abc” the SHA 256 hash is:
ba7816bf 8f01cfea 414140de 5dae2223 b00361a3 96177a9c
b410ff61 f20015ad
Working of SHA
Step 1 & Padding length: Padding Bits: Bits are appended to the original input to
make it compatible with the hash function.
Total bits must always be multiple of 512 or 1024.
For example: 96 to 512 or 960 to 1024
The first bit added is ‘1’ and the rest are all zeros.(97 bits)
Original Message Padding Bits Length of input
Final Data to be hashed as a multiple of 512
RSA Algorithm:
The RSA algorithm is a widely-used encryption method that ensures secure
communication by converting plain text into scrambled, unreadable text (ciphertext) and
vice versa.
Key Generation:
1. Select two large prime numbers, p and q.
2 Multiply these numbers to find n = p x q, where n is called the modulus for encryption
and decryption.
3.
.
3. Choose a number e less than n, such that n is relatively prime to (p - 1) x (q -1). It means
that e and (p - 1) x (q - 1) have no common factor except 1. Choose "e" such that 1<e < φ (n), eis prime
to φ (n),
gcd (e,d(n)) =1
4. If n = p x q, then the public key is <e, n>. A plaintext message m is encrypted using public key <e,
n>. To find ciphertext from the plain text following formula is used to get ciphertext C.
C
Here, m must be less than n. A larger message (>n) is treated as a concatenation of messages, each of
which is encrypted separately.
5. To determine the private key, we use the following formula to calculate the d such that:
Or
6. The private key is <d, n>. A ciphertext message c is decrypted using private key <d, n>. To calculate
plain text m from the ciphertext c following formula is used to get plain text m.

More Related Content

PPTX
Blockchain Technology, Cryptography and cryptocurrencies Module2.pptx
PPTX
Network Security Unit-2 topic Part-2.pptx
PPTX
Information and data security cryptographic hash functions
PPTX
Data streaming algorithms
PPTX
Module (Blockchain & Cryptocurrency).pptx
PDF
Sha
PPTX
Ch_07 (1).pptx
PDF
Revisiting authentication - Systems Distributed NYC, 2024
Blockchain Technology, Cryptography and cryptocurrencies Module2.pptx
Network Security Unit-2 topic Part-2.pptx
Information and data security cryptographic hash functions
Data streaming algorithms
Module (Blockchain & Cryptocurrency).pptx
Sha
Ch_07 (1).pptx
Revisiting authentication - Systems Distributed NYC, 2024

Similar to Blockchain Technology Explained: A Beginner's Guide to the Future of the Internet (20)

PPTX
Lecture also solve this ppy slit for next-14.pptx
PPTX
Cryptography.pptx basics and detailed toptics also
PDF
How does cryptography work? by Jeroen Ooms
PDF
lecture13.pdf
PPTX
Chapter 2.pptx
PPTX
Blockchain Demystified
PPTX
Cryptographic Hash Functions in Security.pptx
PDF
PPTX
Cryptography Key Management.pptx
PPT
Secure hashing algorithm
PPTX
Module 2onblockchain technologies 2.pptx
PDF
Hash Function.pdf
PPTX
Hash Functions from Information Security
PPT
Distribution of public keys and hmac
PDF
Count based Secured Hash Algorithm.
PDF
HASH FUNCTIONS.pdf
PDF
Implementation of rainbow tables to crack md5 codes
PPTX
cryptography and network security cns.pptx
PDF
Cs8792 cns - unit iv
PDF
Cs8792 cns - unit iv
Lecture also solve this ppy slit for next-14.pptx
Cryptography.pptx basics and detailed toptics also
How does cryptography work? by Jeroen Ooms
lecture13.pdf
Chapter 2.pptx
Blockchain Demystified
Cryptographic Hash Functions in Security.pptx
Cryptography Key Management.pptx
Secure hashing algorithm
Module 2onblockchain technologies 2.pptx
Hash Function.pdf
Hash Functions from Information Security
Distribution of public keys and hmac
Count based Secured Hash Algorithm.
HASH FUNCTIONS.pdf
Implementation of rainbow tables to crack md5 codes
cryptography and network security cns.pptx
Cs8792 cns - unit iv
Cs8792 cns - unit iv
Ad

More from NAtional Institute of TEchnology Rourkela , Galgotias University (20)

PDF
Greenhouse Gases, Acid Rain, Ozone Layer depletion
PDF
Environment Air Pollution: Causes & Solutions
PPTX
String Matching Algorithms: Naive, KMP, Rabin-Karp
PDF
Bitcoin Basics: Wallets, Transactions, and Double Spending Explained
PPTX
The Foundation of Smart Contract Development on Ethereum
PPTX
Understanding Consensus Mechanisms in Blockchain: Proof of Work, Proof of Sta...
PPTX
Types of Cryptography: Secret Key and Asymmetric Key
PPTX
Types of Attacks: Attacks can be classified based on their method, target, or...
PPTX
introduction of cryptography and its applications
PPTX
Classical Cryptogtaphy Techniques: Ceaser Cipher
PPTX
PPTX
Need of Security , Security Approaches, Principles of Security
PPTX
Introduction to DBMS(Database Management System)
PPTX
Database Management System_Overall Structure
PDF
Introduction to Algorithm, Analysis of Algorithm
PPTX
2. Unit 1_Types of Opertaing Systems.pptx
Greenhouse Gases, Acid Rain, Ozone Layer depletion
Environment Air Pollution: Causes & Solutions
String Matching Algorithms: Naive, KMP, Rabin-Karp
Bitcoin Basics: Wallets, Transactions, and Double Spending Explained
The Foundation of Smart Contract Development on Ethereum
Understanding Consensus Mechanisms in Blockchain: Proof of Work, Proof of Sta...
Types of Cryptography: Secret Key and Asymmetric Key
Types of Attacks: Attacks can be classified based on their method, target, or...
introduction of cryptography and its applications
Classical Cryptogtaphy Techniques: Ceaser Cipher
Need of Security , Security Approaches, Principles of Security
Introduction to DBMS(Database Management System)
Database Management System_Overall Structure
Introduction to Algorithm, Analysis of Algorithm
2. Unit 1_Types of Opertaing Systems.pptx
Ad

Recently uploaded (20)

PDF
Embodied AI: Ushering in the Next Era of Intelligent Systems
PDF
TFEC-4-2020-Design-Guide-for-Timber-Roof-Trusses.pdf
PDF
July 2025 - Top 10 Read Articles in International Journal of Software Enginee...
PDF
composite construction of structures.pdf
PDF
Model Code of Practice - Construction Work - 21102022 .pdf
PDF
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
PDF
Well-logging-methods_new................
PPTX
Lecture Notes Electrical Wiring System Components
PDF
PPT on Performance Review to get promotions
PPTX
Recipes for Real Time Voice AI WebRTC, SLMs and Open Source Software.pptx
PPTX
Sustainable Sites - Green Building Construction
PPTX
additive manufacturing of ss316l using mig welding
PDF
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
PPTX
Geodesy 1.pptx...............................................
PPTX
UNIT-1 - COAL BASED THERMAL POWER PLANTS
PDF
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
PPTX
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
PPTX
web development for engineering and engineering
DOCX
573137875-Attendance-Management-System-original
PPTX
CH1 Production IntroductoryConcepts.pptx
Embodied AI: Ushering in the Next Era of Intelligent Systems
TFEC-4-2020-Design-Guide-for-Timber-Roof-Trusses.pdf
July 2025 - Top 10 Read Articles in International Journal of Software Enginee...
composite construction of structures.pdf
Model Code of Practice - Construction Work - 21102022 .pdf
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
Well-logging-methods_new................
Lecture Notes Electrical Wiring System Components
PPT on Performance Review to get promotions
Recipes for Real Time Voice AI WebRTC, SLMs and Open Source Software.pptx
Sustainable Sites - Green Building Construction
additive manufacturing of ss316l using mig welding
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
Geodesy 1.pptx...............................................
UNIT-1 - COAL BASED THERMAL POWER PLANTS
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
web development for engineering and engineering
573137875-Attendance-Management-System-original
CH1 Production IntroductoryConcepts.pptx

Blockchain Technology Explained: A Beginner's Guide to the Future of the Internet

  • 2. Blockchain Myths • Blockchain ≠ Bitcoin (or any other cryptocurrencies) •You cannot replace a database with a blockchain Blockchain is not a distributed database Blockchain is not designed to securely store ANY data •Anything and everything in the world cannot be solved using a blockchain Blockchain is good but it cannot change the society in a week or a month or a year
  • 4. Requirements for a Successful Supply Chain 1. Minimization of material procurement 2. Maximization of manufacturing capacity and sales 3. Meet demand numbers 4. Respond quickly to market opportunity by purchasing the production shortfall from other players 5. Objective of each production unit would be to maximize the throughput and its margin 6. Procurement would purchase the feedstock with not the best yields at lowest cost
  • 5. Requirements for a Successful Supply Chain Needs Strong Coordination among the Players How do we obtain Real-time information from the Stakeholders A web-based portal??? How do we obtain Real-time information from the Stakeholders? We need a decentralized solution- Noone trust each other, buy they should cooperate.
  • 6. Blockchain is the answer!!!!
  • 7. Decentralization and Blockchain oYou have a network of different players (businesses, enterprises, commercial establishments, Government or Private bodies, or even the individuals) oEveryone has their own interest – they want to fulfill their goal oThey do not trust each other oIf they cooperate, the society gets benefited oTrustless Decentralization = Blockchain
  • 8. Solution to successful Supply Chain Needs Strong Coordination among the Players
  • 9. Hashing Hashing is the process of converting raw data into an irreversible scrambled format. It applies a mathematical function, known as a hash function, to the input, transforming it into a fixed-length output known as the hash value or digest. This process ensures that the original information cannot be reconstructed from the hash.
  • 10. Requirement of Hashing 1. One Way : Data Encrypted 2. Deterministic : XYZ 2025205 3. Fast Computation: 4. Withstand Collision: No hacker should hack easily 5. Avalanche Effect: Data
  • 11. Password Hash Storage If the recalculated hash matches the hash stored on the servers, during initial sign up the log in is allowed
  • 12. Integrity Verification Hashing can be also for integrity checks to ensure the data isn’t corrupted . The hash value/ digest will always be the same for similar input.
  • 14. Information hiding through Hashing Given an H(x), it is “computationally difficult” to find x • The difficulty depends on the size of the message digests • Hiding helps to commit a value and then check it later • Compute the message digest and store it in a digest store – commit • To check whether a message has been committed, match the message digest at the digest store
  • 15. What is SHA? Secure Hash Algorithms NSA & NIST joint development Has multiple families such as SHA-0 SHA-1: Produces a 160-bit hash value, but is considered insecure due to vulnerabilities. SHA-2: A family of hash functions including SHA-224, SHA-256, SHA-384, and SHA-512. SHA-256 is the most widely used in blockchain. SHA-3: A newer standard designed to offer a higher level of security and efficiency. Website: https://en.wikipedia.org/wiki/Secure_Hash_Algorithms
  • 16. Comparison of SHA Parameters
  • 17. SHA-1 In cryptography, SHA-1 (Secure Hash Algorithm 1) is a hash function which takes an input and produces a 160-bit (20-byte) hash value known as a message digest – typically rendered as 40 hexadecimal digits. It was designed by the United States National Security Agency, and is a U.S. Federal Information Processing Standard.
  • 18. Hash Function – SHA256 •Hashing is the process of converting raw data into an irreversible scrambled format. •It applies a mathematical function, known as a hash function, to the input, transforming it into a fixed-length output known as the hash value or digest. •This process ensures that the original information cannot be reconstructed from the hash.
  • 19. SHA-256 The “256” in SHA-256 signifies its fixed hash digest size, always producing a 256-bit value, regardless of the input plaintext or cleartext size. This characteristic ensures consistent and strong cryptographic hashing. Padd
  • 20. Steps of SHA Working Input Data: You provide some data (a message). This could be text, numbers, a file, etc. Padding: The message is first padded so that its length becomes a multiple of 512 bits. Padding involves adding some extra bits to the message to ensure it's compatible with the SHA-256 algorithm. Message Blocks: The padded message is broken into chunks of 512 bits (64 bytes). Initial Hash Values: SHA-256 starts with 8 initial hash values (these are constants). Hashing Process: The algorithm processes each 512-bit block through 64 rounds of mathematical operations (mixing, shifting, and rotating bits). These steps mix up the data in a specific way. Final Hash: After all the blocks are processed, the result is a fixed 256-bit (64- character hexadecimal) hash value, which is the "fingerprint" of the input data.
  • 21. Important Characteristics: Fixed Size: Always produces a 256-bit output, regardless of input size. Deterministic: Same input always produces the same hash. Irreversible: It’s practically impossible to reverse the hash to get the original input. Unique: A small change in input drastically changes the hash (this is called the avalanche effect).
  • 22. Example Input: "abc“ The word "abc" will be processed through SHA-256 to produce a 256-bit hash value. Here’s an outline of the main steps involved in SHA-256: First, the input string "abc" is converted into binary format using the ASCII values of the characters: 'a' = 97 → 01100001 'b' = 98 → 01100010 'c' = 99 → 01100011 Step 1: Convert Input to Binary The binary representation of "abc" becomes: 01100001 01100010 01100011
  • 23. Step 2: Padding the Input SHA-256 requires the message length to be a multiple of 512 bits. If the input message is shorter than 512 bits, it is padded. Padding is done by: • Adding a single "1" bit. • Adding "0" bits until the message length is 448 bits. • Adding the original message length as a 64-bit binary number at the end (in this case, 24 bits for "abc"). So, the padded message for "abc" looks like: 01100001 01100010 01100011 10000000 ... 00000000000000000000000000011000 This padded message is now 512 bits long.
  • 24. Step 3: Initialize Hash Values SHA-256 uses 8 initial hash values (these are constants): H0 = 6a09e667 H1 = bb67ae85 H2 = 3c6ef372 H3 = a54ff53a H4 = 510e527f H5 = 9b05688c H6 = 1f83d9ab H7 = 5be0cd19 1.414213562... 0 . 0110 1010 0000 1001 1110 0110 0110 0111 6 a 0 9 e 6 6 7
  • 25. Step 4: Process the Message in Blocks SHA-256 processes the message in 512-bit blocks (in our case, there is only one block). The message undergoes 64 rounds of operations, which involve: Logical operations like XOR, AND, OR, and bitwise shifts and rotations. Mixing the message bits with constants and the initial hash values. Each round updates the hash values through a series of mathematical functions. The goal of these operations is to mix up the input bits in a way that results in a seemingly random output.
  • 26. Step 5: Final Hash Value After processing the block, the final hash values are concatenated to form the 256-bit output. For the input “abc” the SHA 256 hash is: ba7816bf 8f01cfea 414140de 5dae2223 b00361a3 96177a9c b410ff61 f20015ad
  • 27. Working of SHA Step 1 & Padding length: Padding Bits: Bits are appended to the original input to make it compatible with the hash function. Total bits must always be multiple of 512 or 1024. For example: 96 to 512 or 960 to 1024 The first bit added is ‘1’ and the rest are all zeros.(97 bits) Original Message Padding Bits Length of input Final Data to be hashed as a multiple of 512
  • 28. RSA Algorithm: The RSA algorithm is a widely-used encryption method that ensures secure communication by converting plain text into scrambled, unreadable text (ciphertext) and vice versa. Key Generation: 1. Select two large prime numbers, p and q. 2 Multiply these numbers to find n = p x q, where n is called the modulus for encryption and decryption. 3.
  • 29. . 3. Choose a number e less than n, such that n is relatively prime to (p - 1) x (q -1). It means that e and (p - 1) x (q - 1) have no common factor except 1. Choose "e" such that 1<e < φ (n), eis prime to φ (n), gcd (e,d(n)) =1 4. If n = p x q, then the public key is <e, n>. A plaintext message m is encrypted using public key <e, n>. To find ciphertext from the plain text following formula is used to get ciphertext C. C Here, m must be less than n. A larger message (>n) is treated as a concatenation of messages, each of which is encrypted separately. 5. To determine the private key, we use the following formula to calculate the d such that: Or 6. The private key is <d, n>. A ciphertext message c is decrypted using private key <d, n>. To calculate plain text m from the ciphertext c following formula is used to get plain text m.