Cryptography for Blockchain Technology
Chapter 1: Introduction
5 Lektionen
What to expect?
Decentralized Money
Banking
The Blockchain
Decentralizing the Blockchain
Chapter 2: Cryptography
14 Lektionen
Hashing
Properties of Hash Functions
Current Hash Functions
SHA-256 as an example
Brute Force Attacks
The Birthday Paradox
Switching Hash Functions
Keyed Hash Functions
Symmetric Encryption
The Diffie-Hellman Key Exchange
Man in the Middle Attacks
Digital Signatures
Public Key Infrastructure
Digital Signatures with RSA
Chapter 3: Applications on the Blockchain
6 Lektionen
Transactions on the Blockchain
The SECP256K1-Standard
From Key to Address
Key Generation in Python
Brute Forcing Keys in Python
The Odds for the Brute Force Attack
Chapter 4: Mining – Proof of Work
12 Lektionen
Double Spending
Mining – Proof of Work
The Mining Algorithm
Soft Forks
Maliciously Produced Uncle Blocks
Mining Rewards
Mining Pools
P2Pool
Is Mining worth it?
Merkle Trees
Hashing Algorithms in PoW-Coins
Disadvantages of Proof of Work
Chapter 5: Privacy
11 Lektionen
Bitcoin is not anonymous
Short Introduction to Tor
Tor under attack
Simplified Payment Verfication Clients
Bloom Filter
Mixer
Coinjoin
Ring Signatures
Pedersen Commitments
The Maths Behind Pedersen
Zero-knowledge Proofs
Final Exam: Cryptography for Blockchain Technology (incl. Participation Certificate)
Previous Lektion
Next Lektion
Banking
Cryptography for Blockchain Technology
Chapter 1: Introduction
Banking
Previous Lektion
Back to Kapitel
Next Lektion
Login
Accessing this masterclass requires a login. Please enter your credentials below!
Benutzername oder E-Mail-Adresse
Passwort
Angemeldet bleiben
Lost Your Password?
Register
Don't have an account? Register one!
Register an Account