Explore tens of thousands of sets crafted by our community.
Cryptocurrency and Encryption
30
Flashcards
0/30
Blockchain
A distributed database that maintains a continuously growing list of ordered records called blocks, which contains a cryptographic hash of the previous block, a timestamp, and transaction data, making it secure and resistant to data tampering.
Hash Function
A mathematical function that converts an input of any size into a fixed-size string of text. In cryptocurrency, it's used to maintain the integrity of the data and enable the proof of work system.
Public Key
A cryptographic code that allows a user to receive cryptocurrencies into their account and is derived from a private key. The public key is known to everyone and is used to ensure secure transactions.
Private Key
A secret piece of data that proves the right of a user to spend their cryptocurrencies. It is essential for signing transactions and must be kept secure.
Symmetric-Key Algorithm
A type of encryption where the same key is used for both encryption and decryption of data. In cryptocurrencies, it is used less frequently due to the need for secure key distribution.
Asymmetric-Key Algorithm
A cryptographic algorithm that uses two separate keys for encryption and decryption: a public key and a private key. This method is fundamental to cryptocurrency transactions and digital signatures.
Digital Signature
A mathematical scheme for proving the authenticity of digital messages or documents. In cryptocurrencies, it provides proof of the ownership of the private key without revealing it, functioning as a secure digital fingerprint.
Proof of Work (PoW)
A consensus algorithm in which one party proves to others that a certain amount of computational effort has been expended. It's used in cryptocurrencies like Bitcoin to validate transactions and create new blocks.
Proof of Stake (PoS)
An alternative consensus algorithm to PoW that chooses the creator of a new block based on their wealth, or stake, eliminating the need for intense computational tasks and reducing energy consumption.
Elliptic Curve Cryptography (ECC)
A public key cryptography approach based on elliptic curves over finite fields. It is favored in cryptocurrencies due to its higher level of security with smaller key sizes, which makes it efficient and fast.
Hash Rate
The measure of a miner's computational power in the cryptocurrency network, indicating the number of calculations that their hardware can perform every second. It impacts the chances of successfully mining a block.
Merkle Tree
A data structure that uses hashing to efficiently summarize and verify the integrity of large sets of data. In cryptocurrencies, it's used to compactly represent the contents of blocks.
Nonce
A nonce is an arbitrary number used only once in a cryptographic communication. In the mining process, it's the number that blockchain miners are solving for to create a new block through proof of work.
Block Reward
The incentive a miner receives for successfully mining a block on the blockchain. It consists of newly created cryptocurrency and transaction fees from the transactions included in the block.
Transaction Fee
A fee that is paid to the miners to incentivize them to include a transaction in the block they are mining. This can result in faster confirmation times for the transaction.
Cryptography
The science of encoding and decoding information to protect it from unauthorized access. In the context of cryptocurrencies, it's the foundation for ensuring that transactions are secure and cannot be tampered with.
HMAC (Hash-Based Message Authentication Code)
A specific construction for creating a message authentication code involving a cryptographic hash function in combination with a secret cryptographic key. It can be used to verify the data integrity and the authenticity of a message.
Address
An alphanumeric string that represents a possible destination for a cryptocurrency payment, derived from public keys and used by the blockchain to uniquely identify participants' accounts.
Consensus Mechanism
A system used on blockchain networks to achieve necessary agreement on a single data value or a single state of the network among distributed processes or multi-agent systems, like achieving agreement on the next block in the chain.
Smart Contract
A self-executing contract with the terms of the agreement directly written into lines of code, which automatically enforces and executes the terms when predetermined conditions are met, without the need for intermediaries.
Cryptographic Salt
Random data that is used as an additional input to a hash function to guarantee a unique output, thereby enhancing security by preventing dictionary and pre-computation rainbow table attacks.
Zero Knowledge Proof
A cryptographic method by which one party can prove to another that a statement is true, without revealing any information beyond the validity of the statement itself.
Sidechain
A separate blockchain that is attached to its parent through the use of a two-way peg, allowing assets to be interchangeable and move across chains without the need for third-party intermediaries.
Distributed Ledger
A consensus of replicated, shared, and synchronized digital data geographically spread across multiple sites, countries, or institutions. It's a foundation of blockchain technology used in cryptocurrencies.
Ciphertext
The result of encryption performed on plaintext using an algorithm, called a cipher. Ciphertext is unreadable until it has been converted back into plaintext using a decryption key.
51% Attack
A situation where more than half of the computing power on a blockchain network is controlled by a single entity or a group of entities, potentially allowing them to disrupt the network by double-spending coins and preventing certain transactions from being confirmed.
Cryptocurrency Wallet
A software program or hardware device that stores private and public keys, interacts with various blockchain to enable users to send and receive digital currency and monitor their balance.
Multisignature (Multisig)
A digital signature scheme which allows a group of users to sign a single document. In a cryptocurrency context, a multisig address requires multiple signatures to authorize a transaction, increasing security.
SHA-256
A cryptographic hash function that generates a fixed 256-bit hash, which is a feature of blockchains like Bitcoin. It is designed to be a one-way function, effectively working as part of the mining process.
Turing Completeness
A characteristic of a system, typically a programming language or a blockchain like Ethereum, that can perform any computation given enough time and resources, which means smart contracts can be written to perform complex functions.
© Hypatia.Tech. 2024 All rights reserved.