Blockchain is a decentralized, distributed ledger that comprises blocks. The Blocks are connected to form a long chain. Each block comprises an address to the previous block and some information. The address part is done with the help of hashing. The information comprises data such as transactions and is encrypted. Blockchain was first implemented in the year 2008 by a group of people named Satoshi Nakamoto. Blockchain uses strong cryptographic methods to manage the whole network.
Terms Related to Blockchain
Before diving deep into more, let us be familiar with the five most important things: Block, miner, node, Block Reward and Cryptography.
Block: A block is the unit of blockchain that contains information in encrypted form. The blocks are connected. It is also called an immutable record as it cannot be reverted once created. There are three types of Blocks: Genesis Block, Valid Block and Orphan Blocks. Genesis Block is the first block that is created at the start of the blockchain. Valid Blocks are the blocks validated by miners and added to the blockchain. Orphan Blocks, as the name suggests, they are not added to any blockchain.
Miner: Blockchain Mining comprises of verification of transactions. Since blockchain is highly decentralized, no authority can verify and secure the transactions. Miners are the users of the technology who verify the transactions. After successful verification, they get incentives.
Node: Nodes are devices in which blocks are stored. The nodes also have a database that stores the history of transactions and is connected.
Block Reward: A block reward is an incentive that is given to miners when they participate in the validation of the blocking process. It has two parts: block subsidy and transaction fees.
Cryptography: It is a practice used in this technology to encode and decode data. The aim is to protect data with the help of codes. The techniques used are a part of security protocols to prevent unauthorized access from third parties. The word is made up of two terms ‘Krypto’ means ‘hidden’ and ‘Graphy’ means ‘written’.
The working is a multistep process, but it involves four phases: the creation of the block, verification of the block, the addition of the block and updation of the database. The steps are as follows:
An authentic user requests a transaction.
A block is created in which the transaction or any other data is specified.
The block is circulated all over the network. Blockchain protocols do this.
Miners verify the block. Upon successful verification, the miners get incentives.
After the successful transaction, the database is added.
Cryptographic Primitives
Cryptographic Primitives are the tools used to build security protocols, which comprise low-level algorithms. Security protocols are nothing but algorithms that are developed by Cryptographic designers using Cryptographic Primitives as tools, and these protocols are executed when certain conditions are met. Since Blockchain is highly decentralized in nature, the security of data is of utmost importance. For example: Suppose two users want to exchange information on a public Blockchain. In Public Blockchain, everybody can see the transaction process. To secure the data, encryption algorithms are used. For decrypting, the data decryption algorithms are used. These cryptographic primitives are used to develop these high-level secured algorithms.
On Internet, protocols are a set of rules that are used to govern the network. Cryptographic Protocols are the same. They are the rules that secure the whole blockchain network. The rules are made using cryptographic primitives as the base. They are transparent as they are programmed. The goal of these protocols is to provide data integrity, secure the exchange of data, and maintain the security of the whole network. Hence they are often known as security protocols. Commonly used cryptographic protocols are Bitcoin, Hyperledger, Ethereum, Corda etc.
Combining Cryptographic Primitives
As we all know, each cryptographic primitive is highly specific, and they are the building blocks of any crypto protocols. So each crypto protocol performs a single task. The primitives are limited, and developing them is a tedious task. This is because they are low-level programs and requires complex mathematical analysis. So designers usually combine one or more cryptographic primitives to establish strong crypto protocols so that the protocols can at least tackle the other small problems besides the main problem. For instance, hashing and encryption methods can be combined.
Commonly used Cryptographic Primitives
There are many cryptographic primitives, but we will discuss the most commonly used ones. They are as follows:
One-way hash function: It is a mathematical function which converts an input of any length to a binary sequence of fixed length. It cannot be reverted, which means the original string cannot be retrieved back from the hash. It is to be noted that even a small change in the input can change the meaning of the whole output. For example, SHA256 is a hash function. It generates 32-byte strings for any input.
Symmetric Key Cryptography: It is a popular encryption algorithm and is also known as symmetric encryption. The principle of this algorithm is a shared key. For example, a person wants to send some confidential data. He/She encrypts the data and ‘locks’ it with a key. The same key is used to decrypt or ‘unlock’ the data when the message is received. This algorithm is mostly used when large amounts of data are sent. The problem is sharing the key. The sender and receiver parties should have the same key. Examples of Symmetric key Cryptography are AES, DES, and 3DES.
Asymmetric key cryptography: It is also known as public key cryptography. This method has been developed to cope with the disadvantage of Symmetric Key Cryptography. Two types of keys are used: Public key and private key. The public key is used to encrypt the message, whereas the private key decrypts the message. Examples are: Diffie-Hellman, DSA and RSA
Digital Signature: This is used in blockchains to authenticate transactions or other data. Whenever a digital signature is used, it establishes that the rightful owner has sent it and the message has not been altered. The here private key is used as a digital signature by the user, and once it has been sent to the receivers, the receivers validate the message using the public key.
Private Information Retrieval: This protocol allows users to retrieve information from the database without other users knowing about it. Here the user can anonymously retrieve the information from another server.
Conclusion
Let us recap important points from the article here:
Cryptographic Primitives are building blocks of Blockchain security. They form the baseline of the security protocols.
Although complex, these are highly reliable and can be used to develop any security protocols with certain changes.
The crypto designers must choose and combine the primitives so that there are no flaws and the whole tech is completely safe and secure.
The media shown in this article is not owned by Analytics Vidhya and is used at the Author’s discretion.
Experienced Network Expert with a demonstrated history of working in the e-learning industry. Skilled in Python, C++,C ,Machine Learning, Artificial Intelligence,Blockchain,Deep Learning, Photography and Mathematics. Currently pursuing Bachelor of Technology (B.Tech) , in COMPUTER SCIENCE ENGINEERING from GOVERNMENT COLLEGE OF ENGINEERING AND LEATHER TECHNOLOGY.
We use cookies essential for this site to function well. Please click to help us improve its usefulness with additional cookies. Learn about our use of cookies in our Privacy Policy & Cookies Policy.
Show details
Powered By
Cookies
This site uses cookies to ensure that you get the best experience possible. To learn more about how we use cookies, please refer to our Privacy Policy & Cookies Policy.
brahmaid
It is needed for personalizing the website.
csrftoken
This cookie is used to prevent Cross-site request forgery (often abbreviated as CSRF) attacks of the website
Identityid
Preserves the login/logout state of users across the whole site.
sessionid
Preserves users' states across page requests.
g_state
Google One-Tap login adds this g_state cookie to set the user status on how they interact with the One-Tap modal.
MUID
Used by Microsoft Clarity, to store and track visits across websites.
_clck
Used by Microsoft Clarity, Persists the Clarity User ID and preferences, unique to that site, on the browser. This ensures that behavior in subsequent visits to the same site will be attributed to the same user ID.
_clsk
Used by Microsoft Clarity, Connects multiple page views by a user into a single Clarity session recording.
SRM_I
Collects user data is specifically adapted to the user or device. The user can also be followed outside of the loaded website, creating a picture of the visitor's behavior.
SM
Use to measure the use of the website for internal analytics
CLID
The cookie is set by embedded Microsoft Clarity scripts. The purpose of this cookie is for heatmap and session recording.
SRM_B
Collected user data is specifically adapted to the user or device. The user can also be followed outside of the loaded website, creating a picture of the visitor's behavior.
_gid
This cookie is installed by Google Analytics. The cookie is used to store information of how visitors use a website and helps in creating an analytics report of how the website is doing. The data collected includes the number of visitors, the source where they have come from, and the pages visited in an anonymous form.
_ga_#
Used by Google Analytics, to store and count pageviews.
_gat_#
Used by Google Analytics to collect data on the number of times a user has visited the website as well as dates for the first and most recent visit.
collect
Used to send data to Google Analytics about the visitor's device and behavior. Tracks the visitor across devices and marketing channels.
AEC
cookies ensure that requests within a browsing session are made by the user, and not by other sites.
G_ENABLED_IDPS
use the cookie when customers want to make a referral from their gmail contacts; it helps auth the gmail account.
test_cookie
This cookie is set by DoubleClick (which is owned by Google) to determine if the website visitor's browser supports cookies.
_we_us
this is used to send push notification using webengage.
WebKlipperAuth
used by webenage to track auth of webenagage.
ln_or
Linkedin sets this cookie to registers statistical data on users' behavior on the website for internal analytics.
JSESSIONID
Use to maintain an anonymous user session by the server.
li_rm
Used as part of the LinkedIn Remember Me feature and is set when a user clicks Remember Me on the device to make it easier for him or her to sign in to that device.
AnalyticsSyncHistory
Used to store information about the time a sync with the lms_analytics cookie took place for users in the Designated Countries.
lms_analytics
Used to store information about the time a sync with the AnalyticsSyncHistory cookie took place for users in the Designated Countries.
liap
Cookie used for Sign-in with Linkedin and/or to allow for the Linkedin follow feature.
visit
allow for the Linkedin follow feature.
li_at
often used to identify you, including your name, interests, and previous activity.
s_plt
Tracks the time that the previous page took to load
lang
Used to remember a user's language setting to ensure LinkedIn.com displays in the language selected by the user in their settings
s_tp
Tracks percent of page viewed
AMCV_14215E3D5995C57C0A495C55%40AdobeOrg
Indicates the start of a session for Adobe Experience Cloud
s_pltp
Provides page name value (URL) for use by Adobe Analytics
s_tslv
Used to retain and fetch time since last visit in Adobe Analytics
li_theme
Remembers a user's display preference/theme setting
li_theme_set
Remembers which users have updated their display / theme preferences
We do not use cookies of this type.
_gcl_au
Used by Google Adsense, to store and track conversions.
SID
Save certain preferences, for example the number of search results per page or activation of the SafeSearch Filter. Adjusts the ads that appear in Google Search.
SAPISID
Save certain preferences, for example the number of search results per page or activation of the SafeSearch Filter. Adjusts the ads that appear in Google Search.
__Secure-#
Save certain preferences, for example the number of search results per page or activation of the SafeSearch Filter. Adjusts the ads that appear in Google Search.
APISID
Save certain preferences, for example the number of search results per page or activation of the SafeSearch Filter. Adjusts the ads that appear in Google Search.
SSID
Save certain preferences, for example the number of search results per page or activation of the SafeSearch Filter. Adjusts the ads that appear in Google Search.
HSID
Save certain preferences, for example the number of search results per page or activation of the SafeSearch Filter. Adjusts the ads that appear in Google Search.
DV
These cookies are used for the purpose of targeted advertising.
NID
These cookies are used for the purpose of targeted advertising.
1P_JAR
These cookies are used to gather website statistics, and track conversion rates.
OTZ
Aggregate analysis of website visitors
_fbp
This cookie is set by Facebook to deliver advertisements when they are on Facebook or a digital platform powered by Facebook advertising after visiting this website.
fr
Contains a unique browser and user ID, used for targeted advertising.
bscookie
Used by LinkedIn to track the use of embedded services.
lidc
Used by LinkedIn for tracking the use of embedded services.
bcookie
Used by LinkedIn to track the use of embedded services.
aam_uuid
Use these cookies to assign a unique ID when users visit a website.
UserMatchHistory
These cookies are set by LinkedIn for advertising purposes, including: tracking visitors so that more relevant ads can be presented, allowing users to use the 'Apply with LinkedIn' or the 'Sign-in with LinkedIn' functions, collecting information about how visitors use the site, etc.
li_sugr
Used to make a probabilistic match of a user's identity outside the Designated Countries
MR
Used to collect information for analytics purposes.
ANONCHK
Used to store session ID for a users session to ensure that clicks from adverts on the Bing search engine are verified for reporting purposes and for personalisation
We do not use cookies of this type.
Cookie declaration last updated on 24/03/2023 by Analytics Vidhya.
Cookies are small text files that can be used by websites to make a user's experience more efficient. The law states that we can store cookies on your device if they are strictly necessary for the operation of this site. For all other types of cookies, we need your permission. This site uses different types of cookies. Some cookies are placed by third-party services that appear on our pages. Learn more about who we are, how you can contact us, and how we process personal data in our Privacy Policy.
Great and very easy to understand because of simple English.
Thank you for your kind words.