Simply put, Blockchain technology is a decentralized peer-to-peer (P2P) distributed ledger that is secure and records transactions across multiple nodes or computers. It provides a platform where people are allowed to transact with each other without any central authority acting as a middleman.
Block A "block" in the blockchain refers to a packaged data structure. It holds information like:
Timestamp: Creation time of block
Nonce: Counter used for Proof of work algorithm
Block hash: Current block hash
Previous block hash: Reference to the previous block in the chain
These blocks are linked together to form a chain that records the entire history of transactions and is distributed across the network.
Blockchain interactions
How blockchain transactions work
Person requests a transaction
The requested transaction is broadcasted to a P2P network of nodes
The network nodes pick up the transaction, confirm its data, and create a new block in which the transaction is then sent
This block is then added to the chain hence completing the transaction
Pillars of Blockchain technology
1. Decentralization
In a centralized environment like a client-server model, all the data is stored in one spot, thus making them an easy target for hackers. Also during software upgrades, the entire system comes to a halt thus decreasing their availability. Further transaction fees involved are generally high, especially for international transfers. A decentralized network on the other hand is distributed and has no core authority. Anyone can become a node in the network. Being distributed, the system is available at all times. There are also no additional fees for international transfers and compared to centralized model fees and very low.
2. Transparency
While a person’s real identity is secure, you can see all transactions performed by them, through their public address. This kind of transparency never existed within a financial system. They usually require customers to share their personal identity data just to use their services. Whereas in a blockchain all customers need is a digital wallet, which can be created in seconds without and additional information.
How transparencies vary between databases and blockchain
3. Immutability
Data in the blockchain cannot be tampered with, the reason behind this is the use of various cryptographic functions and algorithms working together to provide a secure environment. These mainly include PoW, Hashing Consensus algorithms.
How immutable is Blockchain?
Can the blockchain be hacked?
One may argue that “If someone was able to gain access to this extremely powerful system, which can crack these algorithms, can the blockchain be hacked then?
The answer is still "no," because even though you might get access to this system, they would still be required to gain access to 51% of the network, which will not only require a huge amount of power but also a very large sum of money. Access to this amount of money is impossible, this is because every transaction and block creation requires a small amount of money which when scaled becomes huge in a developed blockchain.
Algorithms
Some of the most commonly used algorithms for the security of blockchain networks are:
SHA-256 (secure hash algorithm)
PoW (proof of work) algorithm
SHA-256
SHA-256 is actually a part of the SHA-2 family. It’s used to generate a fixed length of string (256 bits) by using cryptographically secure hashing functions to convert the input data.
The hash generated is one-way, meaning it can generate a fixed random string from a piece of data, but the data cannot be generated back from the hash.
Parameters:
Block size - 64 bytes
Maximum message size - 264 bits
Message digest size - 32 bytes
Parsed message size - 512 bits
Input blocks - 16
Output hash - 32 bytes
This algorithm will be used to hash blocks in the network, the blocks will then be connected using their hashes to form a chain. It will also be used by the PoW Chain validation algorithm to verify the added block is valid or not by comparing previous and current hashes.
Secure Hash Algorithm
To make sure that every block in the Blockchain is accurate has the real transactions, and has the correct data inside of it, we use the PoW algorithm. This is because if it doesn’t have the correct data, then people could fake how much money they have and essentially steal money from other people. So, every time a new block is created, we first have to make sure that it is a legitimate block by mining it through PoW.
We do this by using the SHA-256 algorithm, we repeatedly hash our block until we find the correct hash it is similar to a puzzle game. To do this we change the input to our PoW method by constantly incrementing the nonce value. Since the hash generated is random, thus it secures our chain.
If someone wanted to change a transaction, they would have to go back and re- mine block that already exists, they would also have to re-mine and recreate every single block that comes after the first one that they recreated because blocks in the blockchain are linked together by their data. This would take an incredible amount of energy, which is nearly impossible for a well-developed chain.
Proof of Work (POW)
Very Insightful!