Blockchain Cat1
Blockchain Cat1
Blockchain Cat1
a) The above diagram shows metadata about the transactions included in a block. Using
the diagram as reference identify the different components of a block header and
describe its role. (2 marks)
Timestamp
Timestamp in the block chain is used as proof that the particular block is used at what instance of
a time, also this timestamp is used as a parameter to verify the authenticity of any block.
Merkle Root
A Merkle root uses mathematical formulas to check if the data is not corrupted, hacked, or
manipulated
Difficulty Target
It specifies the complexity and the computation power required to mine the network, if we are
having a high difficulty target then it implies that we need more a computationally expensive
machine to mine it.
Nonce
A nonce refers to a number or value that can only be used once. Nonces are often used on
authentication protocols and cryptographic hash functions. It is abbreviated as ‘number only used
once’ and it is a number which block chain miners are finding and on average, it takes almost 10
times to find out the correct nonce.
Previous Hash
As Block chain is a collection of several interconnected nodes also called a block, so previous
hash stores the hashed value of the previous node’s address
A hash function is used to map the data of arbitrary size to generate an output of a fixed size,
usually called the Hash Digest.it is also a process that takes plaintext data of any size and
converts it into a unique cipher text of a specific length. If the hash function satisfies some well-
established standards of security, integrity, and other conventions of similar scope, it can be
called a Cryptographic Hash Function (CHF). CHF is an algorithm that takes variable-sized
data as an input to generate a fixed-sized output.
We have SHA-2 family that has 6 different hash functions including SHA-224, SHA-256,
SHA-384, SHA-512, SHA-512/224, and SHA-512/256
c) Based on the properties of the block chain and its characteristic as being a generic
data store for all kinds of data, briefly describe following generic-use patterns of the
block chain: (2 marks)
I. Proof of Existence
This use of the block chain focuses on storing data for the sole purpose of proving its existence.
Once an artifact is recorded in Block chain, anyone can prove the existence of it at a
particular instance of time with specific content. Proof of existence does not utilize neither the
ordering nor the time-stamping capabilities.
This use is the opposite of the proof of existence. It provides ways to verify whether specific
entries or items do not exist in the block chain. It is useful to dismiss complaints, fines, or
convictions.
In this case is important not only the sheer existence of an entry in the block chain but also the
time when the entry was added. This technology can serve that need since the blocks store the
time when the process of adding them took place. Applications that benefit from the time
stamping capabilities are those that track the occurrence of events in time such as tracking and
delivery of goods or notification, payments, tracking of orderly opening and closing of public
bidding procedure.
It is a consensus algorithm that uses a voting system to choose network validators and
focuses on how long a network validator has been active within the network as well as its
reputation. Validators receive higher scores for being trustworthy and being active within
the network for a longer time. Staking a larger amount of tokens also makes it more likely
that a validator will be selected.
V. Proof of Identity.
It is a consensus protocol for permission-less block chain, in which each uniquely identified
individual receives one equal unit of voting power and associated rewards (minting token).
a) Briefly describe the Transaction data information that describe a transfer of
ownership IN BLOCKCHAIN (2 marks)
Ledger has to document any transfer of ownership, which in turn implies that new data are
produced and written to the ledger.
Proving ownership is easier when the ledger is open to anyone. Hence, transparency is the basis
of proving ownership rights in a similar way as witnesses making a public testimony in court.
However, transferring ownership must be exclusively restricted to the lawful owner. So privacy
forms the basis of transferring ownership. Since writing in the ledger means changing ownership,
only very trustful entities should be given writing access to ledgers
b) Every node, when receiving transactions, makes sure that each transaction adheres
to the network rules referred to as transaction validation. Describe the things a block
checks (2 marks)
It prevents double-spending. Any input that’s been spent (that is, included in the block chain)
cannot be spent again.
ii. The sum of the inputs is greater than or equal to the sum of the outputs.
It makes sure no new bitcoins are created (except in a special type of transaction called a
coinbase transaction
c) There are seven major tasks that need to be addressed when designing and developing
a software system that manages ownership by using a purely distributed peer-to-peer
system of ledgers in an open and untrustworthy environment. Briefly describe any
five (2 marks)
The hash puzzle is unique for each block header because it depends on its unique content.