Blockchain security

Proof of work in consensus algorithms

Introduction to blockchain consensus Blockchain systems are a collection of decentralized nodes that maintain a shared digital ledger. Without a centralized

Targeting the blockchain node

Introduction to blockchain nodes HTTP and other web standards define how computers are supposed to communicate with one another, not the software that is us

Public-key cryptography in blockchain

How public-key cryptography works Public-key or asymmetric cryptography is one of the two main types of encryption algorithms. Its names come from the fact t

Hash functions in blockchain

Hash functions are one of the most extensively-used cryptographic algorithms in blockchain technology. They are cryptographic (but not encryption) algorithms

Blockchain structure

Introduction The blockchain gets its name from its underlying structure. The blockchain is organized as a series of “blocks” that are “chained” together. Und

Blockchain: Beyond the basics

Beyond the basic blockchain The core blockchain protocol implements a distributed ledger capable of performing cryptocurrency transfers. Smart contract platf

Blockchain security: Can blockchain be hacked?

Blockchain attack vectors Blockchain can be attacked in a number of different ways. Many of the most famous attacks focus on issues with either the theoretic

Consensus algorithm security

The need for consensus in blockchain Blockchain technology is designed to create a distributed, decentralized and immutable digital ledger. Each node in the

Fundamentals of blockchain security

Introduction The goal of blockchain is to create a fully decentralized, trustless digital ledger. This is an ambitious goal since most ledger systems in use

Blockchain security overview

Introduction Despite being over a decade old, blockchain has only really taken off within the last few years. During this time, it has moved from a fad to th