Part 3 Cryptography and Blockchain Insurance Tech

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/118

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 8:47 PM on 2/7/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

119 Terms

1
New cards

Address

A unique identifier derived from a public key that serves as the destination for cryptocurrency payments.

2
New cards
3
New cards

Asymmetric-key Cryptography

A system using a public key for encryption and a private key for decryption

4
New cards
5
New cards

Authentication

The process of verifying identity to ensure access is granted to the correct person or system.

6
New cards
7
New cards

Avalanche Effect

A property of cryptographic hash functions where a small input change produces a drastically different output.

8
New cards
9
New cards

Binary System

A numeric system using only 0s and 1s

10
New cards
11
New cards

Bitcoin

A decentralized digital currency introduced by Satoshi Nakamoto that uses blockchain technology as a medium of exchange and store of value.

12
New cards
13
New cards

Block

A collection of transactions in a blockchain containing a timestamp and the hash of the previous block.

14
New cards
15
New cards

Blockchain

A distributed

16
New cards
17
New cards

Centralized Network

A network where all machines rely on a central server

18
New cards
19
New cards

Ciphertext

The encrypted and unreadable form of a message produced from plaintext.

20
New cards
21
New cards

Coinbase Transaction

A special transaction with no payer that rewards miners with newly created cryptocurrency.

22
New cards
23
New cards

Collateral

The stake users lock up in a Proof of Stake system to participate in block validation.

24
New cards
25
New cards

Collision Resistance

A hash function property that makes it infeasible for two different inputs to produce the same hash.

26
New cards
27
New cards

Consensus Mechanism

The process by which a distributed network agrees on the valid state of a blockchain ledger.

28
New cards
29
New cards

Cryptographic Hash Function

A function that converts input text into a fixed-length digest that is pre-image and collision resistant.

30
New cards
31
New cards

Cryptography

The study of techniques used to secure communication by ensuring confidentiality

32
New cards
33
New cards

Data Confidentiality

A security principle ensuring information remains private

34
New cards
35
New cards

Data Integrity

The assurance that data has not been altered or tampered with.

36
New cards
37
New cards

Decentralized Applications (dApps)

Applications that run on decentralized platforms like blockchains rather than central servers.

38
New cards
39
New cards

Decentralized Network

A network where control and authority are distributed among multiple nodes rather than a single server.

40
New cards
41
New cards

Decryption

The process of converting ciphertext back into readable plaintext using a key.

42
New cards
43
New cards

Digest

The fixed-length output produced by a cryptographic hash function.

44
New cards
45
New cards

Digital Signature

A cryptographic technique that uses a private key to verify authenticity

46
New cards
47
New cards

Discrete Logarithm Problem

The computational difficulty of deriving a private key from a public key in elliptic curve cryptography.

48
New cards
49
New cards

Distributed Ledger

A peer-to-peer database that records transactions permanently without central authority.

50
New cards
51
New cards

Double Spending

The attempt to spend the same digital currency more than once

52
New cards
53
New cards

Elliptic Curve Cryptography (ECC)

A cryptographic system that generates key pairs using mathematical operations on elliptic curves.

54
New cards
55
New cards

Encryption

The process of converting plaintext into ciphertext to prevent unauthorized access.

56
New cards
57
New cards

Ethereum

A decentralized blockchain platform that supports smart contracts and decentralized applications.

58
New cards
59
New cards

Fork

A blockchain event where multiple versions of the chain temporarily exist

60
New cards
61
New cards

Gas

A unit measuring computational work required to execute operations on the Ethereum network.

62
New cards
63
New cards

Genesis Block

The first block in a blockchain.

64
New cards
65
New cards

Immutability

The property of blockchain data that prevents alteration or deletion once recorded.

66
New cards
67
New cards

Key Pair

A matched set of public and private keys used in asymmetric cryptography.

68
New cards
69
New cards

Ledger

A record of transactions that represents the authoritative source of account balances in a blockchain.

70
New cards
71
New cards

Merkle Tree

A binary tree of hashed transactions that allows efficient validation using a single root hash.

72
New cards
73
New cards

Miners

Network participants who validate transactions and create new blocks in exchange for rewards.

74
New cards
75
New cards

Mining

The process of validating transactions and solving computational puzzles to add blocks to a blockchain.

76
New cards
77
New cards

Nodes

Computers connected to a network that store data or validate transactions.

78
New cards
79
New cards

Non-repudiation

A security property ensuring a sender cannot deny having sent a message.

80
New cards
81
New cards

Nonce

A number miners adjust to produce a hash with required characteristics during Proof of Work.

82
New cards
83
New cards

Oracle

A service that supplies external real-world data to smart contracts on a blockchain.

84
New cards
85
New cards

Peer-to-Peer (P2P)

A network architecture where data and authority are distributed among connected machines.

86
New cards
87
New cards

Plaintext

The original readable form of a message before encryption.

88
New cards
89
New cards

Pre-image Resistance

A hash function property that makes it infeasible to determine the original input from its hash.

90
New cards
91
New cards

Private Key

A secret key used to decrypt messages or sign transactions in asymmetric cryptography.

92
New cards
93
New cards

Proof of Stake

A consensus mechanism where block validators are chosen based on the amount of collateral they provide.

94
New cards
95
New cards

Proof of Work

A consensus mechanism requiring computational effort to validate blocks and secure the blockchain.

96
New cards
97
New cards

Protocol

A set of rules governing how data is transmitted

98
New cards
99
New cards

Public Key

A freely shared key derived from a private key and used to encrypt messages.

100
New cards

Explore top notes

Explore top flashcards

flashcards
Antidiabetic Drugs
52
Updated 1221d ago
0.0(0)
flashcards
Test 1
123
Updated 1157d ago
0.0(0)
flashcards
ANAPHY
104
Updated 258d ago
0.0(0)
flashcards
religion final
35
Updated 1035d ago
0.0(0)
flashcards
EXAM 1- REIDY
32
Updated 364d ago
0.0(0)
flashcards
Module 6.1
50
Updated 664d ago
0.0(0)
flashcards
AP Human Geography Unit 4.1-4.4
28
Updated 818d ago
0.0(0)
flashcards
Antidiabetic Drugs
52
Updated 1221d ago
0.0(0)
flashcards
Test 1
123
Updated 1157d ago
0.0(0)
flashcards
ANAPHY
104
Updated 258d ago
0.0(0)
flashcards
religion final
35
Updated 1035d ago
0.0(0)
flashcards
EXAM 1- REIDY
32
Updated 364d ago
0.0(0)
flashcards
Module 6.1
50
Updated 664d ago
0.0(0)
flashcards
AP Human Geography Unit 4.1-4.4
28
Updated 818d ago
0.0(0)