Quiz 2: Blockchain and Crypto

studied byStudied by 0 people
0.0(0)
learn
LearnA personalized and smart learning plan
exam
Practice TestTake a test on your terms and definitions
spaced repetition
Spaced RepetitionScientifically backed study method
heart puzzle
Matching GameHow quick can you match all your cards?
flashcards
FlashcardsStudy terms and definitions

1 / 89

encourage image

There's no tags or description

Looks like no one added any tags here yet for you.

90 Terms

1

Hash Function

A function that maps input data of any size to a fixed-size output.

New cards
2

Collision Resistance

A property of a hash function where it is infeasible to find two different inputs that produce the same hash.

New cards
3

Pre-Image Resistance

Given a hash output

New cards
4

Puzzle-Friendliness

A property ensuring that it is hard to find an input that hashes to a specific target output.

New cards
5

Birthday Paradox

A probability principle that shows how likely it is for two values to hash to the same output.

New cards
6

Message Digest

The fixed-size output of a hash function.

New cards
7

HMAC (Hash-Based Message Authentication Code)

A MAC constructed using a cryptographic hash function and a secret key.

New cards
8

SHA-256

A cryptographically secure hash function used in Bitcoin and many other security applications.

New cards
9

Brute-Force Attack

A method of breaking security by trying all possible inputs until the correct one is found.

New cards
10

Hash Pointer

A pointer to data along with a cryptographic hash of that data

New cards
11

Tamper-Evident Log

A system where modifications to data are easily detectable.

New cards
12

Merkle Tree

A binary tree where each node contains the hash of its children

New cards
13

One-Way Function

A function that is easy to compute but difficult to reverse.

New cards
14

Nonce

A random or unique number used only once in cryptographic computations.

New cards
15

Commitment Scheme

A method of "locking" a value before revealing it later

New cards
16

Digital Signature

A cryptographic technique that ensures message authenticity and integrity.

New cards
17

Non-Repudiation

A security property where the sender cannot deny having sent a message.

New cards
18

Public-Key Cryptography

A system where encryption and decryption use different keys.

New cards
19

Private Key

A secret key used to sign messages and decrypt encrypted data.

New cards
20

Public Key

A key shared publicly to verify signatures or encrypt messages.

New cards
21

RSA Algorithm

A widely used asymmetric encryption algorithm.

New cards
22

ECDSA (Elliptic Curve Digital Signature Algorithm)

A digital signature scheme used in Bitcoin for verifying transactions.

New cards
23

Key Pair

A set of public and private keys used in asymmetric encryption.

New cards
24

Existential Unforgeability

A security property where an attacker cannot generate a valid signature for a new message.

New cards
25

Certificate Authority (CA)

An entity that verifies public keys and issues digital certificates.

New cards
26

Symmetric Encryption

An encryption method where the same key is used for both encryption and decryption.

New cards
27

Asymmetric Encryption

An encryption method where different keys are used for encryption and decryption.

New cards
28

AES (Advanced Encryption Standard)

A widely used symmetric encryption algorithm.

New cards
29

MAC (Message Authentication Code)

A cryptographic checksum ensuring integrity and authenticity.

New cards
30

Ciphertext

The scrambled version of plaintext after encryption.

New cards
31

Plaintext

The original message

New cards
32

Key Exchange

The process of securely exchanging cryptographic keys between parties.

New cards
33

Digital Certificate

A signed electronic document verifying the identity of a public key holder.

New cards
34

Salt

A random value added to passwords before hashing to prevent dictionary attacks.

New cards
35

Hybrid Encryption

A combination of symmetric and asymmetric encryption techniques.

New cards
36

GoofyCoin

A fictional cryptocurrency where Goofy creates and controls coins.

New cards
37

Double-Spending

A problem where the same digital currency is spent more than once.

New cards
38

Transaction Signing

A process where a user signs a transaction with their private key.

New cards
39

ScroogeCoin

A centralized cryptocurrency where all transactions are verified by Scrooge.

New cards
40

Immutable Ledger

A record that cannot be changed once written.

New cards
41

Blockchain History

The full set of transactions stored in a blockchain.

New cards
42

Coin Creation in GoofyCoin

Coins are created and signed by Goofy.

New cards
43

Coin Consumption in ScroogeCoin

Coins must be signed and included in Scrooge’s blockchain to be valid.

New cards
44

Splitting Coins in ScroogeCoin

Coins can be split into multiple smaller coins via transactions.

New cards
45

Centralized Authority

A single entity controls the system (e.g.

New cards
46

Blockchain

A chain of blocks linked together by cryptographic hashes.

New cards
47

Genesis Block

The first block in a blockchain.

New cards
48

Block

A collection of transactions stored together in a blockchain.

New cards
49

Block Hash

A cryptographic hash of a block’s contents.

New cards
50

Merkle Root

The top hash in a Merkle tree representing all transactions in a block.

New cards
51

Mining

The process of solving cryptographic puzzles to add new blocks to a blockchain.

New cards
52

Proof-of-Work

A consensus algorithm requiring computational work to validate transactions.

New cards
53

Consensus Mechanism

The method by which nodes agree on the blockchain state.

New cards
54

Decentralization

The absence of a single controlling entity in a system.

New cards
55

Immutable Data

Data that cannot be altered after being recorded.

New cards
56

51% Attack

When a single entity gains majority control over a blockchain network.

New cards
57

Fork

A split in a blockchain where nodes follow different sets of rules.

New cards
58

Private Blockchain

A blockchain with restricted access.

New cards
59

Public Blockchain

A blockchain that anyone can participate in and validate transactions.

New cards
60

Smart Contract

Self-executing code stored on a blockchain.

New cards
61

Gas Fee

A fee paid for executing transactions or smart contracts.

New cards
62

Ethereum

A blockchain known for its smart contract functionality.

New cards
63

Bitcoin

The first decentralized cryptocurrency.

New cards
64

Altcoin

Any cryptocurrency other than Bitcoin.

New cards
65

Lightning Network

A layer 2 solution for faster Bitcoin transactions.

New cards
66

Replay Attack

Reusing valid data transmission to gain unauthorized access.

New cards
67

Man-in-the-Middle Attack

An attacker intercepts and alters communication between two parties.

New cards
68

Brute-Force Attack

Trying all possible keys or passwords to break encryption.

New cards
69

Dictionary Attack

Using a precomputed list of passwords to crack a system.

New cards
70

Side-Channel Attack

Exploiting physical signals from a system to break encryption.

New cards
71

Key Length

The size of a cryptographic key (e.g.

New cards
72

Entropy

A measure of randomness in cryptographic security.

New cards
73

Zero-Knowledge Proof

A method to prove knowledge of a secret without revealing it.

New cards
74

Homomorphic Encryption

Allows computations on encrypted data without decrypting it.

New cards
75

Nonce Reuse

A security flaw that can compromise cryptographic systems.

New cards
76

Hash Chain

A sequence of hashes where each depends on the previous one.

New cards
77

Distributed Ledger

A database replicated across multiple nodes.

New cards
78

Node

A participant in a blockchain network.

New cards
79

Validator

A node that verifies transactions and adds them to the blockchain.

New cards
80

Cryptographic Salt

Random data added to inputs before hashing.

New cards
81

Mining Difficulty

The measure of how hard it is to find a valid block hash.

New cards
82

Digital Wallet

Software for storing private keys for cryptocurrencies.

New cards
83

Hot Wallet

A cryptocurrency wallet connected to the internet.

New cards
84

Cold Wallet

An offline cryptocurrency wallet for security.

New cards
85

Block Reward

The incentive given to miners for adding new blocks.

New cards
86

Decentralized Finance (DeFi)

Financial services built on blockchain networks.

New cards
87

Sybil Attack

An attack where a single entity creates multiple fake identities.

New cards
88

Tokenization

Converting real-world assets into digital tokens.

New cards
89

Cross-Chain Transactions

Transactions that occur between different blockchains.

New cards
90
New cards

Explore top notes

note Note
studied byStudied by 1 person
62 days ago
5.0(1)
note Note
studied byStudied by 8 people
749 days ago
5.0(1)
note Note
studied byStudied by 4 people
837 days ago
5.0(1)
note Note
studied byStudied by 517 people
167 days ago
4.5(2)
note Note
studied byStudied by 55 people
707 days ago
5.0(1)
note Note
studied byStudied by 17 people
938 days ago
5.0(1)
note Note
studied byStudied by 2466 people
702 days ago
5.0(7)

Explore top flashcards

flashcards Flashcard (78)
studied byStudied by 23 people
292 days ago
5.0(1)
flashcards Flashcard (21)
studied byStudied by 210 people
679 days ago
5.0(4)
flashcards Flashcard (81)
studied byStudied by 78 people
550 days ago
5.0(2)
flashcards Flashcard (34)
studied byStudied by 58 people
562 days ago
5.0(2)
flashcards Flashcard (33)
studied byStudied by 13 people
839 days ago
5.0(2)
flashcards Flashcard (104)
studied byStudied by 8 people
33 days ago
5.0(1)
flashcards Flashcard (51)
studied byStudied by 21 people
847 days ago
5.0(1)
flashcards Flashcard (70)
studied byStudied by 248 people
44 days ago
5.0(1)
robot