Blockchain, quiz 2

0.0(0)
studied byStudied by 2 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/19

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 2:02 AM on 1/30/25
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

20 Terms

1
New cards

Cryptocurrency

A digital currency that uses cryptography for security and operates on a decentralized network.

2
New cards

Double-spending

The risk that a digital currency can be spent twice.

3
New cards

Public-Key Encryption

An encryption method that uses two keys: a public key for encryption and a private key for decryption.

4
New cards

Symmetric Encryption

An encryption technique where the same key is used for both encryption and decryption.

5
New cards

Hash Function

A mathematical function that converts an input into a fixed-size string of bytes, typically a digest that represents the data.

6
New cards

BlockChain

A distributed ledger technology that records transactions in a series of blocks linked together using cryptographic hashes.

7
New cards

Digital Signature

A cryptographic method used to validate the authenticity and integrity of a message or document.

8
New cards

Anonymity

The state of being not identifiable within a set of subjects.

9
New cards

Tamper-evident log

A log that can show evidence of any unauthorized access or modification.

10
New cards

Merkle tree

A data structure that uses cryptographic hashes to efficiently and securely verify the integrity of data.

11
New cards

Pseudorandom Number

A number generated by an algorithm that approximates the properties of random numbers.

12
New cards

Non-repudiation

The assurance that someone cannot deny the validity of something.

13
New cards

Encryption vs Encipherment

Encryption is the process of converting information into a secure format, while encipherment specifically refers to the transformation into a form that is unintelligible to unauthorized users.

14
New cards

Hiding property

A property of hash functions ensuring that it is infeasible to determine input from the output.

15
New cards

Integrity

The assurance that the information is unaltered and authentic.

16
New cards

Availability

The property that ensures users have access to information and systems when needed.

17
New cards

Public-Key Certificate

A digital certificate used to prove ownership of a public key.

18
New cards

Decentralization

The distribution of functions and powers away from a central authority.

19
New cards

Cryptanalytic Attacks

Attacks that exploit weaknesses in encryption algorithms to decipher the cipher.

20
New cards

Puzzle-friendliness

The property of a hash function indicating it is difficult to find an input that produces a given output.