Blockchain, quiz 2

studied byStudied by 0 people
0.0(0)
learn
LearnA personalized and smart learning plan
exam
Practice TestTake a test on your terms and definitions
spaced repetition
Spaced RepetitionScientifically backed study method
heart puzzle
Matching GameHow quick can you match all your cards?
flashcards
FlashcardsStudy terms and definitions

1 / 19

encourage image

There's no tags or description

Looks like no one added any tags here yet for you.

20 Terms

1

Cryptocurrency

A digital currency that uses cryptography for security and operates on a decentralized network.

New cards
2

Double-spending

The risk that a digital currency can be spent twice.

New cards
3

Public-Key Encryption

An encryption method that uses two keys: a public key for encryption and a private key for decryption.

New cards
4

Symmetric Encryption

An encryption technique where the same key is used for both encryption and decryption.

New cards
5

Hash Function

A mathematical function that converts an input into a fixed-size string of bytes, typically a digest that represents the data.

New cards
6

BlockChain

A distributed ledger technology that records transactions in a series of blocks linked together using cryptographic hashes.

New cards
7

Digital Signature

A cryptographic method used to validate the authenticity and integrity of a message or document.

New cards
8

Anonymity

The state of being not identifiable within a set of subjects.

New cards
9

Tamper-evident log

A log that can show evidence of any unauthorized access or modification.

New cards
10

Merkle tree

A data structure that uses cryptographic hashes to efficiently and securely verify the integrity of data.

New cards
11

Pseudorandom Number

A number generated by an algorithm that approximates the properties of random numbers.

New cards
12

Non-repudiation

The assurance that someone cannot deny the validity of something.

New cards
13

Encryption vs Encipherment

Encryption is the process of converting information into a secure format, while encipherment specifically refers to the transformation into a form that is unintelligible to unauthorized users.

New cards
14

Hiding property

A property of hash functions ensuring that it is infeasible to determine input from the output.

New cards
15

Integrity

The assurance that the information is unaltered and authentic.

New cards
16

Availability

The property that ensures users have access to information and systems when needed.

New cards
17

Public-Key Certificate

A digital certificate used to prove ownership of a public key.

New cards
18

Decentralization

The distribution of functions and powers away from a central authority.

New cards
19

Cryptanalytic Attacks

Attacks that exploit weaknesses in encryption algorithms to decipher the cipher.

New cards
20

Puzzle-friendliness

The property of a hash function indicating it is difficult to find an input that produces a given output.

New cards
robot