Question

In: Computer Science

Appraise how various cryptographic techniques are used in the “Pay to Public Key Hash (P2PKH)” in...

Appraise how various cryptographic techniques are used in the “Pay to Public Key Hash (P2PKH)” in the Bitcoin blockchain.

Solutions

Expert Solution

Hash Functions:
There is no usage of any key in this algorithm. A hash value with fixed length is calculated as per the plain text which makes it impossible for contents of plain text to be recovered. Many operating systems use hash functions to encrypt passwords.

Pay-to-PubKey-Hash (Pay-to-Public-Key-Hash, P2PKH) is the basic form of making a transaction on the Bitcoin network.

Use of public key cryptography :- With the spread of more unsecure computer networks, a genuine need was felt to use cryptography at larger scale. The symmetric key was found to be non-practical due to challenges it faced for key management. This gave rise to the public key cryptosystems.

There are mainly two types of Cryptography, Symmetric and Asymmetric cryptography.

symmetric cryptography is simple kind of encryption which invovles only 1 key for encryption and decryption.Symmetric cryptography was well suited for organizations like governments, big financial corporations were involved in the classified communication.

Asymmetric Cryptography is also called as public key cryptography. It uses two keys for encryption and drcryption.

you need to use hashes for verification of your data. They are a one-way function that takes a large set of data and convert them into a small standard size data. You create a unique fingerprint that is proof that your data has not been altered during different encryption levels. The outcome of hashing is called hash value or hash digest. Transactions that pay to a Bitcoin address contain P2PKH scripts that are resolved by sending the public key and a digital signature created by the corresponding private key.


Related Solutions

describe a cryptographic hash function and how it is used as a security application need 300...
describe a cryptographic hash function and how it is used as a security application need 300 words
In addition to cryptographic techniques, identify and explain the suite of techniques that are increasingly used...
In addition to cryptographic techniques, identify and explain the suite of techniques that are increasingly used to provide authentication to hospital information systems.
Explain the crypto-economy concept of blockchain? Explain how cryptographic hash function is applied to protect the...
Explain the crypto-economy concept of blockchain? Explain how cryptographic hash function is applied to protect the integrity of blockchain transactions and to detect double-spending attack. State the property of the hash function that is relevant for each application.
USE C++: Encryption and Decryption are two cryptographic techniques. Encryption is used to transform text to...
USE C++: Encryption and Decryption are two cryptographic techniques. Encryption is used to transform text to meaningless characters, and decryption is used to transform meaningless characters into meaningful text. The algorithm that does the encryption is called a cipher. A simple encryption algorithm is Caesar cipher, which works as follows: replace each clear text letter with a letter chosen to be n places later in the alphabet. The number of places, n, is called the cipher key. For example, if...
1. What is the relationship between public key cryptographic algorithms and numbers theory? Please give an...
1. What is the relationship between public key cryptographic algorithms and numbers theory? Please give an example 2. What are the different concepts and theorems that number theory encompasses? 3. What are the different engineering applications that make use of number theory?
The topic is Public radio. How is it funded? Should public funds be used to pay...
The topic is Public radio. How is it funded? Should public funds be used to pay for something that, if the demand was there, the market could provide? And If demand is not there to fund it through market forces, then why should the public pay for it?
What are the key persuasive techniques used in consumer advertising? Illustrate with specific examples, explaining how...
What are the key persuasive techniques used in consumer advertising? Illustrate with specific examples, explaining how each technique works.
Question 5: How public key encryption is used to ensure confidentiality of a message. Use a...
Question 5: How public key encryption is used to ensure confidentiality of a message. Use a diagram to explain.
Part 4: Explain in a couple of paragraphs how public key encryption can be used to...
Part 4: Explain in a couple of paragraphs how public key encryption can be used to implement a digital signature. Be sure you are very clear on when a private key is used and when a public key is used. Part 5: Generally, a digital signature involves encrypting a cryptographic hash, or digest, generated from the message. Explain why we do not encrypt the message itself. You can answer this question in one sentence. Part 6: For each of the...
Please Answer!!! Why is public-key cryptography be used to encrypt a symmetric key in a digital...
Please Answer!!! Why is public-key cryptography be used to encrypt a symmetric key in a digital envelope instead of encrypting the message directly? What types of data should be encrypted? When should data be encrypted?
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT