IB Case Study Key Terms

123456789101112131415161718192021222324252627282930
Across
  1. 4. stablished by hashing a hash’s corresponding hash together and climbing up the tree until you obtain the root hash which is or can be publicly known
  2. 8. risk that a digital currency can be spent twice.
  3. 9. ‘number only used once’
  4. 10. When this is complete is gets added to a chain
  5. 11. a mathematical function used in cryptography.
  6. 15. First block in a blockchain, block 0 or in early versions block 1.
  7. 16. consists of a private key and—derived from it—a unique public key.
  8. 18. people who secure the network by confirming every transaction.
  9. 20. A digital code which is attached to an electronically transmitted document to verify its contents and the senders identify.
  10. 21. This is a data structure which refers to the next item in the list… like a linked list.
  11. 23. All events are dictated by previous data.
  12. 25. the assurance that someone cannot deny the validity of something.
  13. 27. a function that is easy to compute on every input, but hard to invert given the image of a random input.
  14. 28. Is a digital currency in which encryption techniques are used
  15. 30. When a group of miners in control of the majority of the networks computing power can attack or interfere with the process of recording a new block.
Down
  1. 1. data structure trees where each leaf node is a hash of its respective child nodes
  2. 2. he algorithm used to find a solution to the computational puzzle
  3. 3. the randomness collected by an application (PuTTYgen) for the use in cryptography or other uses that require random data.
  4. 5. A block contains a unique header, and each such block is identified by its block header hash.
  5. 6. records all the data of all current transactions.
  6. 7. Blockchains are immutable, which means their data cannot be changed.
  7. 12. a key generator
  8. 13. Collision resistance is the property of a hash function that is computationally infeasible to find two colliding inputs.
  9. 14. a block that a miner is trying to mine in order to receive the block reward
  10. 17. it is not possible to reconstruct the input data from its hash value.
  11. 19. Same as 51% attack.
  12. 20. A consensus algorithm is a process in computer science used to achieve agreement on a single data value among distributed processes or systems.
  13. 22. Is used as a record keeping system that maintains participants identities in secure and anonymous form
  14. 24. the process of adding transaction records to MON's public ledger of past transactions.
  15. 26. pool A temporary storage for unconfirmed transactions where miners choose transactions to confirm and then add to the new block which will be added to to block chain.
  16. 29. cryptographic hash function that is designed to improve security and privacy.