IB Case Study Key Terms
Across
- 4. stablished by hashing a hash’s corresponding hash together and climbing up the tree until you obtain the root hash which is or can be publicly known
- 8. risk that a digital currency can be spent twice.
- 9. ‘number only used once’
- 10. When this is complete is gets added to a chain
- 11. a mathematical function used in cryptography.
- 15. First block in a blockchain, block 0 or in early versions block 1.
- 16. consists of a private key and—derived from it—a unique public key.
- 18. people who secure the network by confirming every transaction.
- 20. A digital code which is attached to an electronically transmitted document to verify its contents and the senders identify.
- 21. This is a data structure which refers to the next item in the list… like a linked list.
- 23. All events are dictated by previous data.
- 25. the assurance that someone cannot deny the validity of something.
- 27. a function that is easy to compute on every input, but hard to invert given the image of a random input.
- 28. Is a digital currency in which encryption techniques are used
- 30. When a group of miners in control of the majority of the networks computing power can attack or interfere with the process of recording a new block.
Down
- 1. data structure trees where each leaf node is a hash of its respective child nodes
- 2. he algorithm used to find a solution to the computational puzzle
- 3. the randomness collected by an application (PuTTYgen) for the use in cryptography or other uses that require random data.
- 5. A block contains a unique header, and each such block is identified by its block header hash.
- 6. records all the data of all current transactions.
- 7. Blockchains are immutable, which means their data cannot be changed.
- 12. a key generator
- 13. Collision resistance is the property of a hash function that is computationally infeasible to find two colliding inputs.
- 14. a block that a miner is trying to mine in order to receive the block reward
- 17. it is not possible to reconstruct the input data from its hash value.
- 19. Same as 51% attack.
- 20. A consensus algorithm is a process in computer science used to achieve agreement on a single data value among distributed processes or systems.
- 22. Is used as a record keeping system that maintains participants identities in secure and anonymous form
- 24. the process of adding transaction records to MON's public ledger of past transactions.
- 26. pool A temporary storage for unconfirmed transactions where miners choose transactions to confirm and then add to the new block which will be added to to block chain.
- 29. cryptographic hash function that is designed to improve security and privacy.