Skip to content

Foundations of Blockchain Technology

Back to subtopics

Key Concepts of Blockchain

Hash Demo ~3 minEasy

Hashing, Merkle trees, keys/signatures, and consensus primitives underpin security.

Hashing
Tiny input changes produce totally different outputs.
Merkle trees
Compress many tx hashes into one root for quick proofs.
Keys & signatures
Prove ownership and authorize transactions.
Consensus & incentives
Align participants to follow the rules.
Detailed Notes
Key Highlights
  • Cryptographic Hashing: One-way functions that transform any input into a fixed-size output. The avalanche effect ensures that even a single bit change in input produces a completely different hash, making it computationally infeasible to reverse or find collisions.
  • Merkle Trees: Hierarchical data structures that efficiently combine multiple transaction hashes into a single root hash. This enables lightweight verification—you can prove a transaction exists in a block without downloading the entire block.
  • Digital Signatures: Cryptographic mechanisms using public/private key pairs that enable authentication and non-repudiation. A signature proves the holder of a private key authorized a transaction, without revealing the key itself.

Blockchain security fundamentally relies on cryptographic primitives that ensure data integrity, authenticity, and tamper-resistance. Hashing serves as the foundation—every block contains a hash of the previous block, creating an unbreakable chain where altering any historical data would require recalculating all subsequent hashes, which becomes computationally impossible due to the massive amount of work required. Merkle trees optimize this by allowing participants to verify individual transactions without processing entire blocks, enabling "light clients" that only download block headers while maintaining full security guarantees. Public-key cryptography enables ownership and authorization through digital signatures, where private keys sign transactions that anyone can verify using corresponding public keys, but cannot forge without the private key. These primitives combine to create a system where participants don't need to trust each other—they only need to trust the mathematics.

Hash Function Properties
  • Deterministic: Same input always produces same output
  • Fast computation: Hash calculation is efficient
  • Preimage resistance: Cannot determine input from output
  • Collision resistance: Cannot find two inputs with same hash
Merkle Tree Benefits
  • Efficient verification: Prove inclusion with O(log n) hashes
  • Batch commitments: Single root represents all transactions
  • Light client support: Verify without full node data
Digital Signature Workflow
  • Key generation: Create public/private key pair
  • Signing: Create signature using private key + transaction data
  • Verification: Anyone can verify using public key + signature
Security Assumptions
  • Cryptographic hardness: Hash and signature schemes remain unbroken
  • Key management: Private keys must remain secret
  • Randomness: Proper entropy for key generation
Presenter Notes
  • Show how duplicate last leaf keeps tree balanced.
  • Relate Merkle inclusion proofs to light clients.
Enter text to see its SHA-256 hash.
SHA-256: