of BC from 19 89 to the contemporary time is discussed for your

understanding together with the Blockchain versions. Then, the next

discussion is on Blockchain 3 .0 directed acyclic graph (DAG). The

security connects, i.e., the security mechanisms available ISO 27 001, the

impact of quantum computing on common cryptographic algorithms with

their benefits, and limitations are illustrated. We end the chapter with the

terminologies used in DLT and BC. This chapter has enabled you to

develop new skills in DLT and BC, which will make you proficient in

working with them. You would be able to use the newly gained knowledge

at the workplace and put to use the knowledge in your chosen profession.

The upcoming chapter is on consensus models. It refers to the process

where the distributed nodes agree on the history and the final state of the

data on the ledger, referred to as distributed consensus.

Terminologies used

Address

To send and receive digital assets, addresses are used. An address is a short,

alphanumeric string derived from a user’s public key using a hash function

with additional data to detect errors.

Assets

An asset is an entity that can be transferred from one hand to another.

Asymmetric-key cryptography

It is a cryptographic system where users have a private key that is kept

secret and is used to generate a public key (which is freely provided to

others). The users can digitally sign data with their private key, and the

resulting signature can be verified by anyone using the corresponding

public key.

Block data

A set of validated transactions and ledger events are contained in this

portion of a block.

Block header