of BC from 19 89 to the contemporary time is discussed for your
understanding together with the Blockchain versions. Then, the next
discussion is on Blockchain 3 .0 directed acyclic graph (DAG). The
security connects, i.e., the security mechanisms available ISO 27 001, the
impact of quantum computing on common cryptographic algorithms with
their benefits, and limitations are illustrated. We end the chapter with the
terminologies used in DLT and BC. This chapter has enabled you to
develop new skills in DLT and BC, which will make you proficient in
working with them. You would be able to use the newly gained knowledge
at the workplace and put to use the knowledge in your chosen profession.
The upcoming chapter is on consensus models. It refers to the process
where the distributed nodes agree on the history and the final state of the
data on the ledger, referred to as distributed consensus.
Terminologies used
Address
To send and receive digital assets, addresses are used. An address is a short,
alphanumeric string derived from a user’s public key using a hash function
with additional data to detect errors.
Assets
An asset is an entity that can be transferred from one hand to another.
Asymmetric-key cryptography
It is a cryptographic system where users have a private key that is kept
secret and is used to generate a public key (which is freely provided to
others). The users can digitally sign data with their private key, and the
resulting signature can be verified by anyone using the corresponding
public key.
Block data
A set of validated transactions and ledger events are contained in this
portion of a block.
Block header