Cryptographic hash function
It is a function that maps a bit string of arbitrary length to a fixed-length bit
string. The following properties should be satisfied for approved hash
functions:
1. The hash function is ‘one way’, i.e., it is computationally infeasible to
compute the correct input value given some output value known as
pre-image resistance.
2. One cannot find an input that hashes to a specific output called second
pre-image resistant.
3 . To find any two distinct inputs that map to the same output is
computationally infeasible, i.e., collision-resistant.
Cryptographic nonce
A cryptographic nonce is an arbitrary number that is used once.
Decentralized network
There are multiple authorities that serve as a centralized hub for a
subsection of participants in this network configuration. The loss of that
hub will prevent those participants from communicating because some
participants are behind a centralized hub.
Digital asset
A digital representation of a physical asset or an asset that is pure digital is
a digital asset.
Digital signature
Asymmetric keys are used to determine authenticity (i.e., users can verify
that the message was signed with a private key corresponding to the
specified public key), non-repudiation (a user cannot deny having sent a
message), and integrity (that the message was not altered during
transmission)—
cryptographic technique.
Distributed network
Every participant can communicate with one another without going through
a centralized pointing; this network configuration is a distributed network.