Cryptographic hash function

It is a function that maps a bit string of arbitrary length to a fixed-length bit

string. The following properties should be satisfied for approved hash

functions:

1. The hash function is ‘one way’, i.e., it is computationally infeasible to

compute the correct input value given some output value known as

pre-image resistance.

2. One cannot find an input that hashes to a specific output called second

pre-image resistant.

3 . To find any two distinct inputs that map to the same output is

computationally infeasible, i.e., collision-resistant.

Cryptographic nonce

A cryptographic nonce is an arbitrary number that is used once.

Decentralized network

There are multiple authorities that serve as a centralized hub for a

subsection of participants in this network configuration. The loss of that

hub will prevent those participants from communicating because some

participants are behind a centralized hub.

Digital asset

A digital representation of a physical asset or an asset that is pure digital is

a digital asset.

Digital signature

Asymmetric keys are used to determine authenticity (i.e., users can verify

that the message was signed with a private key corresponding to the

specified public key), non-repudiation (a user cannot deny having sent a

message), and integrity (that the message was not altered during

transmission)—

cryptographic technique.

Distributed network

Every participant can communicate with one another without going through

a centralized pointing; this network configuration is a distributed network.