From the course: Blockchain Security by Infosec
Unlock this course with a free trial
Join today to access over 25,500 courses taught by industry experts.
Blockchain security: Public-key cryptography
From the course: Blockchain Security by Infosec
Blockchain security: Public-key cryptography
- [Instructor] Hello, and welcome to this course on Fundamentals of Blockchain Security. In the previous video, we talked about some of the applications of public-key cryptography for the blockchain, identity management, and digital signatures of transactions and blocks. In this video, we're going to be talking about some of the security assumptions of the blockchain's use of public-key cryptography and how those can be violated. And so, if used correctly, public-key cryptography is secure until a large enough or strong enough quantum computer is constructed. And so, since the highest number that a quantum computer so far has factored is something like 21, at the moment, we're a long way away from breaking 2048 bit RSA keys. However, that assumes that public-key cryptography is being used correctly. In reality, public-key cryptography on the blockchain suffers from a few threats, first of which is poor random number generation. And the second is a failure to properly protect private…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.
Contents
-
-
-
(Locked)
Introduction2m 32s
-
(Locked)
Introduction to blockchain17m 42s
-
(Locked)
Structure of the blockchain10m 34s
-
(Locked)
Public key cryptography in blockchain10m 45s
-
(Locked)
Blockchain security: Public-key cryptography13m 16s
-
Hash functions in blockchain18m 16s
-
(Locked)
Blockchain security: Hash functions4m 51s
-
(Locked)
Recap58s
-
(Locked)
-
-
-
-
-