These three capabilities—cryptographic protocols, hash functions, and digital signatures—secure and digitally sign the data in the blockchain. A cryptographic protocol performs a security-related function by applying cryptographic methods, and it describes the algorithms such as hash functions should be used. The protocol used by a blockchain usually incorporates at least these aspects:
- Entity authentication
- Public/private key cryptography
- Secured application-level data transport
- Fingerprint/signature generation
- Data encryption methods
To prove that the data on the blockchain has not been tampered with, transactions, blocks, and participating nodes are signed by generating digital ...