Book Image

Blockchain for Enterprise

By : Narayan Prusty
Book Image

Blockchain for Enterprise

By: Narayan Prusty

Overview of this book

The increasing growth in blockchain use is enormous, and it is changing the way business is done. Many leading organizations are already exploring the potential of blockchain. With this book, you will learn to build end-to-end enterprise-level decentralized applications and scale them across your organization to meet your company's needs. This book will help you understand what DApps are and how the blockchain ecosystem works, via real-world examples. This extensive end-to-end book covers every blockchain aspect for business and for developers. You will master process flows and incorporate them into your own enterprise. You will learn how to use J.P. Morgan’s Quorum to build blockchain-based applications. You will also learn how to write applications that can help communicate enterprise blockchain solutions. You will learn how to write smart contracts that run without censorship and third-party interference. Once you've grasped what a blockchain is and have learned about Quorum, you will jump into building real-world practical blockchain applications for sectors such as payment and money transfer, healthcare, cloud computing, supply chain management, and much more.
Table of Contents (14 chapters)
Title Page
Packt Upsell

Ethereum accounts

To create an account, we just need an asymmetric key pair. There are various algorithms, such as Rivest–Shamir–Adleman (RSA) and Elliptic Curve Cryptography (ECC) for generating asymmetric key pairs. Ethereum uses ECC. ECC has various curves. These curves have a different speed and security. Ethereum uses  secp256k1 curves. To go in to  ECC and it's curves will require mathematical knowledge, and it's not necessary to understand it in depth to build DApps using Ethereum.

Ethereum uses 256-bit encryption. An Ethereum private and public key is a 256-bit number. As processors cannot represent such big numbers therefore it's always encoded as a hexadecimal string of length 64. 

Every account is represented by an address. Once we have the keys we need to generate the address,here is the procedure to generate the address, and here is the procedure to generate the address from the public key:

  1. First, generate the Keccak-256 hash of the public key. It will give you a 256-bit number...