Book Image

Blockchain for Business 2019

By : Peter Lipovyanov
Book Image

Blockchain for Business 2019

By: Peter Lipovyanov

Overview of this book

Blockchain for Business 2019 is a comprehensive guide that enables you to bring in various blockchain functionalities to extend your existing business models and make correct fully-informed decisions. You will learn how decentralized applications are transforming numerous business sectors that are expected to play a huge role in the future. You will see how large corporations are already implementing blockchain technology now. You will then learn about the various blockchain services, such as Bitcoin, Ethereum, Hyperledger, and others to understand their use cases in a variety of business domains. You will develop a solid fundamental understanding of blockchain architecture. Moving ahead, you will get to grips with the inner workings of blockchain, with detailed explanations of mining, decentralized consensus, cryptography, smart contracts, and many other important concepts. You will delve into a realistic view of the current state of blockchain technology, along with its issues, limitations, and potential solutions that can take it to the next level. By the end of this book, you will all be well versed in the latest innovations and developments in the emerging blockchain space.
Table of Contents (17 chapters)

Introduction to cryptography

In this section, we will learn what cryptography is and how it has evolved historically.

Now, we get to the crypto part of cryptocurrencies, which is a well-publicized term you've probably heard plenty of times over the last year or so. This sounds a bit mysterious, or, a bit… cryptic… doesn't it? Many of you have probably heard the word cryptography, but how many actually know what it involves?

In brief, cryptography is the science of secure communication. It is useful in order to secure private information from being accessed by unauthorized third parties who can potentially act in bad faith. The process involves two main steps:

  1. The first step is encryption, which consists of scrambling the information, so that only the intended recipient can access it
  2. The next step is decryption, which is unscrambling the encrypted information...