About this course: To really understand what is special about Bitcoin, we need to understand how it works at a technical level. We’ll address the important questions about Bitcoin…
If you’re a software developer and new to blockchain, this is the course for you. Several experienced IBM blockchain developer advocates will lead you through a series of videos that describe high-level concepts, components, and strategies on building blockchain business networks. You’ll also get hands-on experience modeling and building blockchain networks as well as create your first blockchain application.
This course reviews cryptographic hash functions in general and their use in the forms of hash chain and hash tree (Merkle tree). Building on hash functions, the course describes message authentication focusing on message authentication code (MAC) based on symmetric keys. We then discuss digital signatures based on asymmetric cryptography, providing security properties such as non-repudiation which were unavailable in symmetric-cryptography-based message authentication.