mechanisms for secure exchange of transactions are analyzed. The distributed structure of the blockchain network, built on the basis of a sequence of blocks containing transaction data, is considered. The fundamental features of the blockchain technology are described, as well as the 6-component multilayer blockchain architecture. The importance of using cryptographic hash functions to ensure the security and integrity of data in a blockchain network is shown.
In order to simulate the process of exchanging transactions between network users, an experimental blockchain application was created. This made it possible to clearly demonstrate the features of using such crypto-tools as public and private keys and digital signature to solve the problem of unauthorized transactions. The performance of the experimental blockchain network is analyzed at different values of block mining complexity.
- Wang, G.; Li, C.; Dai, B.; Zhang, S. (2024). Privacy-Protection Method for Blockchain Transactions Based on Lightweight Homomorphic Encryption. Information 2024, 15, 438. DOI: https://doi.org/10.3390/ info15080438
- Farhana A., Nisha A, Harikrishnan S. (2024). Adoption of Blockchain in Cyber Security. International Journal of Advanced Research in Science, Communication and Technology (IJARSCT), Volume 4, Issue 2, pp. 353-360, August 2024, DOI: http://dx.doi.org/10.48175/IJARSCT-19429
- О.О. Іванюк, Н.С. Денисенко, 3. Gajbhiye B., Jain S.., Chhapola A. (2024). Secure SDLC: Incorporating Blockchain for Enhanced Security. Scientific Journal of Metaverse and Blockchain Technologies, 2(2), pp. 97–110. DOI: https://doi.org/10.36676/sjmbt.v2.i2.40
- Zishan M., Russell S. (2024). Data Privacy and Security in E-commerce: Utilizing Blockchain and Multi- Factor Authentication to Safeguard Transactions. ResearchGate, August 2024, DOI: http://dx.doi.org/10.13140/RG.2.2.16554.63682
- Kumari S, Farheen S. (2024) Blockchain based data security for financial transaction system. 2020 4th International Conference on Intelligent Computing and Control Systems (ICICCS), Madurai, India, 2020, pp. 829–833. DOI: 10.1109/ICICCS48265.2020.9121108
- Kuznetsov O., Rusnak A., Yezhov A., Kuznetsova K., Kanonik D. and Domin O. (2024) Evaluating the Security of Merkle Trees: An Analysis of Data Falsification Probabilities, Cryptography, vol. 8, no. 3, Art. no. 3, Sep. 2024, DOI: 10.3390/cryptography8030033.
- M. Salimitari, M. Chatterjee, and Y. Fallah, (2020). A survey on consensus methods in Blockchain for resource-constrained IoT networks, Internet of Things, vol. 11, pp. 1–23, 2020. DOI:10.36227/techrxiv.12152142
- National Institute of Standards and Technology, "Secure Hash Standard (SHS)", Federal Information Processing Standards (FIPS) Publication 180-4, August 2015. DOI: https://doi.org/10.6028/NIST.FIPS.180-4
- Blockchain Demo. A web-based demonstration of blockchain concepts. [Electronic resource] – Available at: https://github.com/anders94/blockchain-demo/ (Accessed: 05.10.2024)
- Crypto JS. JavaScript library of crypto standards [Electronic resource] – Available at::. https://www.npmjs.com/package/crypto-js (Accessed: 05.10.2024)