Search icon CANCEL
Subscription
0
Cart icon
Your Cart (0 item)
Close icon
You have no products in your basket yet
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Free Learning
Arrow right icon
Arrow up icon
GO TO TOP
Blockchain with Hyperledger Fabric

You're reading from   Blockchain with Hyperledger Fabric Build decentralized applications using Hyperledger Fabric 2

Arrow left icon
Product type Paperback
Published in Nov 2020
Publisher Packt
ISBN-13 9781839218750
Length 756 pages
Edition 2nd Edition
Languages
Concepts
Arrow right icon
Authors (7):
Arrow left icon
Salman A. Baset Salman A. Baset
Author Profile Icon Salman A. Baset
Salman A. Baset
Venkatraman Ramakrishna Venkatraman Ramakrishna
Author Profile Icon Venkatraman Ramakrishna
Venkatraman Ramakrishna
Salman Baset Salman Baset
Author Profile Icon Salman Baset
Salman Baset
Anthony O'Dowd Anthony O'Dowd
Author Profile Icon Anthony O'Dowd
Anthony O'Dowd
Petr Novotny Petr Novotny
Author Profile Icon Petr Novotny
Petr Novotny
Nitin Gaur Nitin Gaur
Author Profile Icon Nitin Gaur
Nitin Gaur
Luc Desrosiers Luc Desrosiers
Author Profile Icon Luc Desrosiers
Luc Desrosiers
+3 more Show less
Arrow right icon
View More author details
Toc

Table of Contents (18) Chapters Close

Preface 1. Blockchain – An Enterprise and Industry Perspective 2. Exploring Hyperledger Fabric FREE CHAPTER 3. Business Networks 4. Setting the Stage with a Business Scenario 5. Designing Smart Contract Transactions and Ledger Data Structures 6. Developing Smart Contracts 7. Developing Applications 8. Advanced Topics for Developing Smart Contracts and Applications 9. Network Operation and Distributed Application Building 10. Enterprise Design Patterns and Considerations 11. Agility in a Blockchain Network 12. Governance – A Necessary Evil of Regulated Industries 13. Life in a Blockchain Network 14. Hyperledger Fabric Security 15. Blockchain's Future, Protocol Commercialization, and Challenges Ahead 16. Another Book You May Enjoy
17. Index

Fundamentals of the secure transaction processing protocol

We mentioned previously that cryptography is one of the core building blocks of a blockchain solution. The fundamental security of the Bitcoin blockchain is the elegant cryptographical linkage of all major components of the ledger. Specifically, transactions are linked to each other, mainly through the Merkle tree. A Merkle tree is based on the concept of a tree data structure, where every leaf node has a hash calculated of its data and where every non-leaf node has a hash of all its underlying children.

This method provides us with a way to ensure the integrity of the data, but also provides privacy characteristics by allowing us to remove a leaf that is deemed private but leave the hash, thereby preserving the integrity of the tree. The Merkle tree has its roots incorporated into the block header. The block header includes a reference to the block headers that precede it, as shown in the following diagram:

Figure 1.3: Block headers with references to the preceding block headers

That cryptographically enforced interconnectivity fosters the stability and security of distributed ledgers. At any point, if a link between any of the components is broken, it leaves those exposed to malicious attacks.

Transactions are also cryptographically connected to the rest of the blockchain structure mainly through the Merkle tree. Once a transaction is modified within a block, with all other parts remaining stable, the link between all transactions of the block and its header is broken.

The new resulting Merkle tree root does not match the one already in the block header, hence providing no connectivity to the rest of the blockchain. If we proceed to change the Merkle tree root in the block's header, we will, in turn, break the chain of headers and thus the security model of the blockchain itself.

Therefore, if we only change the contents of a block, the rest of the blockchain components remain stable and secure, especially as the block headers provide the connecting links by including a hash of the previous block header in the header of the next block.

Figure 1.4: Anatomy of a block

lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $19.99/month. Cancel anytime
Banner background image