Search icon CANCEL
Subscription
0
Cart icon
Your Cart (0 item)
Close icon
You have no products in your basket yet
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Free Learning
Arrow right icon
Arrow up icon
GO TO TOP
Blockchain for Enterprise

You're reading from   Blockchain for Enterprise Build scalable blockchain applications with privacy, interoperability, and permissioned features

Arrow left icon
Product type Paperback
Published in Sep 2018
Publisher Packt
ISBN-13 9781788479745
Length 220 pages
Edition 1st Edition
Languages
Concepts
Arrow right icon
Author (1):
Arrow left icon
Narayan Prusty Narayan Prusty
Author Profile Icon Narayan Prusty
Narayan Prusty
Arrow right icon
View More author details
Toc

Table of Contents (10) Chapters Close

Preface 1. What are Decentralized Applications? FREE CHAPTER 2. Building Blockchain Using Quorum 3. Writing Smart Contracts 4. Getting Started with web3.js 5. Building Interoperable Blockchains 6. Building Quorum as a Service Platform 7. Building a DApp for Digitizing Medical Records 8. Building a Payment Solution for Banks 9. Other Books You May Enjoy

Ethereum accounts


To create an account, we just need an asymmetric key pair. There are various algorithms, such as Rivest–Shamir–Adleman (RSA) and Elliptic Curve Cryptography (ECC) for generating asymmetric key pairs. Ethereum uses ECC. ECC has various curves. These curves have a different speed and security. Ethereum uses  secp256k1 curves. To go in to  ECC and it's curves will require mathematical knowledge, and it's not necessary to understand it in depth to build DApps using Ethereum.

Ethereum uses 256-bit encryption. An Ethereum private and public key is a 256-bit number. As processors cannot represent such big numbers therefore it's always encoded as a hexadecimal string of length 64. 

Every account is represented by an address. Once we have the keys we need to generate the address,here is the procedure to generate the address, and here is the procedure to generate the address from the public key:

  1. First, generate the Keccak-256 hash of the public key. It will give you a 256-bit number...
lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $19.99/month. Cancel anytime
Banner background image