Cryptocurrency. Part Five: Transaction Validation

Cryptocurrency. Part Five: Transaction Validation

HomeComputer ScienceCryptocurrency. Part Five: Transaction Validation
Cryptocurrency. Part Five: Transaction Validation
ChannelPublish DateThumbnail & View CountDownload Video
Channel AvatarPublish Date not found Thumbnail
0 Views
This computer science lesson is the fifth in a series on cryptocurrency and non-fungible tokens, also known as NFTs. The series explores some of the technologies underlying various cryptocurrencies such as Bitcoin, as well as some of the ethical, cultural and legal implications of this digital currency. In this specific lesson, you will learn how Bitcoin transactions are validated before being added to the blockchain. You will learn about the role of hashing algorithms, including SHA256 and RIPEMD160, in creating a new Bitcoin address for pay to public key hash P2PKH transactions, and the role of asymmetric key cryptography, also known as public private key cryptography, when creating a digital signature for a transaction. You will see how cryptographic techniques are used to verify ownership of UTXOs and prevent double-spending of a UTXO. In addition, you will learn about the role of the transaction pool, also called the mempool, and the role of a database called the UTXO set, copies of which are maintained by nodes in the bitcoin network.

Please take the opportunity to connect and share this video with your friends and family if you find it useful.