Before we dive into the details of security, we'll review the various blockchains available as platforms for development, and how they differ.
Managing Your Keys
Attack Vectors and Prevention
For each of the limits of a system, there are a number of ways that a malicious party might exploit them for personal gain. In this module, we'll review the various attacks and provide some suggestions as to how they can be mitigated.
While blockchain technology originally emerged as a solution to provide distributed trust within the Bitcoin network, the technology has progressed a long way since 2008.
While this new architecture has many advantages, the implementation of a blockchain-based system is complex and requires a thorough review to ensure appropriate security.
Regardless of which blockchain you use, there are no avoiding key management concerns. The distributed ledger ecosystem requires each user to store and manage their own cryptographic keys. All on-chain interactions are tied to identities using signatures with private keys. As a result, the ecosystem depends heavily on the security of its keys.
Andreas M. Antonopoulos
Remember that private keys are little more than randomly generated numbers that serve a master key to your wallet or profile. Since they are private and thus never to be shared, public keys are generated from the private key. In this way, the numbers are “linked” since one is born from the other. The public key allows other people to perform the following activities:
- Encrypt a message specifically for you from them
- Verify a cryptographically signed challenge phrase
More information is available about Public Key Cryptography in the Blockchain 101 Course.