Section Locked
Continue reading on HyperReads to access this section and more.
No credit card required
Master blockchain through progressive chapters with hands-on demos
Foundational data structures and concepts that power blockchain technology
A linked list is a fundamental data structure that forms the backbone of blockchain technology. Each block in a blockchain is like a node in a linked list, containing data and a reference to the previous block.
A linked list is a linear data structure where elements (called nodes) are stored in a sequence, but unlike arrays, they are not stored in contiguous memory locations. Each node contains two parts: the data and a pointer (or reference) to the next node in the sequence.
Blockchain is essentially a specialized singly linked list where each block contains a cryptographic hash of the previous block instead of a simple pointer. This creates an immutable chain - if any block is modified, all subsequent hashes become invalid.
Now that you understand linked lists, use the interactive tool below to visualize how nodes are added and removed. Try adding nodes at different positions and observe how the pointers update!
Loading interactive tool...
Hashing is the process of converting any input data into a fixed-size string of characters. In blockchain, hash functions create unique digital fingerprints that ensure data integrity and link blocks together.
A hash function takes an input (or 'message') of any size and produces a fixed-size output called a hash value, hash code, digest, or simply hash. The same input always produces the same output, but even a tiny change in input produces a completely different hash.
Blockchain uses hashing to: (1) Create unique block identifiers, (2) Link blocks together by including the previous block's hash, (3) Verify data integrity, and (4) Support the mining process through proof-of-work.
Experience the avalanche effect firsthand! Type any text below and watch how even a single character change produces a completely different hash. Try typing 'hello' and then 'Hello' to see the dramatic difference.
Loading interactive tool...
A Merkle tree is a hash-based data structure that efficiently summarizes and verifies the integrity of large sets of data. Bitcoin and other blockchains use Merkle trees to organize transactions within each block.
A Merkle tree (named after Ralph Merkle) is a binary tree where every leaf node contains the hash of a data block, and every non-leaf node contains the hash of its child nodes. The root of the tree, called the Merkle root, represents a single hash that summarizes all the data.
Every Bitcoin block contains a Merkle root in its header, summarizing all transactions in that block. This allows lightweight wallets to verify if a transaction is included in a block by downloading only a small 'Merkle proof' instead of the entire block.
Build your own Merkle tree! Enter transaction data below and watch how each transaction gets hashed, then paired and hashed again, until reaching the final Merkle root. Try modifying one transaction to see how it affects the entire tree.
Loading interactive tool...
Blockchain systems use various data encoding formats to represent information efficiently. Understanding hexadecimal, binary, Base58, and other formats is essential for reading blockchain data.
The fundamental language of computers. Uses only 0 and 1. Every piece of data, from text to images, is ultimately stored and processed as binary. Each binary digit is called a 'bit', and 8 bits make a 'byte'.
These describe the byte order when storing multi-byte values. Big Endian stores the most significant byte first (like reading left to right). Little Endian stores the least significant byte first. Bitcoin uses Little Endian for many internal values.
Convert between different data formats! Enter a value in one format and see its representation in others. This skill is crucial for reading raw blockchain data and understanding how addresses and hashes are encoded.
Loading interactive tool...
Loading quiz...
Security foundations that protect blockchain networks and transactions
Symmetric encryption uses a single shared key for both encrypting and decrypting data. It's fast and efficient for encrypting large amounts of data, but requires secure key distribution.
Symmetric encryption uses the same secret key for both encryption (converting plaintext to ciphertext) and decryption (converting ciphertext back to plaintext). Both parties must have the same key and keep it secret.
The main challenge with symmetric encryption is securely sharing the key. If an attacker intercepts the key during transmission, they can decrypt all messages. This problem led to the development of asymmetric encryption.
While blockchain transactions use asymmetric cryptography, symmetric encryption is still used for: encrypting wallet files, securing communication channels, and protecting sensitive metadata.
Try encrypting and decrypting messages with AES! Enter a secret passphrase and your message, then encrypt it. Share the ciphertext - only someone with the same passphrase can decrypt it.
Loading interactive tool...
Continue reading on HyperReads to access this section and more.
No credit card required
Continue reading on HyperReads to access this section and more.
No credit card required
Loading quiz...
Core blockchain mechanics from hashing to distributed consensus
Continue reading on HyperReads to access this section and more.
No credit card required
Continue reading on HyperReads to access this section and more.
No credit card required
Continue reading on HyperReads to access this section and more.
No credit card required
Continue reading on HyperReads to access this section and more.
No credit card required
Continue reading on HyperReads to access this section and more.
No credit card required
Loading quiz...
Real-world Bitcoin implementation from keys to blocks
Continue reading on HyperReads to access this section and more.
No credit card required
Continue reading on HyperReads to access this section and more.
No credit card required
Continue reading on HyperReads to access this section and more.
No credit card required
Continue reading on HyperReads to access this section and more.
No credit card required
Loading quiz...