INTE2627 Blockchain Technology Fundamentals 1Web

Java Python INTE2627 Blockchain Technology Fundamentals

Assignment 1

1.    Overview

The objective of Assignment 1 is to evaluate your understanding of the topics covered in Lectures 1-3. These topics include an introduction to Blockchain technology fundamentals, the basic building blocks of Blockchain I: Hashes and Merkle  Root, and the basic building blocks of Blockchain II: Digital Signatures. Assignment 1 will focus on developing your basic understanding in building security mechanisms in Distributed Ledger Technology (DLT) for immutable inventory management systems using the concepts from the lecture and tutorial.

Assignment 1 contains one comprehensive problem: Building Security Mechanisms in Distributed Ledger Technology (DLT) for Immutable Inventory Management. This problem requires you to integrate key security measures such as hashes,  Merkle root, and digital signatures to ensure the integrity and trustworthiness of a distributed inventory system. You are required to prepare the solution with a description of the step-by-step processes as a single PDF

Develop the solution of this assignment in an  iterative fashion (as opposed to completing it in one sitting). You should be able to start preparing your answers immediately after Lecture-1 (in Week-1). At the end of each week starting from Week-1 to Week-3, you should be able to solve at least one question.

If there are questions, you must ask via the relevant Canvas discussion forums in a general manner. Overall, you must follow the following special instructions:

● You must fulfill the requirements in the questions.

You must submit the solutions as a report on CANVAS.

● Upload your solution as a single PDF or Word document in CANVAS.

Do not put the PDF within the ZIP file.

2. Assessment Criteria

This assessment will determine your ability to:

● Follow the requirements provided in this document and in the lessons.

● Independently solve a problem by using concepts taught over the first four weeks of the course.

● Meeting deadlines.

3.    Learning Outcomes

This assessment is relevant to the following Learning Outcomes:

CLO 1 : Explain the fundamental concepts of blockchain technology such as its structure, applications, and data immutability.

CLO 2: Compare and contrast different types of blockchains, including public, private, and permissioned, and analyze their use in various industries.

CLO 3: Demonstrate a deep understanding of decentralized systems, hash functions, Merkle Root, cryptography, and consensus algorithms, and their role in blockchain technology.

4. Assessment details

Please ensure that you have read Sections 1 to 3 of this document before going further. Assessment details are provided on the next page.

Q1.  Building Security Mechanisms in Distributed Ledger Technology (DLT)  for  Immutable Inventory Management (Marks 20)

Distributed Ledger Technology (DLT) offers a decentralized and distributed approach to maintaining records and man INTE2627 Blockchain Technology Fundamentals Assignment 1Web aging transactions. In inventory management, DLT can ensure that records across multiple locations remain synchronized and trustworthy. This assignment explores the use of  security  mechanisms  such  as hashes, merkle root, and digital signatures to create a secure and reliable DLT-based inventory management system.

Problem Context

We can assume a distributed inventory system spread across four (4) different locations. Each location maintains its own database, which contains records shared among all databases from other locations. It is crucial for all inventories to remain synchronized, with identical records at any given time (see Figure. 1). To achieve this, any new record added to one location's database  must be promptly propagated to all other locations' inventories, ensuring a consistent distributed digital ledger and preventing discrepancies. However, the issue arises where each location cannot ensure the integrity of added records, as there is no mechanism to verify that propagated records remain untampered during transmission. Consequently, the integrity of records across the distributed system cannot be guaranteed, leading to potential discrepancies and data inconsistencies.

Figure 1. Scenario Overview

Assignment details

In this assignment, you are required to demonstrate step-by-step processes for how each inventory system in Figure 1 can add its own data and propagate it to other inventories across different locations. Specifically, show how Inventories A, B, C, and D add a new record and then propagate it to the other inventories (NOTE: please use the same values shown in Figure 1 for each record). Additionally, you must demonstrate how to integrate security measures into the system to ensure the integrity and trustworthiness of the Distributed Ledger Technology (DLT) system.

Ensuring Integrity and Trustworthiness

To ensure the integrity and trustworthiness of this digital ledger, you must integrate the following key security measures: hashes, Merkle root, and simple digital signatures.

Hashes: Discuss the role of hash functions (e.g., MD5, SHA-256) in detecting tampering or alterations. Explain how you would use hashes to create unique fingerprints for each record in the inventory

system. Provide a detailed theoretical example of generating and verifying a hash for each record added.

Merkle Root: Discuss the role of the Merkle root in ensuring the consistency of records across all

locations. Provide a step-by-step theoretical guide on how the Merkle root is computed each time a

new record is added to the system. Then, explain how the Merkle root efficiently manages and verifies the integrity of the entire inventory.

Digital Signatures: Explain the use of simple digital signatures (e.g., RSA) for authentication and

validation. Discuss how digital signatures can create a unique identity for each record, preventing

unauthorized alterations. Demonstrate the process of digitally signing each record and verifying the signature across all locations.

Note: This assignment does not require any implementation (code). It focuses on the theoretical and

conceptual understanding of the processes involved in maintaining a secure distributed ledger system. You must include the necessary diagrams and computation for each process         

## 软件功能详细介绍 1. **文本片段管理**:可以添加、编辑、删除常用文本片段,方便快速调用 2. **分组管理**:支持创建多个分组,不同类型的文本片段可以分类存储 3. **热键绑定**:为每个文本片段绑定自定义热键,实现一键粘贴 4. **窗口置顶**:支持窗口置顶功能,方便在其他应用程序上直接使用 5. **自动隐藏**:可以设置自动隐藏,减少桌面占用空间 6. **数据持久化**:所有配置和文本片段会自动保存,下次启动时自动加载 ## 软件使用技巧说明 1. **快速添加文本**:在文本输入框中输入内容后,点击"添加内容"按钮即可快速添加 2. **批量管理**:可以同时编辑多个文本片段,提高管理效率 3. **热键冲突处理**:如果设置的热键与系统或其他软件冲突,会自动提示 4. **分组切换**:使用分组按钮可以快速切换不同类别的文本片段 5. **文本格式化**:支持在文本片段中使用换行符和制表符等格式 ## 软件操作方法指南 1. **启动软件**:双击"大飞哥软件自习室——快捷粘贴工具.exe"文件即可启动 2. **添加文本片段**: - 在主界面的文本输入框中输入要保存的内容 - 点击"添加内容"按钮 - 在弹出的对话框中设置热键和分组 - 点击"确定"保存 3. **使用热键粘贴**: - 确保软件处于运行状态 - 在需要粘贴的位置按下设置的热键 - 文本片段会自动粘贴到当前位置 4. **编辑文本片段**: - 选中要编辑的文本片段 - 点击"编辑"按钮 - 修改内容或热键设置 - 点击"确定"保存修改 5. **删除文本片段**: - 选中要删除的文本片段 - 点击"删除"按钮 - 在确认对话框中点击"确定"即可删除
评论
成就一亿技术人!
拼手气红包6.0元
还能输入1000个字符
 
红包 添加红包
表情包 插入表情
 条评论被折叠 查看
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值