L
L
loosername2018-01-16 09:18:22
Programming
loosername, 2018-01-16 09:18:22

How to apply blockchain?

I am writing a graduation project on the protection of information in computer systems and networks using cryptography. As a practical part, I decided to write my own version of the blockchain (there was a guide on Habré). Help me figure out how it can be applied to connect it with the theme of the work. Thanks in advance

Answer the question

In order to leave comments, you need to log in

5 answer(s)
I
Ilya Bobkov, 2018-01-16
@heksen

Try to create a small bank emulator. Where are the bank customers? And where you can make secure transfers between clients of this bank.

D
dmshar, 2018-01-16
@dmshar

Bolkchain is not a cryptocurrency. (Although it is fashionable, and many simply mix these two things). Whatever doubts (for the reviewer :-) ), I would not look in the direction of anything related to finances. As an application, I would take, for example, issues related to the storage of documents, contracts, medical histories, or - an even more relevant example for you - diplomas. They have all the features necessary for the application of blockchain technology - they must be public (controlled) while having "open" and "closed" parts, they, once introduced into the system, cannot change in the future, they must be historically linked to each other. Quite a vital case.

A
azShoo, 2018-01-17
@azShoo

Rule number 0 says:
If you want advice on how to use blockchain, then you don't need blockchain.

Y
Yupa20171123, 2018-01-19
@Yupa20171123

By analogy with

dmshar @dmshar

1. Chat (conference, forum). Excluding substitution and insertion (and some more goodies).
On serious cipher machines, the open part is also very readable. And the real layer is hidden. But it's too complicated for a diploma (if you don't want it forever in the mailbox :)
2. Controlling a drone or other device (instead of codes / keys / subscriber verification fields) through a network of repeaters.
3. Computer game. And skills instead of a quest. And vice versa, as in the "Prince of Persia" on the dandy.
4. Modify dicom. Law on the protection of personal information + access from all health facilities. It was assumed that the picture and description would be in one file. But we have many PACS and one MIS. That is, a SQL database with descriptions and a bunch of snapshots on different servers.
5. File system. So that a virus or "stranger" could not change the contents of the files. Instead of checking sums {MD5, SHA256, SHA512,...} It can be for knowledge bases, something else similar.
student - "I'll remember now, it's spinning on my tongue ..."
teacher - "spit it out, this is HCL"
3 + 5 is the most interesting.

Didn't find what you were looking for?

Ask your question

Ask a Question

731 491 924 answers to any question