Blockchain is the backbone Technology of Digital CryptoCurrency BitCoin.
- A Blockchain is a list of records called blocks that are linked together using linked lists and use the cryptographic technique.
- Each block contains its own digital fingerprint called Hash, the hash of the previous block, a timestamp and the data of the transaction made, making it more secure towards any kind of data breach.
- Therefore, if the data of one block is changed then its hash will also change. If the hash is changed, then its hash will be different from the next block that contains the hash of the previous block affecting all the hashes of the blocks after it. Changing of the hashes and then comparing it with other blocks allows us to check the blockchain.
Implementation of the Blockchain: The following are the functions used in the implementation of the blockchain.
- Creating Blocks: To create a block, a Block class is implemented. In the class Block:
- hash will contain the hash of the block and
- previousHash will contain the hash of the previous block.
- String data is used to store the data of the block and
- “long timeStamp” is used to store the timestamp of the block. Here long data type is used to store the number of milliseconds.
- calculateHash() to generate the hash
Below is the implementation of the class block:
Java
import java.util.Date;
public class Block {
public String hash;
public String previousHash;
private String data;
private long timeStamp;
public Block(String data,
String previousHash)
{
this .data = data;
this .previousHash
= previousHash;
this .timeStamp
= new Date().getTime();
this .hash
= calculateHash();
}
public String calculateHash()
{
String calculatedhash
= crypt.sha256(
previousHash
+ Long.toString(timeStamp)
+ data);
return calculatedhash;
}
}
|
- Generating Hashes: To generate hash, SHA256 algorithm is used.
Below is the implementation of the algorithm.
Java
import java.security.MessageDigest;
public class crypt {
public static String sha256(String input)
{
try {
MessageDigest sha
= MessageDigest
.getInstance(
"SHA-256" );
int i = 0 ;
byte [] hash
= sha.digest(
input.getBytes( "UTF-8" ));
StringBuffer hexHash
= new StringBuffer();
while (i < hash.length) {
String hex
= Integer.toHexString(
0xff & hash[i]);
if (hex.length() == 1 )
hexHash.append( '0' );
hexHash.append(hex);
i++;
}
return hexHash.toString();
}
catch (Exception e) {
throw new RuntimeException(e);
}
}
}
|
- Storing the blocks: Now, let us store the blocks in the ArrayList of Block type, along with their hash values by calling the constructor of the Block Class.
Java
import java.util.ArrayList;
public class GFG {
public static ArrayList<Block> blockchain
= new ArrayList<Block>();
public static void main(String[] args)
{
blockchain.add( new Block(
"First block" , "0" ));
blockchain.add( new Block(
"Second block" ,
blockchain
.get(blockchain.size() - 1 )
.hash));
blockchain.add( new Block(
"Third block" ,
blockchain
.get(blockchain.size() - 1 )
.hash));
blockchain.add( new Block(
"Fourth block" ,
blockchain
.get(blockchain.size() - 1 )
.hash));
blockchain.add( new Block(
"Fifth block" ,
blockchain
.get(blockchain.size() - 1 )
.hash));
}
}
|
- Blockchain Validity: Finally, we need to check the validity of the BlockChain by creating a boolean method to check the validity. This method will be implemented in the “Main” class and checks whether the hash is equal to the calculated hash or not. If all the hashes are equal to the calculated hashes, then the block is valid.
Below is the implementation of the validity:
Java
public static Boolean isChainValid()
{
Block currentBlock;
Block previousBlock;
for ( int i = 1 ;
i < blockchain.size();
i++) {
currentBlock = blockchain.get(i);
previousBlock = blockchain.get(i - 1 );
if (!currentBlock.hash
.equals(
currentBlock
.calculateHash())) {
System.out.println(
"Hashes are not equal" );
return false ;
}
if (!previousBlock
.hash
.equals(
currentBlock
.previousHash)) {
System.out.println(
"Previous Hashes are not equal" );
return false ;
}
}
return true ;
}
|
Advantages of the Blockchain:
- Blockchain is a distributed network of systems. Therefore, data breaches are very difficult to be carried out.
- Since, Blockchain generated hashes of each block, therefore, it is very difficult to carry out malicious attacks.
- Data Tampering will change the hash of each block which will make the blockchain invalid