Loading

Security Analysis on Block Chain using the ECC and Sha Algorithms
B. Aruna1, A. Ajay Prakash2, M. S. Srinija3
1Ms.B. Aruna, Department of Enterpris Content Management, Koneru Lakshmaiah Education Foundation, Vaddeswaram (A.P.), India.
2A. Ajay Prakash, Department of Enterpris Content Management, Koneru Lakshmaiah Education Foundation, Vaddeswaram (A.P.), India.
3M.S. Srinija, Department of Enterpris Content Management, Koneru Lakshmaiah Education Foundation, Vaddeswaram (A.P.), India.
Manuscript received on 30 May 2019 | Revised Manuscript received on 07 June 2019 | Manuscript published on 30 June 2019 | PP: 1996-2001 | Volume-8 Issue-8, June 2019 | Retrieval Number: G5935058719/19©BEIESP
Open Access | Ethics and Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: This paper thinks about blockchain innovation – which is getting solid consideration from the business and furthermore being connected in numerous fields. Passwords assume an imperative job in day by day life in different figuring applications and assume a basic job in online confirmation. The fundamental go for utilizing passwords is to limit unapproved clients to get to the framework. Blockchain, as a new age technology, provides the necessary tools to ensure data integrity and data protection using some encryption. Smaller transaction size and higher transaction efficiency are the essential requirements of the blockchain.
Key words: Block Chain, SHA-256, ECC (Elliptic Curve Cryptography).

Scope of the Article: Block Chain-Enabled IoT Device and Data Security and Privacy