Crypto
Blockchain uses cryptographic algorithms to ensure security and protect data integrity. This section describes cryptographic algorithms.
Table of contents
SHA256 - Secure Hash Algorithm
SHA256 is a secure hash algorithm used in the Frenyum network.
- Purpose: To create a unique digest of blocks, transactions and other blockchain data.
- Uses: Check block integrity, determine if transactions have been modified.
- Performance: A fast and efficient hashing algorithm.
ed25519 - Digital Signature Scheme
ed25519 is a digital signature algorithm used in Frenyum.
- Purpose: To ensure the security of transactions.
- Usage Areas: Signing transactions securely, securing transactions.
- Efficiency: A computationally efficient and performance-oriented digital signing algorithm.