0% found this document useful (0 votes)
215 views11 pages

Blockchain Lab Manual CS804

The document outlines a series of experiments for a Blockchain Technology Lab Manual (CS-804), each focusing on different aspects of blockchain programming and cryptographic techniques. Key experiments include creating blocks using hash functions, implementing Merkle trees, validating block hashes, and developing smart contracts on the Ethereum network. The manual emphasizes practical applications of blockchain technology, including data integrity, consensus algorithms, and secure transaction methods.

Uploaded by

sammy
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
215 views11 pages

Blockchain Lab Manual CS804

The document outlines a series of experiments for a Blockchain Technology Lab Manual (CS-804), each focusing on different aspects of blockchain programming and cryptographic techniques. Key experiments include creating blocks using hash functions, implementing Merkle trees, validating block hashes, and developing smart contracts on the Ethereum network. The manual emphasizes practical applications of blockchain technology, including data integrity, consensus algorithms, and secure transaction methods.

Uploaded by

sammy
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd

Blockchain Technology Lab Manual (CS-

804)
Experiment 1

Title
Write a program to create a block in a block chain by using hash function.

Content
This experiment introduces the fundamental unit of a blockchain: the block. It includes
writing a program that uses a hash function to ensure the integrity of the block's data. Each
block will contain essential fields such as index, timestamp, data, previous hash, and a
computed hash. The cryptographic hash function (e.g., SHA-256) guarantees that even a
small change in the block’s content results in a drastically different hash, making blockchain
tamper-proof.
Experiment 2

Title
Write a program to make binary merkel tree in a block chain. Also perform the operations
like Space, Searching, Traversal, Insertion, Deletion, and Synchronization. Mention their
complexity code along with program.

Content
Merkle trees are essential in blockchain for ensuring data integrity and quick verification.
This experiment involves constructing a binary Merkle tree where each non-leaf node is a
hash of its child nodes. Students will implement tree operations including insertion,
searching, traversal, and deletion. Additionally, synchronization ensures consistency of
nodes. Time and space complexity of each operation must be evaluated and documented.
Experiment 3

Title
Implement the blockchain code by using SHA256 algorithm.

Content
This experiment focuses on applying SHA-256, a cryptographic hash function used in
Bitcoin and many blockchain platforms. Students will implement a basic blockchain where
each block's hash is calculated using SHA-256. The experiment emphasizes the irreversible
and secure nature of hash functions, ensuring the immutability of blocks in the blockchain.
Experiment 4

Title
Write a program to validate the block hash function from genesis block.

Content
This task involves validating the blockchain by verifying the hash from the genesis block up
to the latest block. The program will recalculate each block’s hash and compare it with the
stored value. Any discrepancy would indicate tampering. This experiment highlights the
importance of data integrity and how blockchain maintains trust without a central
authority.
Experiment 5

Title
Write a program to implement Proof of Work (POW) system by adding a mine method and
nonce property to the block in peer to peer network (P2P).

Content
Proof of Work (PoW) is a consensus algorithm that requires solving complex mathematical
problems. In this experiment, students will implement a mining function using a nonce
(random number). The goal is to find a hash value that satisfies a predefined condition (e.g.,
starting with a certain number of zeros). This process emulates how blocks are mined and
validated in networks like Bitcoin.
Experiment 6

Title
Write a program to construct digital signature in block chain by using hash function and
verification algorithm.

Content
Digital signatures ensure authenticity and integrity of transactions. In this experiment,
students will implement digital signatures using cryptographic algorithms (e.g., RSA or
ECDSA). The process involves hashing the transaction data and encrypting it with a private
key. The receiver can then verify the authenticity using the sender’s public key. This mirrors
secure transaction signing in real-world blockchain systems.
Experiment 7

Title
Write a program to develop Crypto wallet by using public key and private key.

Content
Crypto wallets are essential for interacting with blockchain networks. This experiment
involves developing a simple wallet system using key pair generation (public and private
keys). The wallet allows users to send and receive cryptocurrency securely. The private key
signs transactions while the public key is used for verification, ensuring secure ownership
and transfer of digital assets.
Experiment 8

Title
Write a program to build cryptocurrency Ethereum blockchain.

Content
This experiment involves simulating or interacting with the Ethereum blockchain. Students
will create a basic cryptocurrency, deploy it as a smart contract using Solidity, and run it on
Ethereum testnets (like Rinkeby or Ganache). The program will allow transfers, balance
checks, and transaction recording. This provides hands-on experience with real-world
blockchain application development.
Experiment 9

Title
Write a program to make Smart contracts on Ethereum network.

Content
Smart contracts are self-executing contracts with terms directly written into code. Students
will write a simple smart contract using Solidity (e.g., a voting system, token transfer, or
crowdfunding). The contract will be deployed to Ethereum and interacted with through
Web3.js or Remix IDE. This experiment introduces decentralized application development.
Experiment 10

Title
Write a program to implement Data Encryption Standard in blockchain.

Content
Data Encryption Standard (DES) is a symmetric-key algorithm for encrypting data. In this
experiment, students will implement DES to secure the data stored within blockchain
blocks. Though DES is largely outdated, the experiment illustrates how encryption adds a
layer of confidentiality to blockchain data. The program will perform encryption before
storing and decryption when retrieving block data.

You might also like