University of Oulu

Internet Tietokoneen ketjuavaimen kryptografia

Saved in:
Author: Katainen, Venla1
Organizations: 1University of Oulu, Faculty of Information Technology and Electrical Engineering, Department of Computer Science and Engineering, Computer Science
Format: ebook
Version: published version
Access: open
Online Access: PDF Full Text (PDF, 1.4 MB)
Pages: 38
Persistent link: http://urn.fi/URN:NBN:fi:oulu-202302131133
Language: Finnish
Published: Oulu : V. Katainen, 2023
Publish Date: 2023-02-13
Thesis type: Bachelor's thesis
Tutor: Halunen, Kimmo
Description:

Tiivistelmä

Tässä kandidaatin tutkielmassa tarkastellaan Dfinityn kehittämää Internet Tietokonetta ja ketjuavaimen kryptografiaa. Lisäksi toteutetaan hajautettu sovellus, eli dapp, Internet Tietokonetta varten Dfinityn tarjoamien materiaalien ja esimerkkien avulla. Tutkielman tarkoituksena on tutustua Internet Tietokoneeseen ja selvittää ketjuavaimen kryptografian toimintaa Internet Tietokoneessa. Hajautetun sovelluksen toteuttamisessa käytettiin Internet Tietokonetta varten luotua ohjelmointikieltä Motokoa, mutta selainpuolen toteutuksessa myös CSS- ja HTML-ohjelmointikieliä. Lisäksi toteutukseen käytettiin Dfinityn ohjelmistotyökaluja.

Hajautetun sovelluksen avulla pyrittiin saamaan tietoa Internet Tietokoneesta käytännössä. Ketjuavaimen kryptografian havaitseminen ei sovelluksen avulla onnistunut, mutta sen avulla onnistuttiin saamaan informaatiota esimerkiksi kanistereiden toiminnasta.

Chain-key cryptography of the Internet Computer

Abstract

This bachelor’s thesis discusses Dfnity’s Internet Computer and chain-key cryptography. In addition a distributed application, a dapp, was created to research the chain-key cryptography in practice. The dapp was created with Dfnity’s material and examples such as Dfnity’s software development kit. The programming language used to create the dapp was Motoko which is created by Dfnity, but also CSS and HTML for the front-end.

The main reason for the thesis was to study the Internet Computer and the function of the chain-key cryptography. Data was collected about the chain-key cryptography with distributed application, but nothing special related to chainkey cryptography was observed. Nevertheless a lot of other information was discovered such as information about the canisters.

see all

Subjects:
Copyright information: © Venla Katainen, 2023. Except otherwise noted, the reuse of this document is authorised under a Creative Commons Attribution 4.0 International (CC-BY 4.0) licence (https://creativecommons.org/licenses/by/4.0/). This means that reuse is allowed provided appropriate credit is given and any changes are indicated. For any use or reproduction of elements that are not owned by the author(s), permission may need to be directly from the respective right holders.
  https://creativecommons.org/licenses/by/4.0/