Part 3

We’ve seen how Bitcoin works at a high level.

We know what needs to be implemented.

However, we don’t know how that happens.

This lecture will teach you everything about the low-level specifics of Bitcoin that make it work.

First, let’s discuss cryptographic hash functions: what they are and how they’re used in Bitcoin.

Then, we’ll see how we can use cryptographic hash functions to create a tamper-evident database — the blockchain that we all know and love.

We’ll then discuss digital signatures, the elliptic curve digital signature algorithm, and how we actually generate and use our private key, public key, and address.

Finally, we’ll introduce Bitcoin script and its functionality as well as its role in making Bitcoin more flexible.

Motivations and Definitions