代写 C++ data structure algorithm graph theory COMP1011 Programming Fundamentals

COMP1011 Programming Fundamentals
2018/19 Semester 2
Background
Programming Fundamentals Assignment 3
A Simple Blockchain [Deadline: 23:00:00 30th April, 2019]
Blockchain, a cryptographic tool, is extensively used in Fintech applications nowadays for protecting chronological order of transactions.
The blocks are “linked” together by enforcing a specific relationship between blocks. That is, a block must contain a “fingerprint”, which is a hash value, of the data of the previous block. A hash function can condense arbitrary message (the block information) to a fixed size (e.g., 160 bits) and produces a fingerprint of the message.
Hash of Block 1 Hash of Block 2 Hash of Block 3
-1-
Department of Computing The Hong Kong Polytechnic University

COMP1011 Programming Fundamentals 2018/19 Semester 2
After a block is added to the end of the chain, it can neither be removed or modified. If there are malicious changes to the transaction data, it can be detected by checking the hash value stored in the next block.
In short, blockchain is essentially a linked list data structure, which links the transaction data stored in blocks. And the integrity of the blocks can be verified by using hash values.
What you have to do
Implement a Blockchain using linked list as the data structure. The following template files have been given to you (available in Blackboard). Import the files in a new C++ project and use them as the starting point of your code:
Blockchain.h
It is a class of linked list corresponds to the structure of block, it includes all the data necessary to enter in a block, for example, sender, receiver, amount_of_transaction etc. You DO NOT have to modify this file.
Blockchain.cpp
This file contains the implementation of Blockchain (linked list). This includes five functions:
1.Linked_List(). //(Constructor) 2. ~Linked_List(). //(Destructor)
3. add().
4. print(). 5. Verify().
//Function to add blocks
//Function to print the blockchain
//Function to check the validity of blockchain
Consolas You DO NOT have to modify this file.
SHA1.h
This file contains the declarations of sha1. You DO NOT have to modify this file.
SHA1.cpp
This file contains the core logic of generating a 160-bit value hash value based on Secure Hash Algorithm version 1 (SHA-1). You DO NOT have to modify this file.
Assignment_3.cpp
-2-
Department of Computing The Hong Kong Polytechnic University

COMP1011 Programming Fundamentals 2018/19 Semester 2 This file contains the main() program. Use it as a testing driver of your code. Here are some
steps you can follow in main().
1. Make some transactions by add() functions.
2. Use the verify() function to check the validity of your chain.
3. Now manipulate the data of any the blocks.
4. Now again check the validity of you chain.
You DO NOT have to modify this file.
Read carefully the details of each file first before coding. The existing coding may shed you some light on how to code the missing parts.
The following is a visual representation of the blockchain, to be implemented by your program:
In the real world, the hash value has to be digitally signed by the creator of the block so changes on the hash value is not possible by the attacker. In this assignment, we just assume the hash value cannot be changed after the block is created.
Block
Block
Block
hash of previous
transaction
BlockData
transaction
hash of previous
transaction
BlockData
transaction
hash of previous
transaction
BlockData
transaction
Blockchain
-3-
NULL
Department of Computing The Hong Kong Polytechnic University

COMP1011 Programming Fundamentals 2018/19 Semester 2 Below shows the output of Assignment_3.cpp if the implementation is successful:
Example for the use of SHA1.cpp
 It produces a string of 160 bits no matter how long or small the input is.
Department of Computing The Hong Kong Polytechnic University
-4-

COMP1011 Programming Fundamentals 2018/19 Semester 2
Assessment
This assignment is divided into multiple levels of difficulty. Try to accomplish the assignment from the easiest level first and proceed to the next level. It helps you break down the problem into smaller pieces and build up the program progressively. You will be awarded a maximum mark for each level. Only if you complete all requirement of this assignment, you will get full marks.
Level 1 (30 marks)
 Implement the constructor Linked_List() and destructor ~Linked_List() functions in Blockchain.cpp.
Level 2 (20 marks)
 Implement the print() in Blockchain.cpp.
Level 3 (50 marks)
 Implement the add() and verify() functions in Blockchain.cpp.
At the beginning of Assignment_3.cpp, type your information using the following C++ comment template:
//============================================================================
// Author
// Student No.
// Description //============================================================================ Warning: Any compilation error will be awarded ZERO mark, regardless of what you have coded. Therefore, if you are unable to complete the whole program, try to accomplish some of the implementations. In this case, you may edit Assignment_3.cpp as well as other files so that the project can be compiled and the program can be run successfully.
:
:
: COMP1011 Assignment 3
Submission
-5-
Department of Computing The Hong Kong Polytechnic University

COMP1011 Programming Fundamentals
2018/19 Semester 2
Follow the steps below:
1. Create a folder and name it as _. E.g., 12345678d_CHANTaiMan
2. Put the following .h and .cpp files into the folder:
1. Blockchain.h
2. Blockchain.cpp
3. Assignment_3.cpp 4. SHA1.h
5. SHA1.cpp
3. Compress the folder (.zip, .7z, .rar, or .jar) and submit the compressed file to Blackboard.
The deadline of this assignment is 23:00:00 30th April, 2019. No late submission is allowed.
This assignment is an individual work. All work must be done on your own. Plagiarism is serious offence. The Moss (https://theory.stanford.edu/~aiken/moss/) system will be adopted for plagiarism checking. Submissions with high similarity, in terms of code patterns and structures, in addition to direct-copy-and-paste, will be treated as plagiarism. Copying code from web resources is prohibited as well. Any plagiarism cases (both copier and copiee) will be given ZERO mark in this assignment.
-6-
Department of Computing The Hong Kong Polytechnic University