Note
If you are new to the blockchain technology, taking our Introduction to Blockchain Technology self-paced course is highly recommended. Also, for a comprehensive coverage of blockchain development in Ethereum or mastering Solidity programming, taking our below self paced courses is highly recommended:
Recap
In our previous article (How to Install Ethereum Swarm Storage), we discussed how to install Ethereum Swarm storage.
In this article, we learn how to process Ethereum messages with Whisper.
Ethereum messages – Whisper
An application typically needs three kinds of resources for application services:
- Compute
- Storage
- Messaging
Ethereum EVM and smart contracts provide compute, while Swarm/IPFS handles large data storage and is the decentralized storage layer. Whisper handles Ethereum messages.
Here is a high-level architecture diagram showing these three in action:
Whisper is an Ethereum P2P communication protocol that allows messaging between DApps. It provides a simple API that we can use to send an encrypted message through the Ethereum blockchain and receive and decrypted messages with the hash key. Whisper is currently at the POC 2 stage and supports the Geth and Parity clients. It can be used for DApps publish-subscribe coordination signaling and building secure, untraceable decentralized communication.
Whisper protocol
Whisper currently uses the ssh protocol string of devp2p. When sending an encrypted message, the message content can be encrypted by default either asymmetrically or symmetrically.
Asymmetric cryptography, also known as public key cryptography, uses public and private keys to encrypt and decrypt data. One key is public and it is shared with everyone. The other is a private key; only the owner can see or access private key information. When encrypting the Whisper message, it uses the standard Elliptic Curve Integrated Encryption Scheme with the SECP-256k1 public key to encrypt a message; the other key is used for decryption. Symmetric cryptography (also known as the secret key), on the other hand, uses the hash key with the AES GCM algorithm with a random 96-bit nonce for both encryption and decryption. It typically facilitates one-to-many messages. The sender and receiver use the same symmetric key to encrypt and decrypt the message.
One-to-One Live Blockchain Classes
Coding Bootcamps school offers One-to-One Live Blockchain Classes for Beginners.
Whisper envelopes
Whisper envelopes contain the encrypted payload and some metadata in plain format. It is sent and received by Whisper nodes.
Here is the structure of the envelope. It contains topic-related information, as shown in the following diagram:
Each field in the Whisper envelope contains important information for the message:
- Version: This can be up to 4 bytes (currently one byte containing zero) and indicates the encryption method. If the Version is higher than the current one, the envelope cannot be decrypted, and therefore can only be forwarded to the peers.
- Expiry: This is the message expiry time (Unix time in seconds).
- TTL: This defines the message’s time-to-live in seconds.
- Topic: This is 4 bytes of arbitrary data.
- AESNonce: This is used in symmetric encryption and represents 12 bytes of random data.
- Data: This is encrypted byte array data.
- EnvNonce: This is 8 bytes of arbitrary integer data that’s used for Proof-of- Work (PoW) calculations.
Whisper message
Envelope’s payload has encrypted byte array data; it is the Whisper message in plain format.
Here is the message’s structure:
[ flags, optional padding, payload, optional signature]
Let’s explain the structure in more detail:
- Flags: There’s a single byte for the flag to specify the message has a signature.
- Padding: This is used to align the message size, and it can contain random data.
- Signature: This is the signature that’s used for sending the message. It is the ECDSA signature of the Keccak-256 hash of the unencrypted data.
- Payload: This is the payload of the message.
Whisper messages are sent to all Whisper nodes with TTL and PoW consensus to prevent Direct Denial-of-Service (DDoS) attacks. The nodes pass envelopes around, and only the receiver who has the private key can read the message.
Now, we understand the basic Whisper message structure. It is time to look at an example.
Whisper example
To run Whisper, you need to install geth and then connect to a geth node with the Whisper option, as shown here:
geth –rpc –shh -ws
In the preceding command, we can see the following:
- The –rpc option is used to enable message communication via RPC. The –ssh option is used to enable the Whisper protocol.
- The –ws option is used to enable the WebSocket protocol for real-time message communication.
Here is the result after running the preceding command:
Posting a message: To post a Whisper message, we need a public key to encrypt a message:
- First, we will initialize the Whisper client by using the go-ethereum Whisper client API and connect to a local Geth node over WebSocket at the default port number 8546.
- Then, we will generate public and private keys through the NewKeyPair
function.
The go-ethereum whisperv6 package provides a NewMessage API to broadcast the message to the network. Here is a code sample for the publish message:
import ( ... "github.com/ethereum/go-ethereum/common/hexutil" "github.com/ethereum/go-ethereum/Whisper/shhclient" "github.com/ethereum/go-ethereum/Whisper/whisperv6" ) client, err := shhclient.Dial("ws://127.0.0.1:8546") keyID, err := client.NewKeyPair(context.Background()) publicKey, err := client.PublicKey(context.Background(), keyID) message := whisperv6.NewMessage{ Payload: []byte("Hello Whisper"), PublicKey: publicKey, TTL: 120, PowTime: 3, PowTarget: 2, } messageHash, err := client.Post(context.Background(), message)
Receiving a message: To receive a Whisper message, we need a private key to decrypt the message:
- First, we initialize the Whisper client by using the go-ethereum Whisper client API and connect to a local Geth node over WebSocket at the default port number 8546.
- Then, we call NewKeyPair to get the private key with keyID.
After that, we get the message using the private key. Here is a subscribe message code sample:
client, err := shhclient.Dial("ws://127.0.0.1:8546") keyID, err := client.NewKeyPair(context.Background()) messages := make(chan *whisperv6.Message) criteria := whisperv6.Criteria{ PrivateKeyID: keyID, } sub, err := client.SubscribeMessages(context.Background(), criteria, messages go func() { for { select { .. case message := <-messages: fmt.Printf(string(message.Payload)) // "Hello Whisper" os.Exit(0) } } }() ...
Whisper nodes use the devp2p Wire protocol for P2P communication. It is currently in the alpha stage. If you want to learn more, the API documentation can be found on the Whisper GitHub page (https://github.com/ethereum/wiki/wiki/Whisper). Now, we will have a look at popular smart contract libraries.
Next Article
In our next article (Review of Popular Ethereum Smart Contract Libraries), we review the most popular libraries for Ethereum smart contract development.
This article is written in collaboration with Brian Wu who is a leading author of “Learn Ethereum: Build your own decentralized applications with Ethereum and smart contracts” book. He has written 7 books on blockchain development.
Resources
Free Webinars on Blockchain
Here is the list of our free webinars that are highly recommended:
- Hyperledger Fabric for system admin versus developers
- How to harness blockchain for environmental and corporate sustainability
- Review of Initial Coin Offering, Security Token Offering and asset tokenization use cases and best practices
- Hyperledger Fabric Deployment on Cloud
- Hyperledger Fabric for entrepreneurship- 21 blockchain business use cases
Free Courses
Here is the list of our 10 free self-paced courses that are highly recommended:
- IT Career Roadmap Explained
- Web Design with Bootstrap
- User Experience Best Practices
- Intro to Search Engine Optimization
- Web Design with WordPress
- Introduction to Drupal CMS
- Intro to Joomla CMS
- Intro to Cybersecurity
- Introduction to Cloud Technology
- Recorded Live Webinars and Classes
Self-Paced Blockchain Courses
If you like to learn more about Hyperledger Fabric, Hyperledger Sawtooth, Ethereum or Corda, taking the following self-paced classes is highly recommended:
- Intro to Blockchain Technology
- Blockchain Management in Hyperledger for System Admins
- Hyperledger Fabric for Developers
- Intro to Blockchain Cybersecurity
- Learn Solidity Programming by Examples
- Introduction to Ethereum Blockchain Development
- Learn Blockchain Dev with Corda R3
- Intro to Hyperledger Sawtooth for System Admins
Live Blockchain Courses
If you want to master Hyperledger Fabric, Ethereum or Corda, taking the following live classes is highly recommended:
- Live and self-paced blockchain development with Ethereum
- Live and self-paced blockchain development with Hyperledger Fabric
- Live and self-paced blockchain development with Corda
- Immersive Blockchain Bootcamp with live and self-paced courses
- Live crash course for learning Ethereum with Solidity
- Live crash course for building DApps with Hyperledger Fabric
- Live crash course for building DApps with Corda
- Live full-stack blockchain development in Hyperledger and Ethereum
Articles and Tutorials on Blockchain Technology
If you like to learn more about blockchain technology and how it works, reading the following articles is highly recommended:
- History and Evolution of Blockchain Technology from Bitcoin
- Overview of Blockchain evolution and phases from Ethereum to Hyperledger
- Comprehensive overview and analysis of blockchain use cases in many industries
- Blockchain Crowdfunding Security Token or Initial Coin Offerings
- A beginner Guide to Blockchain Technology
- How Decentralized Peer-To-Peer Network Works
- How blocks are added to the blockchain
- How Public and Private Keys of Cryptography Work
- What Is A Cryptographic Hash Function
- How Digital Signature Works In Blockchain
- The role and types of consensus mechanism in blockchain
- How Proof-of-Work Consensus Works in Blockchain
- How Proof of Stake Consensus works in Blockchain
Articles and Tutorials on Ethereum and Solidity
If you like to learn more about blockchain development in Ethereum with Solidity, reading the following articles and tutorials is highly recommended:
- Review of Architecture and Components of Ethereum
- Comprehensive Blockchain Ethereum Developer Guide from Beginner to Advance Level
- How to Write Ethereum Smart Contracts with Solidity in 1 hour
- Review of Architecture and Components of Ethereum
- How Ethereum Manages Accounts
- How Ethereum Manages Transactions
- How Smart Contracts Work in Ethereum
- How Ether and Gas Work in Ethereum
- How Ethereum Virtual Machine works
- How address and wallet work in Ethereum
- How mining works in Ethereum
- List of Tools and Technologies in Ethereum Ecosystem
- Review of challenges in distributed systems
- Review of Cap Theorem in Distributed Systems
- Horizontal Scaling versus Vertical Scaling in Distributed Systems
- How to Scale up Ethereum Blockchain Applications
- Review of scaling solutions for Ethereum
- How to Manage Ethereum State Channel with Raiden
- How Plasma Chains Work in Ethereum
- How Sharding and Gasper work in Ethereum
- How Proof-of-Stack Consensus Works in Ethereum
- A roadmap for Implementing Ethereum 2.0
- How to work with Decentralized Data and Content Storage in Ethereum
- How Decentralized Messaging with Whisper Works in Ethereum
- Review of Infura for Ethereum Development
- Review of Infura Ethereum API
- How to Use Remix with Infura for Ethereum Development
- How Ethereum Client API Works
- How Ethereum IPFS Storage Works
- How to Install and Start Ethereum IPFS Storage
- How to Run Ethereum IPFS Storage
- How to Work with Ethereum Swarm Storage
- How to Install Ethereum Swarm Storage
- How to Handle Ethereum Messages with Whisper
- Review of Popular Ethereum Smart Contract Libraries
- Review of Private and Permissioned blockchain
- How to Set up a Local Private Ethereum Blockchain
- How to Run Geth on a Local Private Ethereum Blockchain
- How to Build a Local Private Ethereum Blockchain with Mining
- How to Run Geth on a Local Private Ethereum Blockchain with Mining
- How to Create an Account on a Local Private Ethereum Blockchain
- How to Use Ethereum Optional Flags with New Chains
- Review of Ethereum Options for Development and Testing
- Review of Ethereum Developer Chain Options
- Review of Ethereum API and Console Options
- Review of Ethereum Networking Options
- Review of Ethereum Transaction Pool Options
Articles and Tutorials on Hyperledger Family
If you like to learn more about blockchain development with Hyperledger, reading the following articles and tutorials is highly recommended:
- Introduction to Hyperledger Architecture, Projects, Tools and Libraries
- Complete Review of Hyperledger Fabric Architecture and Components
- Hyperledger Fabric for System Administers versus Developers
- How to use Prometheus and Grafana to monitor Hyperledger Fabric
- Blockchain Developer Guide- How to Install Hyperledger Fabric on AWS
- Blockchain Developer Guide- How to Install and work with Hyperledger Sawtooth
- Blockchain Developer Guide- How to Install Hyperledger Burrow on AWS
- Blockchain Developer Guide- How to Install Hyperledger Iroha on AWS
- Blockchain Developer Guide- How to Install Hyperledger Indy and Indy CLI on AWS
- Blockchain Developer Guide- How to Install Hyperledger Seth and Docker on AWS
- Blockchain Developer Guide- How to Configure Hyperledger Sawtooth Validator and REST API on AWS
- Blockchain Developer Guide- How to Build Transaction Processor as a Service and Python Egg for Hyperledger Sawtooth
- Blockchain Developer Guide- How to Deploy Ethereum Smart Contracts with Hyperledger Burrow
- Blockchain Developer Guide- How to Create Cryptocurrency Using Hyperledger Iroha CLI
- Blockchain Developer Guide- How to Explore Hyperledger Indy Command Line Interface
- Blockchain Developer Guide- Comprehensive Blockchain Hyperledger Developer Guide from Beginner to Advance Level
- Introduction to Hyperledger Sawtooth Blockchain Development
Articles and Tutorials on R3 Corda
If you like to learn more about blockchain development on Corda , reading the following articles and tutorials is highly recommended:
Articles and Tutorials on Other Blockchain Platforms
If you like to learn more about blockchain development in other platforms, reading the following articles and tutorials is highly recommended: