SlideShare a Scribd company logo
1 of 20
BlockChain
Author: Nikhil M Dhokale
 Overview
 Use Cases ripe for disruption
 Consensus Algorithm: Proof of Work
Agenda
Overview: Traditional Approach
Repository
(Centralized
Ledger)
App
AppApp
App
App App
Org is
Custodian
& Trustee
Firewall
Firewall
Heloc
Mortgage
ReFi
Auto Loan
Overview: Distributed - Peer to Peer Approach
App
App
App
App
App
App
No Single
Custodian
or Trustee
Heloc
Mortgage
ReFi
Auto Loan
Heloc
Mortgage
ReFi
Auto Loan
Trusted Actors
Malicious Actors
Distributed
Ledger
The objective is to ensure that the transactions are faithfully and
consistently recorded by all data nodes. The accuracy and validity of
the transactions themselves is not at question.
Heloc
Mortgage
ReFi
Auto Loan
Heloc
Mortgage
ReFi
Auto Loan
Heloc
Mortgage
ReFi
Auto Loan
Heloc
Mortgage
ReFi
Auto Loan
Heloc
Mortgage
ReFi
Auto Loan
Overview: BlockChain
App App
Trusted Actors
Malicious Actors
Distributed
Ledger
TX0-1
TX0-2
TX0-3
TX0-4
TX1-1
TX1-2
TX1-3
TX1-4
TX2-1
TX2-2
TX2-3
TX2-4
TX3-1
TX3-2
TX3-3
TX3-4
App
App AppApp
Immutable Record
Node 0 Node 2Node 1 Node 3
Use Cases : AML KYC Customer Hub
Chase
Address
Update
BMO Harris
Name
Update
BofA
Marital Status
Update
HSBC
DOB
Correction
DMV
Address
Change
BMO Harris
New
Mortgage
Use Cases : Title Ownership
Chase
New
Mortgage
Coldwell
Banker
Sale
WellsFargo
Bankruptcy
Dupage
County
New Parcel
Dupage
County
Destroy
Parcel
BofA
Lien Hold
Use Cases : Driving Record
AllState
Claim Open
DMV
Purge
Naperville
Police
Traffic Stop
Lisle Police
Car Accident
Geico
Claim
Denied
Warreville
Police
Car Theft
Use Cases : Books without Borders Library
Naperville
Issued
Lisle
Returned
Downers
Grove
Extended
Warrenville
Late (Fee)
Lemont
Reissued(1)
Chicago
Hold
Use Cases : Mobile Telephone Registry
TMobile
Assign
Verizon
PortOut
Cricket
PortIn
AT&T
Reclaim
Xfinity
Hold
Sprint
Release
Appendix
Consensus Algorithm : Byzantine Generals Problem
General
Loyal
Traitors
Enemy
General
General
General
Y – ATTACK
N- STAY PUT
Problem Statement: The enemy can be defeated
only if ALL loyal generals ATTACK.
Even if 1 loyal General STAYS PUT the enemy will
not be defeated.
So the objective is to make sure that all loyal
generals either ATTACK (Victory) or STAY PUT
(No loss).
The protocol used to achieve the above
agreement is called Consensus Algorithm.
This Consensus Algorithm works iff the # (Traitor Generals) < 1/3 (Total
Generals)
Consensus Algorithm : Byzantine Generals Problem
General
Loyal
Traitors
Enemy
General
General
General
Y – ATTACK
N- STAY PUT
Problem Statement: The enemy can be defeated
only if ALL loyal generals ATTACK.
Even if 1 loyal General STAYS PUT the enemy will
not be defeated.
So the objective is to make sure that all loyal
generals either ATTACK (Victory) or STAY PUT
(No loss).
The protocol used to achieve the above
agreement is called Consensus Algorithm.
Y
Y
Y
Y,Y,Y
N,Y,Y
N,Y,Y
This Consensus Algorithm works iff the # (Traitor Generals) < 1/3 (Total
Generals)
Key Components of Implementing BlockChain
Consensus Algorithms Cryptographic Hashing
 Consensus Algorithms are
how the Peers on BlockChain
agree on the next node being
added to the chain.
 There are several methods for
achieving consensus across a
cluster of nodes.
 Proof of Work – Hard
Problem
 Proof of Stake
 Proof of Weight
 Hashing refers to the process
of obfuscating data and
generating a unique string of
a predefined length
Hard Problem Concept (Spamming use-case)
Chat4 Chat6
Trusted Actors
Malicious Actors
Chat5
Chat1 Chat3Chat2
Chat Server
Hard Problem - 5ms Hard Problem - 5ms Hard Problem - 5ms
Hard Problem - 5ms Hard Problem - 5ms Hard Problem - 5ms
Have every client
solve a hard
problem (that
takes 5ms) before
posting to the
server.
This approach
disincentives
spammers as there
is per message
cost of using
energy resources
to solve the
problem.
Refresher on Binary & Hexadecimal Numbers
 Binary Numbers : 0,1
 Each binary digit is called a bit
 1 byte is made up of 8 bits e.g.
00001111
 1 hexadecimal (hex for short
is made up of 4 bits) e.g. 0011
Hexadecimal Code 4 bit binary number
0 0000
1 0001
2 0010
3 0011
4 0100
5 0101
6 0110
7 0111
8 1000
9 1001
A 1010
B 1011
C 1100
D 1101
E 1110
F 1111
 SHA256: Is a one-way hash function that takes a text of any length
and converts it into a 256 bit code (64 digit hex code)
 Deterministic: The same 64 digit hex code is generated for the
same text
 Unique: The probability that two different texts will share the
same 64 digit hex code is very very very low. So it generates a
unique signature for a given text.
 Random: There is no way to predict the output of a given string.
(i.e. SHA(x) and SHA(k|x) looks entirely different for k chosen
from a high entropy set)
 Universally Available: The implementation of this algorithm is
widely & publicly available
Consensus Algorithm : SHA Hash Function
 The idea is to find a problem that is hard to solve but can be easily &
independently verified by others.
 Problem statement: Given a string “XXXX” find a substring “YY” to append
such that the SHA hash code generated is less than 16^N for a given N.
 For e.g. for 64 digit SHA function:
 SHA64(XXXXYY) < 0000,FFFF,FFFF,FFFF (16^12) for N = 12 (smaller the N
the more difficult the problem becomes to ensure the desired number of
prepended zeros. For 4 zeros probability is: (1/16)^4 x (15/16)^12 == 8.132 *
10^-19)
 Given that “XXXX” & N are known, once “YY” is provided, it can be easily &
independently verified by others that it solves the problem
 In Proof of Work parlance: N is called the target and “YY” is called the nonce.
Consensus Algorithm : Hard Problem
Consensus Algorithm : Proof of Work
App App App
__
____
TX0-1
TX0-2
TX0-3
TX0-4
Trusted Actors
Malicious Actors
Node : 0
SHA16=XoXoXoXo
YoYo
XoXoXoXo
TX1-1
TX1-2
TX1-3
TX1-4
Node : 1
SHA16=X1X1X1X1
Nonce=YoYo
Y1Y1
X1X1X1X1
TX2-1
TX2-2
TX2-3
TX2-4
Node : 2
SHA16=X2X2X2X2
Nonce=Y1Y1
Y2Y2
X2X2X2X2
TX3-1
TX3-2
TX3-3
TX3-4
Node : 3
SHA16=X3X3X3X3
Nonce=Y2Y2
App App App App
Y3Y3
X3X3X3X3
TX4-1
TX4-2
TX4-3
TX4-4
Node : 4
SHA16=X4X4X4X
4
Nonce=Y3Y3
X = Previous Node Hash
Y = nonce
TX = Transactions
App App
Hard Problem:
SHA16(XXXXYY) < 0ABC (N=3)
Node1 : SHA16(X0X10X0X0,TX1s):YoYo
Node2 : SHA16(SHA16(X0X10X0X0+TX1s,YoYo),TX2s) :Y1Y1
Node3 : SHA16(SHA16(SHA16(X0X10X0X0+TX1s,YoYo),TX2s,Y1Y1),TX3s):Y2Y2
Node4: SHA16(SHA16(SHA16(SHA16(X0X10X0X0+TX1s,YoYo),TX2s,Y1Y1),TX3s),Y2Y2, TX4s) :Y3Y332
Block
Chain
App
Energy consumed
by BitCoin
BlockChain is
comparable to
the Energy
Consumption of
Denmark. We are
talking about
machines with
PetaBytes (10^12)
/Sec computing
power.
BlockChain Picture

More Related Content

What's hot

Cryptographic Hashing Functions
Cryptographic Hashing FunctionsCryptographic Hashing Functions
Cryptographic Hashing FunctionsYusuf Uzun
 
Information and data security cryptographic hash functions
Information and data security cryptographic hash functionsInformation and data security cryptographic hash functions
Information and data security cryptographic hash functionsMazin Alwaaly
 
01204427-Hash_Crypto (1).ppt
01204427-Hash_Crypto (1).ppt01204427-Hash_Crypto (1).ppt
01204427-Hash_Crypto (1).pptGnanalakshmiV
 
A New Modified Version of Caser Cipher Algorithm
A New Modified Version of Caser Cipher AlgorithmA New Modified Version of Caser Cipher Algorithm
A New Modified Version of Caser Cipher AlgorithmIJERD Editor
 
Hash Function & Analysis
Hash Function & AnalysisHash Function & Analysis
Hash Function & AnalysisPawandeep Kaur
 
Cryptography Ashik
Cryptography AshikCryptography Ashik
Cryptography AshikAshik Iqbal
 
Enhancing security in cloud storage
Enhancing security in cloud storageEnhancing security in cloud storage
Enhancing security in cloud storageShivam Singh
 
Public Key Encryption & Hash functions
Public Key Encryption & Hash functionsPublic Key Encryption & Hash functions
Public Key Encryption & Hash functionsDr.Florence Dayana
 
Rsa and diffie hellman algorithms
Rsa and diffie hellman algorithmsRsa and diffie hellman algorithms
Rsa and diffie hellman algorithmsdaxesh chauhan
 
Message Authentication using Message Digests and the MD5 Algorithm
Message Authentication using Message Digests and the MD5 AlgorithmMessage Authentication using Message Digests and the MD5 Algorithm
Message Authentication using Message Digests and the MD5 AlgorithmAjay Karri
 
White Paper on Cryptography
White Paper on Cryptography White Paper on Cryptography
White Paper on Cryptography Durgesh Malviya
 
The MD5 hashing algorithm
The MD5 hashing algorithmThe MD5 hashing algorithm
The MD5 hashing algorithmBob Landstrom
 

What's hot (20)

Cryptographic Hashing Functions
Cryptographic Hashing FunctionsCryptographic Hashing Functions
Cryptographic Hashing Functions
 
Information and data security cryptographic hash functions
Information and data security cryptographic hash functionsInformation and data security cryptographic hash functions
Information and data security cryptographic hash functions
 
ma92008id393
ma92008id393ma92008id393
ma92008id393
 
01204427-Hash_Crypto (1).ppt
01204427-Hash_Crypto (1).ppt01204427-Hash_Crypto (1).ppt
01204427-Hash_Crypto (1).ppt
 
A New Modified Version of Caser Cipher Algorithm
A New Modified Version of Caser Cipher AlgorithmA New Modified Version of Caser Cipher Algorithm
A New Modified Version of Caser Cipher Algorithm
 
Hash Function & Analysis
Hash Function & AnalysisHash Function & Analysis
Hash Function & Analysis
 
Cryptography Ashik
Cryptography AshikCryptography Ashik
Cryptography Ashik
 
Enhancing security in cloud storage
Enhancing security in cloud storageEnhancing security in cloud storage
Enhancing security in cloud storage
 
Hashing
HashingHashing
Hashing
 
MD5Algorithm
MD5AlgorithmMD5Algorithm
MD5Algorithm
 
Cryptographic hash function md5
Cryptographic hash function md5Cryptographic hash function md5
Cryptographic hash function md5
 
Public Key Encryption & Hash functions
Public Key Encryption & Hash functionsPublic Key Encryption & Hash functions
Public Key Encryption & Hash functions
 
Rsa and diffie hellman algorithms
Rsa and diffie hellman algorithmsRsa and diffie hellman algorithms
Rsa and diffie hellman algorithms
 
The Double Ratchet Algorithm
The Double Ratchet AlgorithmThe Double Ratchet Algorithm
The Double Ratchet Algorithm
 
Unit 2
Unit  2Unit  2
Unit 2
 
Unit 3
Unit 3Unit 3
Unit 3
 
Message Authentication using Message Digests and the MD5 Algorithm
Message Authentication using Message Digests and the MD5 AlgorithmMessage Authentication using Message Digests and the MD5 Algorithm
Message Authentication using Message Digests and the MD5 Algorithm
 
White Paper on Cryptography
White Paper on Cryptography White Paper on Cryptography
White Paper on Cryptography
 
Message Authentication
Message AuthenticationMessage Authentication
Message Authentication
 
The MD5 hashing algorithm
The MD5 hashing algorithmThe MD5 hashing algorithm
The MD5 hashing algorithm
 

Similar to BlockChain Overview

Blockchain - a formal introduction
Blockchain - a formal introductionBlockchain - a formal introduction
Blockchain - a formal introductionSander Demeester
 
Klaytn: Service-Oriented Enterprise-Grade Public Blockchain Platform
Klaytn: Service-Oriented Enterprise-Grade Public Blockchain PlatformKlaytn: Service-Oriented Enterprise-Grade Public Blockchain Platform
Klaytn: Service-Oriented Enterprise-Grade Public Blockchain Platformif kakao
 
Go Reactive: Event-Driven, Scalable, Resilient & Responsive Systems
Go Reactive: Event-Driven, Scalable, Resilient & Responsive SystemsGo Reactive: Event-Driven, Scalable, Resilient & Responsive Systems
Go Reactive: Event-Driven, Scalable, Resilient & Responsive SystemsJonas Bonér
 
A survey on_po_w_based_consensus
A survey on_po_w_based_consensusA survey on_po_w_based_consensus
A survey on_po_w_based_consensusJorge Eterovic
 
To allot secrecy-safe association rules mining schema using FP tree
To allot secrecy-safe association rules mining schema using FP treeTo allot secrecy-safe association rules mining schema using FP tree
To allot secrecy-safe association rules mining schema using FP treeUvaraj Shan
 
[cb22] SMARTIAN: Enhancing Smart Contract Fuzzing with Static and Dynamic Da...
[cb22]  SMARTIAN: Enhancing Smart Contract Fuzzing with Static and Dynamic Da...[cb22]  SMARTIAN: Enhancing Smart Contract Fuzzing with Static and Dynamic Da...
[cb22] SMARTIAN: Enhancing Smart Contract Fuzzing with Static and Dynamic Da...CODE BLUE
 
Models and approaches for Differential Power Analysis
Models and approaches for Differential Power AnalysisModels and approaches for Differential Power Analysis
Models and approaches for Differential Power AnalysisAndrej Šimko
 
Building Reliable Cloud Storage with Riak and CloudStack - Andy Gross, Chief ...
Building Reliable Cloud Storage with Riak and CloudStack - Andy Gross, Chief ...Building Reliable Cloud Storage with Riak and CloudStack - Andy Gross, Chief ...
Building Reliable Cloud Storage with Riak and CloudStack - Andy Gross, Chief ...buildacloud
 
Exploiting tls to disrupt privacy of web application's traffic
Exploiting tls to disrupt privacy of web application's trafficExploiting tls to disrupt privacy of web application's traffic
Exploiting tls to disrupt privacy of web application's trafficSandipan Biswas
 
QuillAudit Smart contracts audit ppt - https://audits.quillhash.com
QuillAudit Smart contracts audit ppt - https://audits.quillhash.comQuillAudit Smart contracts audit ppt - https://audits.quillhash.com
QuillAudit Smart contracts audit ppt - https://audits.quillhash.comPreetam Rao
 
Approximation Data Structures for Streaming Applications
Approximation Data Structures for Streaming ApplicationsApproximation Data Structures for Streaming Applications
Approximation Data Structures for Streaming ApplicationsDebasish Ghosh
 
High-speed, Reactive Microservices 2017
High-speed, Reactive Microservices 2017High-speed, Reactive Microservices 2017
High-speed, Reactive Microservices 2017Rick Hightower
 
Malicious Hashing: Eve’s Variant of SHA-1
Malicious Hashing: Eve’s Variant of SHA-1Malicious Hashing: Eve’s Variant of SHA-1
Malicious Hashing: Eve’s Variant of SHA-1Ange Albertini
 
Cryptographic Protocols: Practical revocation and key rotation
Cryptographic Protocols: Practical revocation and key rotationCryptographic Protocols: Practical revocation and key rotation
Cryptographic Protocols: Practical revocation and key rotationPriyanka Aash
 
A Genetic Algorithm for Reliability Evaluation of a Stochastic-Flow Network w...
A Genetic Algorithm for Reliability Evaluation of a Stochastic-Flow Network w...A Genetic Algorithm for Reliability Evaluation of a Stochastic-Flow Network w...
A Genetic Algorithm for Reliability Evaluation of a Stochastic-Flow Network w...CSCJournals
 
WWX14 speech : Justin Donaldson "Promhx : Cross-platform Promises and Reactiv...
WWX14 speech : Justin Donaldson "Promhx : Cross-platform Promises and Reactiv...WWX14 speech : Justin Donaldson "Promhx : Cross-platform Promises and Reactiv...
WWX14 speech : Justin Donaldson "Promhx : Cross-platform Promises and Reactiv...antopensource
 
Cryptography Key Management.pptx
Cryptography Key Management.pptxCryptography Key Management.pptx
Cryptography Key Management.pptxSurendraBasnet6
 

Similar to BlockChain Overview (20)

Blockchain - a formal introduction
Blockchain - a formal introductionBlockchain - a formal introduction
Blockchain - a formal introduction
 
Klaytn: Service-Oriented Enterprise-Grade Public Blockchain Platform
Klaytn: Service-Oriented Enterprise-Grade Public Blockchain PlatformKlaytn: Service-Oriented Enterprise-Grade Public Blockchain Platform
Klaytn: Service-Oriented Enterprise-Grade Public Blockchain Platform
 
HASH FUNCTIONS.pdf
HASH FUNCTIONS.pdfHASH FUNCTIONS.pdf
HASH FUNCTIONS.pdf
 
Go Reactive: Event-Driven, Scalable, Resilient & Responsive Systems
Go Reactive: Event-Driven, Scalable, Resilient & Responsive SystemsGo Reactive: Event-Driven, Scalable, Resilient & Responsive Systems
Go Reactive: Event-Driven, Scalable, Resilient & Responsive Systems
 
A survey on_po_w_based_consensus
A survey on_po_w_based_consensusA survey on_po_w_based_consensus
A survey on_po_w_based_consensus
 
To allot secrecy-safe association rules mining schema using FP tree
To allot secrecy-safe association rules mining schema using FP treeTo allot secrecy-safe association rules mining schema using FP tree
To allot secrecy-safe association rules mining schema using FP tree
 
[cb22] SMARTIAN: Enhancing Smart Contract Fuzzing with Static and Dynamic Da...
[cb22]  SMARTIAN: Enhancing Smart Contract Fuzzing with Static and Dynamic Da...[cb22]  SMARTIAN: Enhancing Smart Contract Fuzzing with Static and Dynamic Da...
[cb22] SMARTIAN: Enhancing Smart Contract Fuzzing with Static and Dynamic Da...
 
Models and approaches for Differential Power Analysis
Models and approaches for Differential Power AnalysisModels and approaches for Differential Power Analysis
Models and approaches for Differential Power Analysis
 
Building Reliable Cloud Storage with Riak and CloudStack - Andy Gross, Chief ...
Building Reliable Cloud Storage with Riak and CloudStack - Andy Gross, Chief ...Building Reliable Cloud Storage with Riak and CloudStack - Andy Gross, Chief ...
Building Reliable Cloud Storage with Riak and CloudStack - Andy Gross, Chief ...
 
AI: Belief Networks
AI: Belief NetworksAI: Belief Networks
AI: Belief Networks
 
AI: Belief Networks
AI: Belief NetworksAI: Belief Networks
AI: Belief Networks
 
Exploiting tls to disrupt privacy of web application's traffic
Exploiting tls to disrupt privacy of web application's trafficExploiting tls to disrupt privacy of web application's traffic
Exploiting tls to disrupt privacy of web application's traffic
 
QuillAudit Smart contracts audit ppt - https://audits.quillhash.com
QuillAudit Smart contracts audit ppt - https://audits.quillhash.comQuillAudit Smart contracts audit ppt - https://audits.quillhash.com
QuillAudit Smart contracts audit ppt - https://audits.quillhash.com
 
Approximation Data Structures for Streaming Applications
Approximation Data Structures for Streaming ApplicationsApproximation Data Structures for Streaming Applications
Approximation Data Structures for Streaming Applications
 
High-speed, Reactive Microservices 2017
High-speed, Reactive Microservices 2017High-speed, Reactive Microservices 2017
High-speed, Reactive Microservices 2017
 
Malicious Hashing: Eve’s Variant of SHA-1
Malicious Hashing: Eve’s Variant of SHA-1Malicious Hashing: Eve’s Variant of SHA-1
Malicious Hashing: Eve’s Variant of SHA-1
 
Cryptographic Protocols: Practical revocation and key rotation
Cryptographic Protocols: Practical revocation and key rotationCryptographic Protocols: Practical revocation and key rotation
Cryptographic Protocols: Practical revocation and key rotation
 
A Genetic Algorithm for Reliability Evaluation of a Stochastic-Flow Network w...
A Genetic Algorithm for Reliability Evaluation of a Stochastic-Flow Network w...A Genetic Algorithm for Reliability Evaluation of a Stochastic-Flow Network w...
A Genetic Algorithm for Reliability Evaluation of a Stochastic-Flow Network w...
 
WWX14 speech : Justin Donaldson "Promhx : Cross-platform Promises and Reactiv...
WWX14 speech : Justin Donaldson "Promhx : Cross-platform Promises and Reactiv...WWX14 speech : Justin Donaldson "Promhx : Cross-platform Promises and Reactiv...
WWX14 speech : Justin Donaldson "Promhx : Cross-platform Promises and Reactiv...
 
Cryptography Key Management.pptx
Cryptography Key Management.pptxCryptography Key Management.pptx
Cryptography Key Management.pptx
 

Recently uploaded

SAC 25 Final National, Regional & Local Angel Group Investing Insights 2024 0...
SAC 25 Final National, Regional & Local Angel Group Investing Insights 2024 0...SAC 25 Final National, Regional & Local Angel Group Investing Insights 2024 0...
SAC 25 Final National, Regional & Local Angel Group Investing Insights 2024 0...Elaine Werffeli
 
Predicting HDB Resale Prices - Conducting Linear Regression Analysis With Orange
Predicting HDB Resale Prices - Conducting Linear Regression Analysis With OrangePredicting HDB Resale Prices - Conducting Linear Regression Analysis With Orange
Predicting HDB Resale Prices - Conducting Linear Regression Analysis With OrangeThinkInnovation
 
Jual Cytotec Asli Obat Aborsi No. 1 Paling Manjur
Jual Cytotec Asli Obat Aborsi No. 1 Paling ManjurJual Cytotec Asli Obat Aborsi No. 1 Paling Manjur
Jual Cytotec Asli Obat Aborsi No. 1 Paling Manjurptikerjasaptiker
 
PLE-statistics document for primary schs
PLE-statistics document for primary schsPLE-statistics document for primary schs
PLE-statistics document for primary schscnajjemba
 
怎样办理圣路易斯大学毕业证(SLU毕业证书)成绩单学校原版复制
怎样办理圣路易斯大学毕业证(SLU毕业证书)成绩单学校原版复制怎样办理圣路易斯大学毕业证(SLU毕业证书)成绩单学校原版复制
怎样办理圣路易斯大学毕业证(SLU毕业证书)成绩单学校原版复制vexqp
 
一比一原版(曼大毕业证书)曼尼托巴大学毕业证成绩单留信学历认证一手价格
一比一原版(曼大毕业证书)曼尼托巴大学毕业证成绩单留信学历认证一手价格一比一原版(曼大毕业证书)曼尼托巴大学毕业证成绩单留信学历认证一手价格
一比一原版(曼大毕业证书)曼尼托巴大学毕业证成绩单留信学历认证一手价格q6pzkpark
 
Jual Obat Aborsi Surabaya ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Surabaya ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Surabaya ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Surabaya ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...ZurliaSoop
 
Top profile Call Girls In Vadodara [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Vadodara [ 7014168258 ] Call Me For Genuine Models ...Top profile Call Girls In Vadodara [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Vadodara [ 7014168258 ] Call Me For Genuine Models ...gajnagarg
 
Top profile Call Girls In dimapur [ 7014168258 ] Call Me For Genuine Models W...
Top profile Call Girls In dimapur [ 7014168258 ] Call Me For Genuine Models W...Top profile Call Girls In dimapur [ 7014168258 ] Call Me For Genuine Models W...
Top profile Call Girls In dimapur [ 7014168258 ] Call Me For Genuine Models W...gajnagarg
 
Top profile Call Girls In bhavnagar [ 7014168258 ] Call Me For Genuine Models...
Top profile Call Girls In bhavnagar [ 7014168258 ] Call Me For Genuine Models...Top profile Call Girls In bhavnagar [ 7014168258 ] Call Me For Genuine Models...
Top profile Call Girls In bhavnagar [ 7014168258 ] Call Me For Genuine Models...gajnagarg
 
Top profile Call Girls In Bihar Sharif [ 7014168258 ] Call Me For Genuine Mod...
Top profile Call Girls In Bihar Sharif [ 7014168258 ] Call Me For Genuine Mod...Top profile Call Girls In Bihar Sharif [ 7014168258 ] Call Me For Genuine Mod...
Top profile Call Girls In Bihar Sharif [ 7014168258 ] Call Me For Genuine Mod...nirzagarg
 
Data Analyst Tasks to do the internship.pdf
Data Analyst Tasks to do the internship.pdfData Analyst Tasks to do the internship.pdf
Data Analyst Tasks to do the internship.pdftheeltifs
 
Ranking and Scoring Exercises for Research
Ranking and Scoring Exercises for ResearchRanking and Scoring Exercises for Research
Ranking and Scoring Exercises for ResearchRajesh Mondal
 
Top profile Call Girls In Chandrapur [ 7014168258 ] Call Me For Genuine Model...
Top profile Call Girls In Chandrapur [ 7014168258 ] Call Me For Genuine Model...Top profile Call Girls In Chandrapur [ 7014168258 ] Call Me For Genuine Model...
Top profile Call Girls In Chandrapur [ 7014168258 ] Call Me For Genuine Model...gajnagarg
 
Top profile Call Girls In Hapur [ 7014168258 ] Call Me For Genuine Models We ...
Top profile Call Girls In Hapur [ 7014168258 ] Call Me For Genuine Models We ...Top profile Call Girls In Hapur [ 7014168258 ] Call Me For Genuine Models We ...
Top profile Call Girls In Hapur [ 7014168258 ] Call Me For Genuine Models We ...nirzagarg
 
怎样办理伦敦大学城市学院毕业证(CITY毕业证书)成绩单学校原版复制
怎样办理伦敦大学城市学院毕业证(CITY毕业证书)成绩单学校原版复制怎样办理伦敦大学城市学院毕业证(CITY毕业证书)成绩单学校原版复制
怎样办理伦敦大学城市学院毕业证(CITY毕业证书)成绩单学校原版复制vexqp
 
怎样办理旧金山城市学院毕业证(CCSF毕业证书)成绩单学校原版复制
怎样办理旧金山城市学院毕业证(CCSF毕业证书)成绩单学校原版复制怎样办理旧金山城市学院毕业证(CCSF毕业证书)成绩单学校原版复制
怎样办理旧金山城市学院毕业证(CCSF毕业证书)成绩单学校原版复制vexqp
 
Lecture_2_Deep_Learning_Overview-newone1
Lecture_2_Deep_Learning_Overview-newone1Lecture_2_Deep_Learning_Overview-newone1
Lecture_2_Deep_Learning_Overview-newone1ranjankumarbehera14
 
+97470301568>>weed for sale in qatar ,weed for sale in dubai,weed for sale in...
+97470301568>>weed for sale in qatar ,weed for sale in dubai,weed for sale in...+97470301568>>weed for sale in qatar ,weed for sale in dubai,weed for sale in...
+97470301568>>weed for sale in qatar ,weed for sale in dubai,weed for sale in...Health
 

Recently uploaded (20)

SAC 25 Final National, Regional & Local Angel Group Investing Insights 2024 0...
SAC 25 Final National, Regional & Local Angel Group Investing Insights 2024 0...SAC 25 Final National, Regional & Local Angel Group Investing Insights 2024 0...
SAC 25 Final National, Regional & Local Angel Group Investing Insights 2024 0...
 
Predicting HDB Resale Prices - Conducting Linear Regression Analysis With Orange
Predicting HDB Resale Prices - Conducting Linear Regression Analysis With OrangePredicting HDB Resale Prices - Conducting Linear Regression Analysis With Orange
Predicting HDB Resale Prices - Conducting Linear Regression Analysis With Orange
 
Jual Cytotec Asli Obat Aborsi No. 1 Paling Manjur
Jual Cytotec Asli Obat Aborsi No. 1 Paling ManjurJual Cytotec Asli Obat Aborsi No. 1 Paling Manjur
Jual Cytotec Asli Obat Aborsi No. 1 Paling Manjur
 
PLE-statistics document for primary schs
PLE-statistics document for primary schsPLE-statistics document for primary schs
PLE-statistics document for primary schs
 
怎样办理圣路易斯大学毕业证(SLU毕业证书)成绩单学校原版复制
怎样办理圣路易斯大学毕业证(SLU毕业证书)成绩单学校原版复制怎样办理圣路易斯大学毕业证(SLU毕业证书)成绩单学校原版复制
怎样办理圣路易斯大学毕业证(SLU毕业证书)成绩单学校原版复制
 
一比一原版(曼大毕业证书)曼尼托巴大学毕业证成绩单留信学历认证一手价格
一比一原版(曼大毕业证书)曼尼托巴大学毕业证成绩单留信学历认证一手价格一比一原版(曼大毕业证书)曼尼托巴大学毕业证成绩单留信学历认证一手价格
一比一原版(曼大毕业证书)曼尼托巴大学毕业证成绩单留信学历认证一手价格
 
Sequential and reinforcement learning for demand side management by Margaux B...
Sequential and reinforcement learning for demand side management by Margaux B...Sequential and reinforcement learning for demand side management by Margaux B...
Sequential and reinforcement learning for demand side management by Margaux B...
 
Jual Obat Aborsi Surabaya ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Surabaya ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Surabaya ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Surabaya ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
Top profile Call Girls In Vadodara [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Vadodara [ 7014168258 ] Call Me For Genuine Models ...Top profile Call Girls In Vadodara [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Vadodara [ 7014168258 ] Call Me For Genuine Models ...
 
Top profile Call Girls In dimapur [ 7014168258 ] Call Me For Genuine Models W...
Top profile Call Girls In dimapur [ 7014168258 ] Call Me For Genuine Models W...Top profile Call Girls In dimapur [ 7014168258 ] Call Me For Genuine Models W...
Top profile Call Girls In dimapur [ 7014168258 ] Call Me For Genuine Models W...
 
Top profile Call Girls In bhavnagar [ 7014168258 ] Call Me For Genuine Models...
Top profile Call Girls In bhavnagar [ 7014168258 ] Call Me For Genuine Models...Top profile Call Girls In bhavnagar [ 7014168258 ] Call Me For Genuine Models...
Top profile Call Girls In bhavnagar [ 7014168258 ] Call Me For Genuine Models...
 
Top profile Call Girls In Bihar Sharif [ 7014168258 ] Call Me For Genuine Mod...
Top profile Call Girls In Bihar Sharif [ 7014168258 ] Call Me For Genuine Mod...Top profile Call Girls In Bihar Sharif [ 7014168258 ] Call Me For Genuine Mod...
Top profile Call Girls In Bihar Sharif [ 7014168258 ] Call Me For Genuine Mod...
 
Data Analyst Tasks to do the internship.pdf
Data Analyst Tasks to do the internship.pdfData Analyst Tasks to do the internship.pdf
Data Analyst Tasks to do the internship.pdf
 
Ranking and Scoring Exercises for Research
Ranking and Scoring Exercises for ResearchRanking and Scoring Exercises for Research
Ranking and Scoring Exercises for Research
 
Top profile Call Girls In Chandrapur [ 7014168258 ] Call Me For Genuine Model...
Top profile Call Girls In Chandrapur [ 7014168258 ] Call Me For Genuine Model...Top profile Call Girls In Chandrapur [ 7014168258 ] Call Me For Genuine Model...
Top profile Call Girls In Chandrapur [ 7014168258 ] Call Me For Genuine Model...
 
Top profile Call Girls In Hapur [ 7014168258 ] Call Me For Genuine Models We ...
Top profile Call Girls In Hapur [ 7014168258 ] Call Me For Genuine Models We ...Top profile Call Girls In Hapur [ 7014168258 ] Call Me For Genuine Models We ...
Top profile Call Girls In Hapur [ 7014168258 ] Call Me For Genuine Models We ...
 
怎样办理伦敦大学城市学院毕业证(CITY毕业证书)成绩单学校原版复制
怎样办理伦敦大学城市学院毕业证(CITY毕业证书)成绩单学校原版复制怎样办理伦敦大学城市学院毕业证(CITY毕业证书)成绩单学校原版复制
怎样办理伦敦大学城市学院毕业证(CITY毕业证书)成绩单学校原版复制
 
怎样办理旧金山城市学院毕业证(CCSF毕业证书)成绩单学校原版复制
怎样办理旧金山城市学院毕业证(CCSF毕业证书)成绩单学校原版复制怎样办理旧金山城市学院毕业证(CCSF毕业证书)成绩单学校原版复制
怎样办理旧金山城市学院毕业证(CCSF毕业证书)成绩单学校原版复制
 
Lecture_2_Deep_Learning_Overview-newone1
Lecture_2_Deep_Learning_Overview-newone1Lecture_2_Deep_Learning_Overview-newone1
Lecture_2_Deep_Learning_Overview-newone1
 
+97470301568>>weed for sale in qatar ,weed for sale in dubai,weed for sale in...
+97470301568>>weed for sale in qatar ,weed for sale in dubai,weed for sale in...+97470301568>>weed for sale in qatar ,weed for sale in dubai,weed for sale in...
+97470301568>>weed for sale in qatar ,weed for sale in dubai,weed for sale in...
 

BlockChain Overview

  • 2.  Overview  Use Cases ripe for disruption  Consensus Algorithm: Proof of Work Agenda
  • 3. Overview: Traditional Approach Repository (Centralized Ledger) App AppApp App App App Org is Custodian & Trustee Firewall Firewall Heloc Mortgage ReFi Auto Loan
  • 4. Overview: Distributed - Peer to Peer Approach App App App App App App No Single Custodian or Trustee Heloc Mortgage ReFi Auto Loan Heloc Mortgage ReFi Auto Loan Trusted Actors Malicious Actors Distributed Ledger The objective is to ensure that the transactions are faithfully and consistently recorded by all data nodes. The accuracy and validity of the transactions themselves is not at question. Heloc Mortgage ReFi Auto Loan Heloc Mortgage ReFi Auto Loan Heloc Mortgage ReFi Auto Loan Heloc Mortgage ReFi Auto Loan Heloc Mortgage ReFi Auto Loan
  • 5. Overview: BlockChain App App Trusted Actors Malicious Actors Distributed Ledger TX0-1 TX0-2 TX0-3 TX0-4 TX1-1 TX1-2 TX1-3 TX1-4 TX2-1 TX2-2 TX2-3 TX2-4 TX3-1 TX3-2 TX3-3 TX3-4 App App AppApp Immutable Record Node 0 Node 2Node 1 Node 3
  • 6. Use Cases : AML KYC Customer Hub Chase Address Update BMO Harris Name Update BofA Marital Status Update HSBC DOB Correction DMV Address Change BMO Harris New Mortgage
  • 7. Use Cases : Title Ownership Chase New Mortgage Coldwell Banker Sale WellsFargo Bankruptcy Dupage County New Parcel Dupage County Destroy Parcel BofA Lien Hold
  • 8. Use Cases : Driving Record AllState Claim Open DMV Purge Naperville Police Traffic Stop Lisle Police Car Accident Geico Claim Denied Warreville Police Car Theft
  • 9. Use Cases : Books without Borders Library Naperville Issued Lisle Returned Downers Grove Extended Warrenville Late (Fee) Lemont Reissued(1) Chicago Hold
  • 10. Use Cases : Mobile Telephone Registry TMobile Assign Verizon PortOut Cricket PortIn AT&T Reclaim Xfinity Hold Sprint Release
  • 12. Consensus Algorithm : Byzantine Generals Problem General Loyal Traitors Enemy General General General Y – ATTACK N- STAY PUT Problem Statement: The enemy can be defeated only if ALL loyal generals ATTACK. Even if 1 loyal General STAYS PUT the enemy will not be defeated. So the objective is to make sure that all loyal generals either ATTACK (Victory) or STAY PUT (No loss). The protocol used to achieve the above agreement is called Consensus Algorithm. This Consensus Algorithm works iff the # (Traitor Generals) < 1/3 (Total Generals)
  • 13. Consensus Algorithm : Byzantine Generals Problem General Loyal Traitors Enemy General General General Y – ATTACK N- STAY PUT Problem Statement: The enemy can be defeated only if ALL loyal generals ATTACK. Even if 1 loyal General STAYS PUT the enemy will not be defeated. So the objective is to make sure that all loyal generals either ATTACK (Victory) or STAY PUT (No loss). The protocol used to achieve the above agreement is called Consensus Algorithm. Y Y Y Y,Y,Y N,Y,Y N,Y,Y This Consensus Algorithm works iff the # (Traitor Generals) < 1/3 (Total Generals)
  • 14. Key Components of Implementing BlockChain Consensus Algorithms Cryptographic Hashing  Consensus Algorithms are how the Peers on BlockChain agree on the next node being added to the chain.  There are several methods for achieving consensus across a cluster of nodes.  Proof of Work – Hard Problem  Proof of Stake  Proof of Weight  Hashing refers to the process of obfuscating data and generating a unique string of a predefined length
  • 15. Hard Problem Concept (Spamming use-case) Chat4 Chat6 Trusted Actors Malicious Actors Chat5 Chat1 Chat3Chat2 Chat Server Hard Problem - 5ms Hard Problem - 5ms Hard Problem - 5ms Hard Problem - 5ms Hard Problem - 5ms Hard Problem - 5ms Have every client solve a hard problem (that takes 5ms) before posting to the server. This approach disincentives spammers as there is per message cost of using energy resources to solve the problem.
  • 16. Refresher on Binary & Hexadecimal Numbers  Binary Numbers : 0,1  Each binary digit is called a bit  1 byte is made up of 8 bits e.g. 00001111  1 hexadecimal (hex for short is made up of 4 bits) e.g. 0011 Hexadecimal Code 4 bit binary number 0 0000 1 0001 2 0010 3 0011 4 0100 5 0101 6 0110 7 0111 8 1000 9 1001 A 1010 B 1011 C 1100 D 1101 E 1110 F 1111
  • 17.  SHA256: Is a one-way hash function that takes a text of any length and converts it into a 256 bit code (64 digit hex code)  Deterministic: The same 64 digit hex code is generated for the same text  Unique: The probability that two different texts will share the same 64 digit hex code is very very very low. So it generates a unique signature for a given text.  Random: There is no way to predict the output of a given string. (i.e. SHA(x) and SHA(k|x) looks entirely different for k chosen from a high entropy set)  Universally Available: The implementation of this algorithm is widely & publicly available Consensus Algorithm : SHA Hash Function
  • 18.  The idea is to find a problem that is hard to solve but can be easily & independently verified by others.  Problem statement: Given a string “XXXX” find a substring “YY” to append such that the SHA hash code generated is less than 16^N for a given N.  For e.g. for 64 digit SHA function:  SHA64(XXXXYY) < 0000,FFFF,FFFF,FFFF (16^12) for N = 12 (smaller the N the more difficult the problem becomes to ensure the desired number of prepended zeros. For 4 zeros probability is: (1/16)^4 x (15/16)^12 == 8.132 * 10^-19)  Given that “XXXX” & N are known, once “YY” is provided, it can be easily & independently verified by others that it solves the problem  In Proof of Work parlance: N is called the target and “YY” is called the nonce. Consensus Algorithm : Hard Problem
  • 19. Consensus Algorithm : Proof of Work App App App __ ____ TX0-1 TX0-2 TX0-3 TX0-4 Trusted Actors Malicious Actors Node : 0 SHA16=XoXoXoXo YoYo XoXoXoXo TX1-1 TX1-2 TX1-3 TX1-4 Node : 1 SHA16=X1X1X1X1 Nonce=YoYo Y1Y1 X1X1X1X1 TX2-1 TX2-2 TX2-3 TX2-4 Node : 2 SHA16=X2X2X2X2 Nonce=Y1Y1 Y2Y2 X2X2X2X2 TX3-1 TX3-2 TX3-3 TX3-4 Node : 3 SHA16=X3X3X3X3 Nonce=Y2Y2 App App App App Y3Y3 X3X3X3X3 TX4-1 TX4-2 TX4-3 TX4-4 Node : 4 SHA16=X4X4X4X 4 Nonce=Y3Y3 X = Previous Node Hash Y = nonce TX = Transactions App App Hard Problem: SHA16(XXXXYY) < 0ABC (N=3) Node1 : SHA16(X0X10X0X0,TX1s):YoYo Node2 : SHA16(SHA16(X0X10X0X0+TX1s,YoYo),TX2s) :Y1Y1 Node3 : SHA16(SHA16(SHA16(X0X10X0X0+TX1s,YoYo),TX2s,Y1Y1),TX3s):Y2Y2 Node4: SHA16(SHA16(SHA16(SHA16(X0X10X0X0+TX1s,YoYo),TX2s,Y1Y1),TX3s),Y2Y2, TX4s) :Y3Y332 Block Chain App Energy consumed by BitCoin BlockChain is comparable to the Energy Consumption of Denmark. We are talking about machines with PetaBytes (10^12) /Sec computing power.