SlideShare a Scribd company logo
1 of 48
www.cambridge.edu.in
Department of
Computer Science & Engineering
Decentralization
and
Cryptography
• The basic idea of decentralization is to distribute control
and authority to the peripheries of an organization
instead of one central body being in full control of the
organization.
• This configuration produces several benefits for
organizations, such as increased efficiency, expedited
decision making, better motivation, and a reduced
burden on top management.
Decentralization
Decentralization using blockchain
• Decentralization is a core benefit and service provided by
blockchain technology.
• Decentralization can be viewed from a blockchain
perspective as a mechanism that provides a way to
remodel existing applications and paradigms, or to build
new applications, in order to give full control to users.
Decentralization using blockchain
Information and Communication Technology (ICT)
• has conventionally been based on a centralized paradigm
whereby database or application servers are under the
control of a central authority.
• With Bitcoin and the advent of blockchain technology, which
allows anyone to start a decentralized system and operate it
with no single point of failure or single trusted authority.
Decentralization using blockchain
Information and Communication Technology (ICT)
diagram shows the different types of systems that currently exist:
Decentralization using blockchain
Information and Communication Technology (ICT)
• A decentralized system is a type of network where nodes
are not dependent on a single master node; instead,
control is distributed among many nodes.
• This is analogous to a model where each department in an
organization is in charge of its own database server, thus
taking away the power from the central server and
distributing it to the subdepartments who manage their own
databases.
Decentralization using blockchain
Information and Communication Technology (ICT)
• A decentralized system is a type of network where nodes
are not dependent on a single master node.
• This mechanism came into play with Bitcoin, and it
enables a user to agree on something via a consensus
algorithm without the need for a central, trusted third party,
intermediary, or service provider.
Methods of decentralization
• Two methods can be used to achieve decentralization:
i) Disintermediation
ii) Competition (Contest-driven decentralization).
Disintermediation:
The concept of disintermediation can be explained with the
aid of an example as Bank.
• The intermediary; that is, the bank, is no longer required,
and decentralization is achieved by disintermediation.
Methods of decentralization
Contest-driven decentralization
• The method involving competition, different service providers
compete with each other in order to be selected for the
provision of services by the system.
• This paradigm does not achieve complete decentralization.
• In the context of blockchain technology, a system can be
envisioned in which smart contracts can choose an external data
provider from a large number of providers based on their
reputation, previous score, reviews, and quality of service.
Methods of decentralization
Methods of decentralization
• The benefits of decentralization, including transparency,
efficiency, cost saving, development of trusted
ecosystems, and in some cases privacy and anonymity.
• some challenges, such as security requirements, software
bugs, and human errors need to be examined thoroughly.
Methods of decentralization
few fundamental questions.
• Is a blockchain really needed?
• When is a blockchain required?
• In what circumstances is blockchain preferred over
traditional databases?
To answer these questions, go through the simple set of
questions presented here:
Methods of decentralization
1. Is high data throughput required? If the answer to this
question is yes, then use a traditional database.
2. Are updates centrally controlled? If yes, then use a
conventional database.
3. Do users trust each other? If yes, then use a traditional
database.
4. Are users anonymous? If yes, then use a public blockchain;
if not, then use a private blockchain.
5. If consensus is required to be maintained within a
consortium then use a private blockchain, otherwise use
a public blockchain.
Routes to decentralization
• The Bitcoin blockchain is typically the first choice for many, as
it has proven to be the most resilient and secure blockchain
and has a market cap of nearly $145 billion at the time of this
writing.
• Alternatively, other blockchains, such as Ethereum, serve as
the tool of choice for many developers for building
decentralized applications.
• As compared to Bitcoin, Ethereum has become a more
prominent choice because of the flexibility it allows for
programming any business logic into the blockchain by using
smart contracts.
How to decentralize
• Arvind Narayanan and others have proposed a framework,
that can be used to evaluate the decentralization
requirements of a variety of issues in the context of
blockchain technology.
• The framework raises four questions whose answers
provide a clear understanding as to how a system can be
decentralized:
How to decentralize
1. What is being decentralized?
A: This can be any system, such as an identity system or a
trading system.
2. What level of decentralization is required?
A: level of decentralization required by examining the scale
of decentralization as discussed earlier. It can be full
disintermediation or partial disintermediation.
How to decentralize
3. What blockchain is used?
A: It can be Bitcoin blockchain, Ethereum blockchain, or any other
blockchain that is deemed fit for the specific application.
4. What security mechanism is used?
A: The security mechanism can be atomicity-based, where either
the transaction executes in full or does not execute at all.
Other mechanisms may include one based on reputation, which
allows for varying degrees of trust in a system.
The decentralization framework example
• Evaluate a money transfer system as an example of an
application selected to be decentralized.
• The four questions discussed previously are used to evaluate
the decentralization requirements of this application.
1. What is being decentralized?
2. What level of decentralization is required?
3. What blockchain is used?
4. What security mechanism is used?
The decentralization framework example
The answers to these questions are as follows:
1. Money transfer system
2. Disintermediation
3. Bitcoin
4. Atomicity
this framework can be used for any other system that needs
to be evaluated in terms of decentralization. The answers to
these four simple questions help clarify what approach to take
to decentralize the system.
Decentralized Organizations
• DOs are software programs that run on a blockchain.
• They are based on the idea of actual organizations with
people and protocols.
• Once a DO is added to the blockchain in the form of a
smart contract or a set of smart contracts, it becomes
decentralized
• The parties interact with each other based on the code
defined within the DO software.
Decentralized Autonomous Organizations
• Decentralized Autonomous Organization (DAO) is also a
computer program that runs atop a blockchain and embedded
within it are governance and business logic rules.
• DAOs are autonomous, which means that they are fully
automated and contain artificially-intelligent logic.
• The Ethereum blockchain led the way with the initial
introduction of DAOs.
• In a DAO, the code is considered the governing entity rather
than people or paper contracts.
• DAOs are capable of hiring external contractors if enough
input is received from the token holders (participants).
• The DAO project was designed to be a venture capital
fund aimed at providing a decentralized business model
with no single entity as owner.
• Unfortunately, this project was hacked due to a bug in the
DAO code, and millions of dollars' worth in Ether currency
(ETH) was siphoned out of the project and into a child
DAO created by hackers.
Decentralized Autonomous Organizations
• A hard fork was required on the Ethereum blockchain to
reverse the impact of the hack and initiate the recovery of the
funds.
• This incident opened up the debate on the security, quality,
and need for thorough testing of the code in smart contracts
in order to ensure their integrity and adequate control.
Decentralized Autonomous Organizations
Decentralized Autonomous Corporations
• Decentralized Autonomous Corporations (DACs) are similar to
DAOs in concept, though considered to be a smaller subset of
them.
• The general distinction is that DAOs are usually considered to
be nonprofit; whereas DACs can earn a profit via shares
offered to the participants and to whom they can pay
dividends.
• DACs can run a business automatically without human
intervention based on the logic programmed into them.
Decentralized Autonomous Societies
• DASs are a concept whereby an entire society can function on a
blockchain with the help of multiple, complex smart contracts and
a combination of DAOs and Decentralized Applications (DApps)
running autonomously.
• services that a government commonly offers can be delivered via
blockchains, such as government identity card systems,
passports, and records of deeds, marriages, and births.
• if a government is corrupt and central systems do not provide the
satisfactory levels of trust that a society needs, then that society
can start its own virtual one on a blockchain that is driven by
decentralized consensus and transparency.
Decentralized Applications (DApps)
• DAOs, DACs, and DOs are DApps that run on top of a
blockchain in a peer-to-peer network.
• They represent the latest advancement in decentralization
technology.
• DApps, on the other hand, are software programs that can run
on their respective blockchains, use an existing established
blockchain, or use only the protocols of an existing blockchain.
• These are called Type I, Type II, and Type III DApps.
Requirements of a Decentralized Application
For an application to be considered decentralized, it must
meet the following criteria.
1. The DApp should be fully open source and autonomous, and
no single entity should be in control of a majority of its tokens.
All changes to the application must be consensus-driven
based on the feedback given by the community.
2. Data and records of operations of the application must be
cryptographically secured and stored on a public,
decentralized blockchain to avoid any central points of failure.
3. A cryptographic token must be used by the application to
provide access and rewards to those who contribute value to
the applications, for example, miners in Bitcoin.
4. The tokens must be generated by the DApp according to a
standard cryptographic algorithm. This generation of tokens
acts as a proof of the value to contributors (for example,
miners).
Requirements of a Decentralized Application
Operations of a DApp
• Establishment of consensus by a DApp can be achieved
using consensus algorithms such as PoW and PoS.
• only PoW (proof of work) has been found to be incredibly
resistant to 51% attacks, as is evident from Bitcoin.
• a DApp can distribute tokens (coins) via mining, fundraising,
and development.
DApp examples
1. KYC-Chain
This application provides the facility to manage Know Your Customer
(KYC) data securely and conveniently based on smart contracts.
2. OpenBazaar
• This is a decentralized peer-to-peer network that enables
commercial activities directly between sellers and buyers.
• DHTs are used in a peer-to-peer network to enable direct
communication and data sharing among peers.
• It makes use of Bitcoin and various other cryptocurrencies as a
payment method.
DApp examples
3. Lazooz
• This is the decentralized equivalent of Uber.
• It allows peer-to-peer ride sharing and users to be
incentivized by proof of movement, and they can earn Zooz
coins.
Cryptographic primitives
• Cryptographic primitives are the basic building blocks of a
security protocol or system.
• A security protocol is a set of steps taken to achieve the
required security goals by utilizing appropriate security
mechanisms.
• Various types of security protocols are in use, such as
authentication protocols, non-repudiation protocols, and key
management protocols.
Cryptographic primitives
Taxonomy of cryptographic primitives
Symmetric cryptography
• Symmetric cryptography refers to a type of cryptography where
the key that is used to encrypt the data is the same one that is
used for decrypting the data.
• Thus, it is also known as shared key cryptography.
• The key must be established or agreed upon before the data
exchange occurs between the communicating parties.
• This is the reason it is also called secret key cryptography.
There are two types of symmetric ciphers: stream ciphers and
block ciphers.
1. Stream ciphers are encryption algorithms that apply
encryption algorithms on a bit-by-bit basis to plaintext using
a keystream.
2. Block ciphers are encryption algorithms that break up the
text to be encrypted (plaintext) into blocks of a fixed length
and apply the encryption block-by-block.
Stream ciphers
There are two types of stream ciphers: i) synchronous
stream ciphers and ii) asynchronous stream ciphers
Synchronous stream ciphers are those where the keystream
is dependent only on the key.
Asynchronous stream ciphers have a keystream that is also
dependent on the encrypted data.
Stream ciphers
Operation of a stream cipher
Stream ciphers
• In stream ciphers, encryption and decryption are the same
function because they are simple modulo-2 additions or
XOR operations.
• The fundamental requirement in stream ciphers is the
security and randomness of keystreams.
• Different techniques ranging from pseudorandom number
generators to true random number generators implemented
in hardware have been developed to generate random
numbers, and it is vital that all key generators be
cryptographically secure
Block ciphers
• Block ciphers are generally built using a
design strategy known as a Feistel cipher.
• Block ciphers, such as AES have been
built using a combination of substitution
and permutation called a Substitution-
Permutation Network (SPN).
Block ciphers
Simplified operation of a block cipher
• The various modes of operation for block ciphers are
Electronic Code Book (ECB), Cipher Block Chaining
(CBC), Output Feedback (OFB) mode, and Counter
(CTR) mode.
• These modes are used to specify the way in which an
encryption function is applied to the plaintext.
Block ciphers
Electronic Code Book
• It is a basic mode of operation in which the encrypted data
is produced as a result of applying the encryption algorithm
one-by-one to each block of plaintext.
Electronic Code Book mode for block ciphers
Cipher Block Chaining
• CBC mode, each block of plaintext is XOR'd with the
previously-encrypted block.
• CBC mode uses the Initialization Vector (IV) to encrypt the first
block. It is recommended that the IV be randomly chosen,
Cipher block chaining mode
Counter mode
CTR mode effectively uses a block cipher as a stream cipher.
In this case, a unique nonce is supplied that is concatenated
with the counter value to produce a keystream.
Message authentication mode
• Message Authentication Code (MAC) is a cryptographic
checksum that provides an integrity service.
• The most common method to generate a MAC using block
ciphers is cipher block chaining message authentication
code (CBC-MAC), where a part of the last block of the chain
is used as a MAC.
• For example, a MAC can be used to ensure that if a
message is modified by an unauthorized entity.
• Encrypting the message with a key using the MAC function.
• The resultant message and MAC of the message once
received by the receiver can be checked by encrypting the
message received again by the key and comparing it with the
MAC received from the sender.
• If they both match, then the message has not modified by
unauthorized user thus integrity service is provided.
• If they both don't match, then it means that message is
modified by unauthorized entity during the transmission.
Message authentication mode
Cryptographic hash mode
• Hash functions are primarily used to compress a message
to a fixed-length digest.
• In cryptographic hash mode, block ciphers are used as a
compression function to produce a hash of plaintext.
Data Encryption Standard
• The Data Encryption Standard (DES) was introduced by the
U.S. National Institute of Standards and Technology (NIST)
as a standard algorithm for encryption, and it was in
widespread use during the 1980s and 1990s.
• It did not prove to be very resistant to brute force attacks, due
to advances in technology and cryptography research.
• DES uses a key of only 56 bits, which raised some concerns.

More Related Content

Similar to module-2.pptx

Decentralization in blockchain
Decentralization in blockchainDecentralization in blockchain
Decentralization in blockchainSaravanan T.M
 
Blockchain for Enterprise
Blockchain for EnterpriseBlockchain for Enterprise
Blockchain for EnterpriseJoe Tawfik
 
Blockchain - a platform for Digital Transformation
Blockchain - a platform for Digital TransformationBlockchain - a platform for Digital Transformation
Blockchain - a platform for Digital TransformationFloyd DCosta
 
Musings from: The Real Business of Blockchain
Musings from: The Real Business of BlockchainMusings from: The Real Business of Blockchain
Musings from: The Real Business of BlockchainJames Cracknell
 
Article on Block chain and its use case
Article on Block chain and its use caseArticle on Block chain and its use case
Article on Block chain and its use caseABHISHEK JAIN
 
Blockchain for Digital Transformation in Banking
Blockchain for Digital Transformation in Banking Blockchain for Digital Transformation in Banking
Blockchain for Digital Transformation in Banking Floyd DCosta
 
Blockchain for Enterprises
Blockchain for EnterprisesBlockchain for Enterprises
Blockchain for EnterprisesHimanshu Pandey
 
TOWARDS BLOCKCHAIN ENABLED APPLICATIONS
TOWARDS BLOCKCHAIN ENABLED APPLICATIONSTOWARDS BLOCKCHAIN ENABLED APPLICATIONS
TOWARDS BLOCKCHAIN ENABLED APPLICATIONSBlockScience
 
Machine learning presentation in using pyhton
Machine learning presentation in using pyhtonMachine learning presentation in using pyhton
Machine learning presentation in using pyhtonmasukmia.com
 
blockchain ppt for research puropse in the university
blockchain ppt for research puropse in the universityblockchain ppt for research puropse in the university
blockchain ppt for research puropse in the universitygugan7097
 
AWS&Deloitte Blockchain
AWS&Deloitte BlockchainAWS&Deloitte Blockchain
AWS&Deloitte BlockchainAlé Flores
 
Blockchain - a platform for Digital Transformation in Finance
Blockchain - a platform for Digital Transformation in FinanceBlockchain - a platform for Digital Transformation in Finance
Blockchain - a platform for Digital Transformation in FinanceBlockchain Worx
 
Introduction to blockchain & cryptocurrencies
Introduction to blockchain & cryptocurrenciesIntroduction to blockchain & cryptocurrencies
Introduction to blockchain & cryptocurrenciesAurobindo Nayak
 
Blockchain & Islamic Finance
Blockchain & Islamic FinanceBlockchain & Islamic Finance
Blockchain & Islamic FinanceFarrukh Habib
 
BLOCK CHAIN technology for the students.
BLOCK CHAIN technology for the students.BLOCK CHAIN technology for the students.
BLOCK CHAIN technology for the students.Rajasekhar364622
 
Blockchain As An Enabler_16 July 2016_David Lee_Final
Blockchain As An Enabler_16 July 2016_David Lee_FinalBlockchain As An Enabler_16 July 2016_David Lee_Final
Blockchain As An Enabler_16 July 2016_David Lee_FinalDavid Lee Kuo Chuen 李国权
 
Blockchain Advances & its Applications.pptx
Blockchain Advances & its Applications.pptxBlockchain Advances & its Applications.pptx
Blockchain Advances & its Applications.pptxMohamedMansour421585
 

Similar to module-2.pptx (20)

BlockChain-1.pptx
BlockChain-1.pptxBlockChain-1.pptx
BlockChain-1.pptx
 
Decentralization in blockchain
Decentralization in blockchainDecentralization in blockchain
Decentralization in blockchain
 
Blockchain for Enterprise
Blockchain for EnterpriseBlockchain for Enterprise
Blockchain for Enterprise
 
Blockchain - a platform for Digital Transformation
Blockchain - a platform for Digital TransformationBlockchain - a platform for Digital Transformation
Blockchain - a platform for Digital Transformation
 
Musings from: The Real Business of Blockchain
Musings from: The Real Business of BlockchainMusings from: The Real Business of Blockchain
Musings from: The Real Business of Blockchain
 
Article on Block chain and its use case
Article on Block chain and its use caseArticle on Block chain and its use case
Article on Block chain and its use case
 
Blockchain for Digital Transformation in Banking
Blockchain for Digital Transformation in Banking Blockchain for Digital Transformation in Banking
Blockchain for Digital Transformation in Banking
 
Blockchain for Enterprises
Blockchain for EnterprisesBlockchain for Enterprises
Blockchain for Enterprises
 
TOWARDS BLOCKCHAIN ENABLED APPLICATIONS
TOWARDS BLOCKCHAIN ENABLED APPLICATIONSTOWARDS BLOCKCHAIN ENABLED APPLICATIONS
TOWARDS BLOCKCHAIN ENABLED APPLICATIONS
 
Machine learning presentation in using pyhton
Machine learning presentation in using pyhtonMachine learning presentation in using pyhton
Machine learning presentation in using pyhton
 
blockchain ppt for research puropse in the university
blockchain ppt for research puropse in the universityblockchain ppt for research puropse in the university
blockchain ppt for research puropse in the university
 
Blockchain in FinTech
Blockchain in FinTechBlockchain in FinTech
Blockchain in FinTech
 
AWS&Deloitte Blockchain
AWS&Deloitte BlockchainAWS&Deloitte Blockchain
AWS&Deloitte Blockchain
 
Blockchain - a platform for Digital Transformation in Finance
Blockchain - a platform for Digital Transformation in FinanceBlockchain - a platform for Digital Transformation in Finance
Blockchain - a platform for Digital Transformation in Finance
 
Introduction to blockchain & cryptocurrencies
Introduction to blockchain & cryptocurrenciesIntroduction to blockchain & cryptocurrencies
Introduction to blockchain & cryptocurrencies
 
Blockchain & Islamic Finance
Blockchain & Islamic FinanceBlockchain & Islamic Finance
Blockchain & Islamic Finance
 
BLOCK CHAIN technology for the students.
BLOCK CHAIN technology for the students.BLOCK CHAIN technology for the students.
BLOCK CHAIN technology for the students.
 
Blockchain Basics
Blockchain BasicsBlockchain Basics
Blockchain Basics
 
Blockchain As An Enabler_16 July 2016_David Lee_Final
Blockchain As An Enabler_16 July 2016_David Lee_FinalBlockchain As An Enabler_16 July 2016_David Lee_Final
Blockchain As An Enabler_16 July 2016_David Lee_Final
 
Blockchain Advances & its Applications.pptx
Blockchain Advances & its Applications.pptxBlockchain Advances & its Applications.pptx
Blockchain Advances & its Applications.pptx
 

Recently uploaded

UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduitsrknatarajan
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingrknatarajan
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...Call Girls in Nagpur High Profile
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).pptssuser5c9d4b1
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSRajkumarAkumalla
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)Suman Mia
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Call Girls in Nagpur High Profile
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college projectTonystark477637
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 

Recently uploaded (20)

UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduits
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college project
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
 

module-2.pptx

  • 1. www.cambridge.edu.in Department of Computer Science & Engineering Decentralization and Cryptography
  • 2. • The basic idea of decentralization is to distribute control and authority to the peripheries of an organization instead of one central body being in full control of the organization. • This configuration produces several benefits for organizations, such as increased efficiency, expedited decision making, better motivation, and a reduced burden on top management. Decentralization
  • 3. Decentralization using blockchain • Decentralization is a core benefit and service provided by blockchain technology. • Decentralization can be viewed from a blockchain perspective as a mechanism that provides a way to remodel existing applications and paradigms, or to build new applications, in order to give full control to users.
  • 4. Decentralization using blockchain Information and Communication Technology (ICT) • has conventionally been based on a centralized paradigm whereby database or application servers are under the control of a central authority. • With Bitcoin and the advent of blockchain technology, which allows anyone to start a decentralized system and operate it with no single point of failure or single trusted authority.
  • 5. Decentralization using blockchain Information and Communication Technology (ICT) diagram shows the different types of systems that currently exist:
  • 6. Decentralization using blockchain Information and Communication Technology (ICT) • A decentralized system is a type of network where nodes are not dependent on a single master node; instead, control is distributed among many nodes. • This is analogous to a model where each department in an organization is in charge of its own database server, thus taking away the power from the central server and distributing it to the subdepartments who manage their own databases.
  • 7. Decentralization using blockchain Information and Communication Technology (ICT) • A decentralized system is a type of network where nodes are not dependent on a single master node. • This mechanism came into play with Bitcoin, and it enables a user to agree on something via a consensus algorithm without the need for a central, trusted third party, intermediary, or service provider.
  • 8. Methods of decentralization • Two methods can be used to achieve decentralization: i) Disintermediation ii) Competition (Contest-driven decentralization). Disintermediation: The concept of disintermediation can be explained with the aid of an example as Bank. • The intermediary; that is, the bank, is no longer required, and decentralization is achieved by disintermediation.
  • 9. Methods of decentralization Contest-driven decentralization • The method involving competition, different service providers compete with each other in order to be selected for the provision of services by the system. • This paradigm does not achieve complete decentralization. • In the context of blockchain technology, a system can be envisioned in which smart contracts can choose an external data provider from a large number of providers based on their reputation, previous score, reviews, and quality of service.
  • 11. Methods of decentralization • The benefits of decentralization, including transparency, efficiency, cost saving, development of trusted ecosystems, and in some cases privacy and anonymity. • some challenges, such as security requirements, software bugs, and human errors need to be examined thoroughly.
  • 12. Methods of decentralization few fundamental questions. • Is a blockchain really needed? • When is a blockchain required? • In what circumstances is blockchain preferred over traditional databases? To answer these questions, go through the simple set of questions presented here:
  • 13. Methods of decentralization 1. Is high data throughput required? If the answer to this question is yes, then use a traditional database. 2. Are updates centrally controlled? If yes, then use a conventional database. 3. Do users trust each other? If yes, then use a traditional database. 4. Are users anonymous? If yes, then use a public blockchain; if not, then use a private blockchain. 5. If consensus is required to be maintained within a consortium then use a private blockchain, otherwise use a public blockchain.
  • 14. Routes to decentralization • The Bitcoin blockchain is typically the first choice for many, as it has proven to be the most resilient and secure blockchain and has a market cap of nearly $145 billion at the time of this writing. • Alternatively, other blockchains, such as Ethereum, serve as the tool of choice for many developers for building decentralized applications. • As compared to Bitcoin, Ethereum has become a more prominent choice because of the flexibility it allows for programming any business logic into the blockchain by using smart contracts.
  • 15. How to decentralize • Arvind Narayanan and others have proposed a framework, that can be used to evaluate the decentralization requirements of a variety of issues in the context of blockchain technology. • The framework raises four questions whose answers provide a clear understanding as to how a system can be decentralized:
  • 16. How to decentralize 1. What is being decentralized? A: This can be any system, such as an identity system or a trading system. 2. What level of decentralization is required? A: level of decentralization required by examining the scale of decentralization as discussed earlier. It can be full disintermediation or partial disintermediation.
  • 17. How to decentralize 3. What blockchain is used? A: It can be Bitcoin blockchain, Ethereum blockchain, or any other blockchain that is deemed fit for the specific application. 4. What security mechanism is used? A: The security mechanism can be atomicity-based, where either the transaction executes in full or does not execute at all. Other mechanisms may include one based on reputation, which allows for varying degrees of trust in a system.
  • 18. The decentralization framework example • Evaluate a money transfer system as an example of an application selected to be decentralized. • The four questions discussed previously are used to evaluate the decentralization requirements of this application. 1. What is being decentralized? 2. What level of decentralization is required? 3. What blockchain is used? 4. What security mechanism is used?
  • 19. The decentralization framework example The answers to these questions are as follows: 1. Money transfer system 2. Disintermediation 3. Bitcoin 4. Atomicity this framework can be used for any other system that needs to be evaluated in terms of decentralization. The answers to these four simple questions help clarify what approach to take to decentralize the system.
  • 20. Decentralized Organizations • DOs are software programs that run on a blockchain. • They are based on the idea of actual organizations with people and protocols. • Once a DO is added to the blockchain in the form of a smart contract or a set of smart contracts, it becomes decentralized • The parties interact with each other based on the code defined within the DO software.
  • 21. Decentralized Autonomous Organizations • Decentralized Autonomous Organization (DAO) is also a computer program that runs atop a blockchain and embedded within it are governance and business logic rules. • DAOs are autonomous, which means that they are fully automated and contain artificially-intelligent logic. • The Ethereum blockchain led the way with the initial introduction of DAOs. • In a DAO, the code is considered the governing entity rather than people or paper contracts.
  • 22. • DAOs are capable of hiring external contractors if enough input is received from the token holders (participants). • The DAO project was designed to be a venture capital fund aimed at providing a decentralized business model with no single entity as owner. • Unfortunately, this project was hacked due to a bug in the DAO code, and millions of dollars' worth in Ether currency (ETH) was siphoned out of the project and into a child DAO created by hackers. Decentralized Autonomous Organizations
  • 23. • A hard fork was required on the Ethereum blockchain to reverse the impact of the hack and initiate the recovery of the funds. • This incident opened up the debate on the security, quality, and need for thorough testing of the code in smart contracts in order to ensure their integrity and adequate control. Decentralized Autonomous Organizations
  • 24. Decentralized Autonomous Corporations • Decentralized Autonomous Corporations (DACs) are similar to DAOs in concept, though considered to be a smaller subset of them. • The general distinction is that DAOs are usually considered to be nonprofit; whereas DACs can earn a profit via shares offered to the participants and to whom they can pay dividends. • DACs can run a business automatically without human intervention based on the logic programmed into them.
  • 25. Decentralized Autonomous Societies • DASs are a concept whereby an entire society can function on a blockchain with the help of multiple, complex smart contracts and a combination of DAOs and Decentralized Applications (DApps) running autonomously. • services that a government commonly offers can be delivered via blockchains, such as government identity card systems, passports, and records of deeds, marriages, and births. • if a government is corrupt and central systems do not provide the satisfactory levels of trust that a society needs, then that society can start its own virtual one on a blockchain that is driven by decentralized consensus and transparency.
  • 26. Decentralized Applications (DApps) • DAOs, DACs, and DOs are DApps that run on top of a blockchain in a peer-to-peer network. • They represent the latest advancement in decentralization technology. • DApps, on the other hand, are software programs that can run on their respective blockchains, use an existing established blockchain, or use only the protocols of an existing blockchain. • These are called Type I, Type II, and Type III DApps.
  • 27. Requirements of a Decentralized Application For an application to be considered decentralized, it must meet the following criteria. 1. The DApp should be fully open source and autonomous, and no single entity should be in control of a majority of its tokens. All changes to the application must be consensus-driven based on the feedback given by the community. 2. Data and records of operations of the application must be cryptographically secured and stored on a public, decentralized blockchain to avoid any central points of failure.
  • 28. 3. A cryptographic token must be used by the application to provide access and rewards to those who contribute value to the applications, for example, miners in Bitcoin. 4. The tokens must be generated by the DApp according to a standard cryptographic algorithm. This generation of tokens acts as a proof of the value to contributors (for example, miners). Requirements of a Decentralized Application
  • 29. Operations of a DApp • Establishment of consensus by a DApp can be achieved using consensus algorithms such as PoW and PoS. • only PoW (proof of work) has been found to be incredibly resistant to 51% attacks, as is evident from Bitcoin. • a DApp can distribute tokens (coins) via mining, fundraising, and development.
  • 30. DApp examples 1. KYC-Chain This application provides the facility to manage Know Your Customer (KYC) data securely and conveniently based on smart contracts. 2. OpenBazaar • This is a decentralized peer-to-peer network that enables commercial activities directly between sellers and buyers. • DHTs are used in a peer-to-peer network to enable direct communication and data sharing among peers. • It makes use of Bitcoin and various other cryptocurrencies as a payment method.
  • 31. DApp examples 3. Lazooz • This is the decentralized equivalent of Uber. • It allows peer-to-peer ride sharing and users to be incentivized by proof of movement, and they can earn Zooz coins.
  • 32. Cryptographic primitives • Cryptographic primitives are the basic building blocks of a security protocol or system. • A security protocol is a set of steps taken to achieve the required security goals by utilizing appropriate security mechanisms. • Various types of security protocols are in use, such as authentication protocols, non-repudiation protocols, and key management protocols.
  • 33. Cryptographic primitives Taxonomy of cryptographic primitives
  • 34. Symmetric cryptography • Symmetric cryptography refers to a type of cryptography where the key that is used to encrypt the data is the same one that is used for decrypting the data. • Thus, it is also known as shared key cryptography. • The key must be established or agreed upon before the data exchange occurs between the communicating parties. • This is the reason it is also called secret key cryptography.
  • 35. There are two types of symmetric ciphers: stream ciphers and block ciphers. 1. Stream ciphers are encryption algorithms that apply encryption algorithms on a bit-by-bit basis to plaintext using a keystream. 2. Block ciphers are encryption algorithms that break up the text to be encrypted (plaintext) into blocks of a fixed length and apply the encryption block-by-block.
  • 36. Stream ciphers There are two types of stream ciphers: i) synchronous stream ciphers and ii) asynchronous stream ciphers Synchronous stream ciphers are those where the keystream is dependent only on the key. Asynchronous stream ciphers have a keystream that is also dependent on the encrypted data.
  • 37. Stream ciphers Operation of a stream cipher
  • 38. Stream ciphers • In stream ciphers, encryption and decryption are the same function because they are simple modulo-2 additions or XOR operations. • The fundamental requirement in stream ciphers is the security and randomness of keystreams. • Different techniques ranging from pseudorandom number generators to true random number generators implemented in hardware have been developed to generate random numbers, and it is vital that all key generators be cryptographically secure
  • 39. Block ciphers • Block ciphers are generally built using a design strategy known as a Feistel cipher. • Block ciphers, such as AES have been built using a combination of substitution and permutation called a Substitution- Permutation Network (SPN).
  • 41. • The various modes of operation for block ciphers are Electronic Code Book (ECB), Cipher Block Chaining (CBC), Output Feedback (OFB) mode, and Counter (CTR) mode. • These modes are used to specify the way in which an encryption function is applied to the plaintext. Block ciphers
  • 42. Electronic Code Book • It is a basic mode of operation in which the encrypted data is produced as a result of applying the encryption algorithm one-by-one to each block of plaintext. Electronic Code Book mode for block ciphers
  • 43. Cipher Block Chaining • CBC mode, each block of plaintext is XOR'd with the previously-encrypted block. • CBC mode uses the Initialization Vector (IV) to encrypt the first block. It is recommended that the IV be randomly chosen, Cipher block chaining mode
  • 44. Counter mode CTR mode effectively uses a block cipher as a stream cipher. In this case, a unique nonce is supplied that is concatenated with the counter value to produce a keystream.
  • 45. Message authentication mode • Message Authentication Code (MAC) is a cryptographic checksum that provides an integrity service. • The most common method to generate a MAC using block ciphers is cipher block chaining message authentication code (CBC-MAC), where a part of the last block of the chain is used as a MAC. • For example, a MAC can be used to ensure that if a message is modified by an unauthorized entity.
  • 46. • Encrypting the message with a key using the MAC function. • The resultant message and MAC of the message once received by the receiver can be checked by encrypting the message received again by the key and comparing it with the MAC received from the sender. • If they both match, then the message has not modified by unauthorized user thus integrity service is provided. • If they both don't match, then it means that message is modified by unauthorized entity during the transmission. Message authentication mode
  • 47. Cryptographic hash mode • Hash functions are primarily used to compress a message to a fixed-length digest. • In cryptographic hash mode, block ciphers are used as a compression function to produce a hash of plaintext.
  • 48. Data Encryption Standard • The Data Encryption Standard (DES) was introduced by the U.S. National Institute of Standards and Technology (NIST) as a standard algorithm for encryption, and it was in widespread use during the 1980s and 1990s. • It did not prove to be very resistant to brute force attacks, due to advances in technology and cryptography research. • DES uses a key of only 56 bits, which raised some concerns.