Get ready to dive into the world of blockchain with our expert speaker, Sylesh, Ex-GDSC Blockchain Lead. This hands-on workshop will provide you with valuable insights and practical skills.
š Here's what you can expect:
š In-depth knowledge of blockchain technology
š Hands-on experience with real-world applications
š Learn about the latest trends and developments in blockchain
10. Non Metal Money
Image in the public domain by Gary Todd.
Image by Bertramz on Wikimedia. Licesne: CC BY
Salt Bars - Ethiopia Cowrie Shells - Nigeria
Image by Sandsteinon Wikimedia.License CC-BY
Image by Yusuke Kawasaki on Wikimedia. License: CC BY
Tally Sticks - England Rai Stones - Yap
8
12. Minted Money
Image by Daderot on Wikimedia. License: CC0. Image is in the public domain.
Image by Scott Semans World Coins. License: CC BY.
Bronze Yuan - China Silver Dekadrachm - Greece Gold Aureus - Rome
10
13. Paper Money
Jiaozi Promissory Note - China
I
5 Pound Note - England Continental Note ā U.S.
Images are in the public domain.
11
15. Ledgers
Principal Recordings of Accounts
Proto Cuneiform
Uruk, ca 3000 B.C
Personal Ledger
George Washington
1747
Images are in the public domain. 13
16. Ledgers
Principal Recordings of Accounts:
Economic Activity
Financial Relationships
Types of Ledgers:
Transaction vs. Balance
General vs. Supporting or Sub
Single Entry vs. Double Entry
14
17. Characteristics of Good Ledgers
ā¢ Immutable, Consistency
ā¢ Timestamped
ā¢ Ownership
ā¢ Accuracy
ā¢ Description of Transaction
ā¢ Comprehensive 15
19. Fiat Currency
ā¢ Social & Economic Consensus
Image by epSos.de on Wikimedia. License CC BY.
ā¢ Represented by Central Bank Liabilities &
Commercial Bank Deposits
ā¢ Relies upon System of Ledgers
Integrated into Fractional Banking System
ā¢ Accepted for Taxes
ā¢ Notes & Coins are Legal Tender for All Debts Public & Private
ā¢ Unique Tax Treatment
19
21. Central Banking, Money & Ledgers
Image by Richard Gendal Brown from "Thoughts on the Future of Finance." Used with permission.
20
22. 26
Characteristics of Money
ā¢ Durable
ā¢ Portable
ā¢ Divisible
ā¢ Uniform/Fungible
(Crawfurd v. Royal Bank 1749)
ā¢ Acceptable
ā¢ Stable - Limited supply - Hard to Counterfeit
23. 27
Design of Money
ā¢ Token vs. Account Based
ā¢ Physical vs. Digital
ā¢ Private Sector vs. Central Bank
ā¢ Widely Accessible vs. Wholesale
27. 33
Bitcoin: A Peer-to-Peer Electronic Cash System
ā¢From: Satoshi Nakamoto <satoshi <at> vistomail.com>
Subject: Bitcoin P2P e-cash paper
Newsgroups: gmane.comp.encryption.general
Date: Friday 31st October 2008 18:10:00 UTC
ā¢āI've been working on a new electronic cash system
that's fully peer-to-peer, with no trusted third party.ā
29. Blockchain Technology
timestamped
append-only log auditable database network consensus protocol
Secured via cryptography
ā¢ Hash functions for tamper
resistance and integrity
ā¢ Digital signatures for consent
Consensus for agreement
Addresses ācost of trustā
(Byzantine Generals problem)
ā¢ Permissioned
ā¢ Permissionless
7
30. 30
Blockchain Technology
ā¢ Verifiably moves ādataā on a decentralized network
ā¢ The ādataā can represent value or computer code
ā¢ Thus it goes directly to the plumbing of the financial sector and money
ā¢ Broad adoption rests on addressing technical, commercial and public
policy hurdles
ā¢ It can be a catalyst for change in the world of finance and money
31. Purpose of Blockchain
The purpose of a blockchain is to have a network of
computers agree upon a common state of data.
Plain and simple. Any person or organization should be
able to participate in this process. No person or
organization should be able to control this process.
With a blockchain we can decentralize where code runs
and agree on the output.
There is no single owner of the code's execution
The code always runs as programmed.
The code is transparently verifiable
32. Pizza for bitcoins?
May 18, 2010, 12:35:20 AM
ā¢ āI'll pay 10,000 bitcoins for a couple of pizzas.. like maybe 2 large ones so I have some
left over for the next day. I like having left over pizza to nibble on later. You can make
the pizza yourself and bring it to my house or order it for me from a delivery place, but
what I'm aiming for is getting food delivered in exchange for bitcoins where I don't have
to order or prepare it myself, kind of like ordering a 'breakfast platter' at a hotel or
something, they just bring you something to eat and you're happy!
ā¢ I like things like onions, peppers, sausage, mushrooms, tomatoes, pepperoni, etc.. just
standard stuff no weird fish topping or anything like that. I also like regular cheese
pizzas which may be cheaper to prepare or otherwise acquire.
ā¢ If you're interested please let me know and we can work out a deal.
ā¢ Thanks,
Laszloā 16
33. 33
Re: Pizza for bitcoins?
May 21, 2010, 07:06:58 PM
ā¢ āSo nobody wants to buy me pizza? Is the bitcoin amount I'm offering
too low?ā
34. 34
Re: Pizza for bitcoins?
May 22, 2010, 07:17:26 PM
ā¢ āI just want to report that I successfully traded 10,000 bitcoins for
pizza.
Pictures: http://heliacal.net/~solar/bitcoin/pizza/
Thanks jercos!ā
35. 35
Medium of Exchange:
10,000 Bitcoins for 2 Pizzas
ā¢ Value:
ā¢ May 22, 2010 - $41
ā¢ $20.50 per pizza
ā¢ September 23, 2023 ā Rs. 22,09,75,36,390 (220 crores)
ā¢ Rs.110 crores per pizza
36. 8
Bitcoin ā Technical Features
ā¢ Cryptographic Hash Functions
ā¢ Timestamped Append-only Logs (Blocks)
ā¢ Block Headers & Merkle Trees
ā¢ Asymmetric Cryptography & Digital Signatures
ā¢ Addresses
ā¢ Consensus through Proof of Work
ā¢ Network of Nodes
ā¢ Native Currency
ā¢ Transaction Inputs & Outputs
ā¢ Unspent Transaction Output (UTXO)
ā¢ Scripting language
37. NODES IN
BLOCKCHAIN
āOn the most basic level, a
node is simply a device
running the software of a
specific blockchain.ā
āNodes are the source of
source of truth for a
a blockchain.ā
38.
39. Timestamped Append-only Log - Blockchain
Image is in the public domain by National Institute of Standards and Technology. 13
40. Merkle Tree ā Binary Data Tree with Hashes
15
Image is in the public domain by National Institute Standards and Technology.
41. We will Explore a Range of Perspectives
Bitcoin Minimalist
Smart Contract Minimalist
Blockchain Minimalist
Bitcoin Maximalist
Smart Contract Maximalist
Blockchain Maximalist
But Anchor our Discussion in the Middle
41
43. Blockchain ā Proof of Work
Image by Anders Brownworth. Used with permission.
17
44. Blockchain ā Proof of Work
Image by Anders Brownworth. Used with permission.
18
45. Cryptography
Cryptography is the science and practice of securing communication and data by
converting information into an unreadable format, which can only be deciphered by
authorized individuals . The primary goal of cryptography is to ensure the
confidentiality, integrity, and authenticity of information.
49. A cryptographic hash function is a mathematical algorithm that takes an input (or message) and produces a fixed-size
string of characters, which is typically a hexadecimal number. The key properties of a cryptographic hash function are:
SHA-256 (Secure Hash Algorithm 256-bit) is a cryptographic hash function that is commonly used in blockchain
technology, including in popular cryptocurrencies like Bitcoin. It plays a critical role in ensuring the security and integrity
of blockchain data. Here's an explanation of how SHA-256 works and its role in blockchain:
3) Cryptographic Hash Functions
ā¢ Deterministic: The same input will always
produce the same hash value.
ā¢ Fast to Compute: It's computationally efficient to
calculate the hash value for any given input.
ā¢ Irreversible: It should be nearly impossible to
reverse the process and derive the original input
from the hash value.
ā¢ Avalanche Effect: A small change in the input
should result in a significantly different hash
value.
50. Cryptography in Blockchain
Cryptography plays a fundamental role in blockchain technology:
ā¢ Securing Transactions: In blockchain, cryptography is used to secure transactions. Each transaction is encrypted to
ensure that only the intended parties can access the details, making it highly secure and tamper-resistant.
ā¢ Digital Signatures: Blockchain users have public and private keys. Public keys are like usernames, and private keys are
secret passwords. When someone wants to make a transaction, they use their private key to create a digital signature.
Others can use their public key to verify that the transaction is valid and came from the right person.
ā¢ Mining and Consensus: Cryptography is used in the mining process, where miners solve complex cryptographic puzzles
to validate and add new blocks to the blockchain. This process ensures the integrity and security of the blockchain's
transaction history.
56. SECURITY
In the digital age, security is paramount. Our personal information, financial assets, and
even the integrity of our systems are constantly under threat from malicious actors.
This is where blockchain comes in as a game-changer.
ļ§ When a transaction is added to the blockchain, it is stored in a block that is linked to the
previous one using complex mathematical algorithms.
ļ§ Traditional centralized systems have single points of failure. In contrast, blockchain is
decentralized, meaning data is distributed across a network of computers. There is no
single vulnerable point for attackers to exploit. Even if one node is compromised, the rest of
the network remains secure.
ļ§ Once data is recorded on the blockchain, it cannot be altered or deleted.
58. Immutability
immutability refers to the quality of being unchangeable or
unalterable. In the context of technology and data, it means that
once information is recorded or stored, it cannot be modified or
deleted.
60. 20
Bitcoin Proof of Work Difficulty
ā¢ Targets 10 minute average block generation time
ā¢ Defined by the # of leading zeros Hash output requires to solve proof of work
ā¢ Adjusts every 2016 blocks - about every two weeks
ā¢ Currently, > 18 leading zeros (out of 64 hexadecimal characters)
ā¢ Block 541974 (9/18/18)- 18 leading zeros
0000000000000000001104a863046dfbad1a2941128815669623ff93c2a3945f
ā¢ Genesis Block (1/3/09) ā 10 leading zeros, though only required 8
000000000019d6689c085ae165831e934ff763ae46a2a6c172b3f1b60a8ce26f
62. Bitcoin Mining Evolution
Application Specific Integrated Circuit
(ASICs) 2013 ā 2018
4 ā 16 TH/S
Image by InstagramFOTOGRAFIN on Pixabay.
Graphics Processing Units
(GPUs) 2010 ā 2013
20 - 300 MH/S
Image is in the public domain.
Central Processing Units
(CPUs) 2009 ā 2010
2 - 20 MH/S
Image by MiNE on flickr. CC BY
Modern Mining Factory
Image by Axel Castillo. CC0 Public Domain.
23
64. Native Currency
Economic Incentive System
āMonetary Policiesā vary widely
ā¢ Bitcoin - BTC
ā¢ Created through Coinbase Transaction in each block
ā¢ āMonetary Policyā preset in Bitcoin Core
ā¢ Creation originally 50 Bitcoin per block
ā¢ Reward halves (1/2s) every 210,000 blocks
ā¢ Currently 12.5 BTCs created per block ā thus āinflationā 4.1%
ā¢ Currently 17.3 million BTC; capping at 21 million BTC in 2040
ā¢ Market based transaction fee mechanism also provided for in Bitcoin Core
ā¢ Ethereum
ā¢ Currently 3 ETH per block ā thus āinflationā 7.4%
ā¢ Recent proposal to decline to 2 ETH per block in 11/18
ā¢ Fees paid in Gas (109 Gas per ETH) fo
25r computation are credited to miners
65. Bitcoin vs Ethereum Design
ā¢ Founder: Satoshi Nakamoto
ā¢ Genesis: January 2009
ā¢ Code: Non Turing (Script)
ā¢ Ledger: UTXO ā Transaction
ā¢ Merkle Trees: Transactions
ā¢ Block Time: 10 minutes
ā¢ Consensus: Proof of Work
ā¢ Hash Function: SHA 256
Vatalik Buterin
July 2015
Turing Complete (Solidity,
Serpent, LLL or Mutan)
State - Account Based
Transactions, State, Storage,
Receipts (w/nonces)
14 seconds
Proof of Work
Ethash
66. Bitcoin ā Technical Features
ā¢ Cryptography & Timestamped Logs
ā¢ Cryptographic Hash Functions
ā¢ Timestamped Append-only Logs (Blocks)
ā¢ Block Headers & Merkle Trees
ā¢ Asymmetric Cryptography & Digital Signatures
ā¢ Addresses
ā¢ Decentralized Network Consensus
ā¢ Proof of Work
ā¢ Native Currency
ā¢ Network
ā¢ Transaction Script & UTXO
ā¢ Transaction Inputs & Outputs
ā¢ Unspent Transaction Output (UTXO) set
Ethereum?
Yes
ā
ā
ā ā
ā
ā
Yes
ā
ā
ā
No
State Transitions
Account Based
7 languages
ā¢ Script language 7
67. Smart Contracts
ā¢ āA set of promises,
ā¢ specified in digital form,
ā¢ including protocols
ā¢ within which the parties perform on these promises.ā
Nick Szabo, 1996
However ā¦.
ā¢ Smart Contracts may not be āSmartā
ā¢ Smart Contracts may not be āCon
6
tractsā
68. Bitcoin vs Ethereum Design
ā¢ Currency: Bitcoin
ā¢ Mining: ASIC
ā¢ Hashrate: 54 Exahash/S
ā¢ Pre-sale: None
ā¢ Rewards: 12.5 BTC/block
ā¢ Monetary Policy: 1/2s every
210,000 blocks (4 yrs)
ā¢ Fees: Voluntary
ETH
GPU
260 Terahash/S
ICO & prerelease of 72 m ETH
3 ETH/block
Fixed, but changes by updates
(was 5/block; proposal to 2)
Needed & market based
9
69. 11
Smart Contract Potential Use Cases
ā¢ Digital Identity
ā¢ Securities
ā¢ Derivatives
ā¢ Mortgages
ā¢ Supply Chain
ā¢ Clinical Trials
Records
Trade Finance
Financial Data
Land Title
Auto Insurance
Cancer Research
70. 10
Smart Contract Platforms
ā¢ Ethereum (2015) - $22 b current market value
ā¢ EOS (2018) - $5 b ā completed $4.2 b year long ICO in July
ā¢ NEO (2016) ā $1.1 b - China; delegated BFT; supports wider range of code
ā¢ Ethereum Classic (2016) ā $1.1 b - Created from the āDAOā hard fork
ā¢ LISK (2016) ā $360 m - code in Java; uses side chains
ā¢ Stratis (2017) - $150 m
71.
72.
73. What is the Role of Finance?
Moving, Allocating & Pricing:
Money
Image by thomasjphotos on flickr.
CC BY-NC-SA
Throughout the Economy
Image by Jamie on flickr. CC BY.
Risk
Image by Marco Verch. License CC BY
73
74. Financial Sector Challenges =>
Blockchain Potential Opportunities
ā¢ Repeated crises and instability
ā¢ Fiat currency instabilities associated with unsound policies
ā¢ Centralized intermediariesā concentrate risks & economic rents
ā¢ Central Bank legacy payment systems
ā¢ Clearing & settlement costs & counterparty risks
ā¢ Financial inclusion
ā¢ Payment system costs: Ā½ - 1 % of Global GDP
ā¢ Financial sector costs: 7 Ā½ % of U.S. GDP 23
76. Privacy & Security
ā¢ Contradictory Tensions of Pseudonymous Addresses
ā¢ Law Enforcement & Regulators want more Transparency
ā¢ Financial Institutions, Regulators & Some Users want less Public Transparency
ā¢ Concerns about Privacy Coins & Mechanisms Fostering Illicit Activities
ā¢ Coins: Dash, Monero, Zcash
ā¢ Mechanisms: Mixers or Tumblers
ā¢ Cybersecurity Challenges of Private Key Custody, Generation & Storage
ā¢ Significant Losses due to Hacks, Mismanagement and Thefts
ā¢ Possible Solutions involve a) Zero Knowledge Proofs & b) Pedersen Commitments
ā¢ Cryptographic Primitives that: a) lets Someone Prove a Statement is True
without Revealing the Details of Exactly why that Statement is True &
b) commit to data (like hash) but can 1
a
5
lso combine commitments