SlideShare a Scribd company logo
1 of 76
The Internet: Layers of open protocols
Ethernet - 1974
TCP/IP - 1974
HTTP- 1990
1979
1984
1995
1
ā€˜The Netā€™ opening scene 1995
5
Ā© Columbia Pictures. All rights reserved. This content is excluded from our Creative Commons license. For more information, see https://ocw.mit.edu/help/faq-fair-use/
Sandra Bullo
5 ck
First online sale: Pizza Hut in 1994
But money changed hands with delivery
Ā© Pizza Hut. All rights reserved. This content is excluded from our Creative Commons license. For more information, see https://ocw.mit.edu/help/faq-fair-use/
6
Cryptography:
Communications in the presence of adversaries
Scytale Cipher Enigma Machine Asymmetric Cryptography
Ancient Times 1920s - WWII 1976 to today
Image is in the public domain via Wikipedia.
Ā© Luringen on Wikimedia Commons. License CC BY-SA. All Image by CIA and in the public domain via Wikimedia Commons.
rights reserved. This content is excluded from our Creative
Commons license. For more information, see
https://ocw.mit.edu/help/faq-fair-use/ 7
5
Early Cryptographic Digital Currencies Failed
ā€¢ DigiCash (David Chaum) ā€“ 1989
ā€¢ Mondex (National Westminster Bank) - 1993
ā€¢ CyberCash (Lynch, Melton, Crocker & Wilson) ā€“ 1994
The Internet: Cryptographic protocols
Ethernet - 1974
TCP/IP - 1974
HTTP- 1990
SSL / TLS ā€“ 1996
1979
1984
1994
1998
6
7
Further Cryptographic Digital Currencies Failed
ā€¢ DigiCash (David Chaum) ā€“ 1989
ā€¢ Mondex (National Westminster Bank) - 1993
ā€¢ CyberCash (Lynch, Melton, Crocker & Wilson) ā€“ 1994
ā€¢ E-gold (Gold & Silver Reserve) ā€“ 1996
ā€¢ Hashcash (Adam Back) ā€“ 1997
ā€¢ Bit Gold (Nick Szabo) ā€“ 1998
ā€¢ B-Money (Wei Dai) - 1998
ā€¢ Lucre (Ben Laurie) ā€“ 1999
Digital Payments Innovation, though, Continued
2003
8
2007
Role of Money
Ā© Source Unknown. All rights reserved. This
content is excluded from our Creative
Commons license. For more information, see
https://ocw.mit.edu/help/faq-fair-use/
Medium of Exchange
Image by Rob Pongsajapan on flickr. CC BY.
Store of Value
Image by ajalfaro on flickr. CC BY-NC-SA
Unit of Account
25
Non Metal Money
Image in the public domain by Gary Todd.
Image by Bertramz on Wikimedia. Licesne: CC BY
Salt Bars - Ethiopia Cowrie Shells - Nigeria
Image by Sandsteinon Wikimedia.License CC-BY
Image by Yusuke Kawasaki on Wikimedia. License: CC BY
Tally Sticks - England Rai Stones - Yap
8
Metal Money
Bronze Aes Rude - Rome
Ā© Chuy1530on Wikipedia. All rights reserved. This content
is excluded from our Creative Commons license. For more
information, see https://ocw.mit.edu/help/faq-fair-use/.
Bronze Spade - China
Image by Mary Harrsch on flickr. License CC BY-NC-SA
Cooper Plate - Sweden
Ā© StAnselm on Wikipedia. All rights reserved. This content is excluded from our
Creative Commons license. For more information, see
https://ocw.mit.edu/help/faq-fair-use/ 9
Minted Money
Image by Daderot on Wikimedia. License: CC0. Image is in the public domain.
Image by Scott Semans World Coins. License: CC BY.
Bronze Yuan - China Silver Dekadrachm - Greece Gold Aureus - Rome
10
Paper Money
Jiaozi Promissory Note - China
I
5 Pound Note - England Continental Note ā€“ U.S.
Images are in the public domain.
11
Private Bank Notes
United States
Australia
Canada England
Images are in the public domain.
12
Ledgers
Principal Recordings of Accounts
Proto Cuneiform
Uruk, ca 3000 B.C
Personal Ledger
George Washington
1747
Images are in the public domain. 13
Ledgers
Principal Recordings of Accounts:
Economic Activity
Financial Relationships
Types of Ledgers:
Transaction vs. Balance
General vs. Supporting or Sub
Single Entry vs. Double Entry
14
Characteristics of Good Ledgers
ā€¢ Immutable, Consistency
ā€¢ Timestamped
ā€¢ Ownership
ā€¢ Accuracy
ā€¢ Description of Transaction
ā€¢ Comprehensive 15
Deposits & Negotiable Orders
17
Images are in the public domain.
Fiat Currency
ā€¢ Social & Economic Consensus
Image by epSos.de on Wikimedia. License CC BY.
ā€¢ Represented by Central Bank Liabilities &
Commercial Bank Deposits
ā€¢ Relies upon System of Ledgers
Integrated into Fractional Banking System
ā€¢ Accepted for Taxes
ā€¢ Notes & Coins are Legal Tender for All Debts Public & Private
ā€¢ Unique Tax Treatment
19
Credit Cards
First General Merchant Card American Express Bank of America
Dinersā€™ Club First Plastic Card First General Purpose
1949 1959 Credit Card
1966
Ā© Diner's Club, American Express, Bank of America. All rights reserved. This content is excluded from our Creative Commons license. For more
information, see https://ocw.mit.edu/help/faq-fair-use/ 23
Central Banking, Money & Ledgers
Image by Richard Gendal Brown from "Thoughts on the Future of Finance." Used with permission.
20
26
Characteristics of Money
ā€¢ Durable
ā€¢ Portable
ā€¢ Divisible
ā€¢ Uniform/Fungible
(Crawfurd v. Royal Bank 1749)
ā€¢ Acceptable
ā€¢ Stable - Limited supply - Hard to Counterfeit
27
Design of Money
ā€¢ Token vs. Account Based
ā€¢ Physical vs. Digital
ā€¢ Private Sector vs. Central Bank
ā€¢ Widely Accessible vs. Wholesale
29
Early Cryptographic Digital Currencies ā€¦ All Failed
ā€¢ DigiCash (David Chaum) ā€“ 1989
ā€¢ Mondex (National Westminster Bank) - 1993
ā€¢ CyberCash (Lynch, Melton, Crocker & Wilson) ā€“ 1994
ā€¢ E-gold (Gold & Silver Reserve) ā€“ 1996
ā€¢ Hashcash (Adam Back) ā€“ 1997
ā€¢ Bit Gold (Nick Szabo) ā€“ 1998
ā€¢ B-Money (Wei Dai) - 1998
ā€¢ Lucre (Ben Laurie) ā€“ 1999
30
Why did Early Digital Currencies Fail?
ā€¢ Merchant adoption
ā€¢ Centralization
ā€¢ Double spending
ā€¢ Consensus
32
The Riddle Remained
How to move value
peer-to-peer
without any
trusted central intermediary
33
Bitcoin: A Peer-to-Peer Electronic Cash System
ā€¢From: Satoshi Nakamoto <satoshi <at> vistomail.com>
Subject: Bitcoin P2P e-cash paper
Newsgroups: gmane.comp.encryption.general
Date: Friday 31st October 2008 18:10:00 UTC
ā€¢ā€œI've been working on a new electronic cash system
that's fully peer-to-peer, with no trusted third party.ā€
A new layer?: Programmable transactions
- 2009 ???
Ethernet - 1974
TCP/IP - 1974
HTTP- 1990
SSL / TLS - 1996
1979
1984
1995
1998
34
Blockchain Technology
timestamped
append-only log auditable database network consensus protocol
Secured via cryptography
ā€¢ Hash functions for tamper
resistance and integrity
ā€¢ Digital signatures for consent
Consensus for agreement
Addresses ā€˜cost of trustā€™
(Byzantine Generals problem)
ā€¢ Permissioned
ā€¢ Permissionless
7
30
Blockchain Technology
ā€¢ Verifiably moves ā€˜dataā€™ on a decentralized network
ā€¢ The ā€˜dataā€™ can represent value or computer code
ā€¢ Thus it goes directly to the plumbing of the financial sector and money
ā€¢ Broad adoption rests on addressing technical, commercial and public
policy hurdles
ā€¢ It can be a catalyst for change in the world of finance and money
Purpose of Blockchain
The purpose of a blockchain is to have a network of
computers agree upon a common state of data.
Plain and simple. Any person or organization should be
able to participate in this process. No person or
organization should be able to control this process.
With a blockchain we can decentralize where code runs
and agree on the output.
There is no single owner of the code's execution
The code always runs as programmed.
The code is transparently verifiable
Pizza for bitcoins?
May 18, 2010, 12:35:20 AM
ā€¢ ā€œI'll pay 10,000 bitcoins for a couple of pizzas.. like maybe 2 large ones so I have some
left over for the next day. I like having left over pizza to nibble on later. You can make
the pizza yourself and bring it to my house or order it for me from a delivery place, but
what I'm aiming for is getting food delivered in exchange for bitcoins where I don't have
to order or prepare it myself, kind of like ordering a 'breakfast platter' at a hotel or
something, they just bring you something to eat and you're happy!
ā€¢ I like things like onions, peppers, sausage, mushrooms, tomatoes, pepperoni, etc.. just
standard stuff no weird fish topping or anything like that. I also like regular cheese
pizzas which may be cheaper to prepare or otherwise acquire.
ā€¢ If you're interested please let me know and we can work out a deal.
ā€¢ Thanks,
Laszloā€ 16
33
Re: Pizza for bitcoins?
May 21, 2010, 07:06:58 PM
ā€¢ ā€œSo nobody wants to buy me pizza? Is the bitcoin amount I'm offering
too low?ā€
34
Re: Pizza for bitcoins?
May 22, 2010, 07:17:26 PM
ā€¢ ā€œI just want to report that I successfully traded 10,000 bitcoins for
pizza.
Pictures: http://heliacal.net/~solar/bitcoin/pizza/
Thanks jercos!ā€
35
Medium of Exchange:
10,000 Bitcoins for 2 Pizzas
ā€¢ Value:
ā€¢ May 22, 2010 - $41
ā€¢ $20.50 per pizza
ā€¢ September 23, 2023 ā€“ Rs. 22,09,75,36,390 (220 crores)
ā€¢ Rs.110 crores per pizza
8
Bitcoin ā€“ Technical Features
ā€¢ Cryptographic Hash Functions
ā€¢ Timestamped Append-only Logs (Blocks)
ā€¢ Block Headers & Merkle Trees
ā€¢ Asymmetric Cryptography & Digital Signatures
ā€¢ Addresses
ā€¢ Consensus through Proof of Work
ā€¢ Network of Nodes
ā€¢ Native Currency
ā€¢ Transaction Inputs & Outputs
ā€¢ Unspent Transaction Output (UTXO)
ā€¢ Scripting language
NODES IN
BLOCKCHAIN
ā€œOn the most basic level, a
node is simply a device
running the software of a
specific blockchain.ā€
ā€œNodes are the source of
source of truth for a
a blockchain.ā€
Timestamped Append-only Log - Blockchain
Image is in the public domain by National Institute of Standards and Technology. 13
Merkle Tree ā€“ Binary Data Tree with Hashes
15
Image is in the public domain by National Institute Standards and Technology.
We will Explore a Range of Perspectives
Bitcoin Minimalist
Smart Contract Minimalist
Blockchain Minimalist
Bitcoin Maximalist
Smart Contract Maximalist
Blockchain Maximalist
But Anchor our Discussion in the Middle
41
Blockchain ā€“ Proof of Work
Innovation ā€“ Chained Proof of Work for Distributed Network Consensus & Timestamping
Ā© Cryptographics.info. All rights reserved. This content is excluded from our Creative Commons license. For more information, see https://ocw.mit.edu/help/faq-fair-use/
16
Blockchain ā€“ Proof of Work
Image by Anders Brownworth. Used with permission.
17
Blockchain ā€“ Proof of Work
Image by Anders Brownworth. Used with permission.
18
Cryptography
Cryptography is the science and practice of securing communication and data by
converting information into an unreadable format, which can only be deciphered by
authorized individuals . The primary goal of cryptography is to ensure the
confidentiality, integrity, and authenticity of information.
Types of Cryptography
1) Symmetric Key Encryption (Eg-AES 256)
2) Asymmetric Key Encryption
A cryptographic hash function is a mathematical algorithm that takes an input (or message) and produces a fixed-size
string of characters, which is typically a hexadecimal number. The key properties of a cryptographic hash function are:
SHA-256 (Secure Hash Algorithm 256-bit) is a cryptographic hash function that is commonly used in blockchain
technology, including in popular cryptocurrencies like Bitcoin. It plays a critical role in ensuring the security and integrity
of blockchain data. Here's an explanation of how SHA-256 works and its role in blockchain:
3) Cryptographic Hash Functions
ā€¢ Deterministic: The same input will always
produce the same hash value.
ā€¢ Fast to Compute: It's computationally efficient to
calculate the hash value for any given input.
ā€¢ Irreversible: It should be nearly impossible to
reverse the process and derive the original input
from the hash value.
ā€¢ Avalanche Effect: A small change in the input
should result in a significantly different hash
value.
Cryptography in Blockchain
Cryptography plays a fundamental role in blockchain technology:
ā€¢ Securing Transactions: In blockchain, cryptography is used to secure transactions. Each transaction is encrypted to
ensure that only the intended parties can access the details, making it highly secure and tamper-resistant.
ā€¢ Digital Signatures: Blockchain users have public and private keys. Public keys are like usernames, and private keys are
secret passwords. When someone wants to make a transaction, they use their private key to create a digital signature.
Others can use their public key to verify that the transaction is valid and came from the right person.
ā€¢ Mining and Consensus: Cryptography is used in the mining process, where miners solve complex cryptographic puzzles
to validate and add new blocks to the blockchain. This process ensures the integrity and security of the blockchain's
transaction history.
How Cryptography makes Cryptocurrency Secure ?
Types of Blockchain
1) Public
2) Private
3) Hybrid
4) Consortium
BenefitsofBlockchain
ļ‚§ Security
ļ‚§ Transparency
ļ‚§ Immutability
ļ‚§ Faster Transactions
SECURITY
In the digital age, security is paramount. Our personal information, financial assets, and
even the integrity of our systems are constantly under threat from malicious actors.
This is where blockchain comes in as a game-changer.
ļ‚§ When a transaction is added to the blockchain, it is stored in a block that is linked to the
previous one using complex mathematical algorithms.
ļ‚§ Traditional centralized systems have single points of failure. In contrast, blockchain is
decentralized, meaning data is distributed across a network of computers. There is no
single vulnerable point for attackers to exploit. Even if one node is compromised, the rest of
the network remains secure.
ļ‚§ Once data is recorded on the blockchain, it cannot be altered or deleted.
Transparency
Immutability
immutability refers to the quality of being unchangeable or
unalterable. In the context of technology and data, it means that
once information is recorded or stored, it cannot be modified or
deleted.
Blockchain ā€“ Consensus supports Longest Chain
19
Image by Meek Mark on Wikipedia . CC BY.
20
Bitcoin Proof of Work Difficulty
ā€¢ Targets 10 minute average block generation time
ā€¢ Defined by the # of leading zeros Hash output requires to solve proof of work
ā€¢ Adjusts every 2016 blocks - about every two weeks
ā€¢ Currently, > 18 leading zeros (out of 64 hexadecimal characters)
ā€¢ Block 541974 (9/18/18)- 18 leading zeros
0000000000000000001104a863046dfbad1a2941128815669623ff93c2a3945f
ā€¢ Genesis Block (1/3/09) ā€“ 10 leading zeros, though only required 8
000000000019d6689c085ae165831e934ff763ae46a2a6c172b3f1b60a8ce26f
Bitcoin Mining Difficulty
21
Courtesy of Blockchain Luxembourg S.A. Used with permission.
Source: Blockchain.com
Bitcoin Mining Evolution
Application Specific Integrated Circuit
(ASICs) 2013 ā€“ 2018
4 ā€“ 16 TH/S
Image by InstagramFOTOGRAFIN on Pixabay.
Graphics Processing Units
(GPUs) 2010 ā€“ 2013
20 - 300 MH/S
Image is in the public domain.
Central Processing Units
(CPUs) 2009 ā€“ 2010
2 - 20 MH/S
Image by MiNE on flickr. CC BY
Modern Mining Factory
Image by Axel Castillo. CC0 Public Domain.
23
Vitalik Buterin Trilemma
Decentralization
Scalability
Security
Native Currency
Economic Incentive System
ā€˜Monetary Policiesā€™ vary widely
ā€¢ Bitcoin - BTC
ā€¢ Created through Coinbase Transaction in each block
ā€¢ ā€˜Monetary Policyā€™ preset in Bitcoin Core
ā€¢ Creation originally 50 Bitcoin per block
ā€¢ Reward halves (1/2s) every 210,000 blocks
ā€¢ Currently 12.5 BTCs created per block ā€“ thus ā€˜inflationā€™ 4.1%
ā€¢ Currently 17.3 million BTC; capping at 21 million BTC in 2040
ā€¢ Market based transaction fee mechanism also provided for in Bitcoin Core
ā€¢ Ethereum
ā€¢ Currently 3 ETH per block ā€“ thus ā€˜inflationā€™ 7.4%
ā€¢ Recent proposal to decline to 2 ETH per block in 11/18
ā€¢ Fees paid in Gas (109 Gas per ETH) fo
25r computation are credited to miners
Bitcoin vs Ethereum Design
ā€¢ Founder: Satoshi Nakamoto
ā€¢ Genesis: January 2009
ā€¢ Code: Non Turing (Script)
ā€¢ Ledger: UTXO ā€“ Transaction
ā€¢ Merkle Trees: Transactions
ā€¢ Block Time: 10 minutes
ā€¢ Consensus: Proof of Work
ā€¢ Hash Function: SHA 256
Vatalik Buterin
July 2015
Turing Complete (Solidity,
Serpent, LLL or Mutan)
State - Account Based
Transactions, State, Storage,
Receipts (w/nonces)
14 seconds
Proof of Work
Ethash
Bitcoin ā€“ Technical Features
ā€¢ Cryptography & Timestamped Logs
ā€¢ Cryptographic Hash Functions
ā€¢ Timestamped Append-only Logs (Blocks)
ā€¢ Block Headers & Merkle Trees
ā€¢ Asymmetric Cryptography & Digital Signatures
ā€¢ Addresses
ā€¢ Decentralized Network Consensus
ā€¢ Proof of Work
ā€¢ Native Currency
ā€¢ Network
ā€¢ Transaction Script & UTXO
ā€¢ Transaction Inputs & Outputs
ā€¢ Unspent Transaction Output (UTXO) set
Ethereum?
Yes
āœ”
āœ”
āœ” āœ”
āœ”
āœ”
Yes
āœ”
āœ”
āœ”
No
State Transitions
Account Based
7 languages
ā€¢ Script language 7
Smart Contracts
ā€¢ ā€œA set of promises,
ā€¢ specified in digital form,
ā€¢ including protocols
ā€¢ within which the parties perform on these promises.ā€
Nick Szabo, 1996
However ā€¦.
ā€¢ Smart Contracts may not be ā€˜Smartā€™
ā€¢ Smart Contracts may not be ā€˜Con
6
tractsā€™
Bitcoin vs Ethereum Design
ā€¢ Currency: Bitcoin
ā€¢ Mining: ASIC
ā€¢ Hashrate: 54 Exahash/S
ā€¢ Pre-sale: None
ā€¢ Rewards: 12.5 BTC/block
ā€¢ Monetary Policy: 1/2s every
210,000 blocks (4 yrs)
ā€¢ Fees: Voluntary
ETH
GPU
260 Terahash/S
ICO & prerelease of 72 m ETH
3 ETH/block
Fixed, but changes by updates
(was 5/block; proposal to 2)
Needed & market based
9
11
Smart Contract Potential Use Cases
ā€¢ Digital Identity
ā€¢ Securities
ā€¢ Derivatives
ā€¢ Mortgages
ā€¢ Supply Chain
ā€¢ Clinical Trials
Records
Trade Finance
Financial Data
Land Title
Auto Insurance
Cancer Research
10
Smart Contract Platforms
ā€¢ Ethereum (2015) - $22 b current market value
ā€¢ EOS (2018) - $5 b ā€“ completed $4.2 b year long ICO in July
ā€¢ NEO (2016) ā€“ $1.1 b - China; delegated BFT; supports wider range of code
ā€¢ Ethereum Classic (2016) ā€“ $1.1 b - Created from the ā€˜DAOā€™ hard fork
ā€¢ LISK (2016) ā€“ $360 m - code in Java; uses side chains
ā€¢ Stratis (2017) - $150 m
What is the Role of Finance?
Moving, Allocating & Pricing:
Money
Image by thomasjphotos on flickr.
CC BY-NC-SA
Throughout the Economy
Image by Jamie on flickr. CC BY.
Risk
Image by Marco Verch. License CC BY
73
Financial Sector Challenges =>
Blockchain Potential Opportunities
ā€¢ Repeated crises and instability
ā€¢ Fiat currency instabilities associated with unsound policies
ā€¢ Centralized intermediariesā€™ concentrate risks & economic rents
ā€¢ Central Bank legacy payment systems
ā€¢ Clearing & settlement costs & counterparty risks
ā€¢ Financial inclusion
ā€¢ Payment system costs: Ā½ - 1 % of Global GDP
ā€¢ Financial sector costs: 7 Ā½ % of U.S. GDP 23
Challenges with Blockchain Technology
ā€¢ Performance, Scalability, & Efficiency
ā€¢ Privacy & Security
ā€¢ Interoperability
ā€¢ Governance & Collective Action
ā€¢ Commercial Use Cases
ā€¢ Public Policy & Legal Frameworks
9
9
Privacy & Security
ā€¢ Contradictory Tensions of Pseudonymous Addresses
ā€¢ Law Enforcement & Regulators want more Transparency
ā€¢ Financial Institutions, Regulators & Some Users want less Public Transparency
ā€¢ Concerns about Privacy Coins & Mechanisms Fostering Illicit Activities
ā€¢ Coins: Dash, Monero, Zcash
ā€¢ Mechanisms: Mixers or Tumblers
ā€¢ Cybersecurity Challenges of Private Key Custody, Generation & Storage
ā€¢ Significant Losses due to Hacks, Mismanagement and Thefts
ā€¢ Possible Solutions involve a) Zero Knowledge Proofs & b) Pedersen Commitments
ā€¢ Cryptographic Primitives that: a) lets Someone Prove a Statement is True
without Revealing the Details of Exactly why that Statement is True &
b) commit to data (like hash) but can 1
a
5
lso combine commitments

More Related Content

Similar to Blockchain Workshop

Presentation on Financial Management
Presentation on Financial ManagementPresentation on Financial Management
Presentation on Financial ManagementSaroj Das
Ā 
Bitcoin-the Currency of Future
Bitcoin-the Currency of FutureBitcoin-the Currency of Future
Bitcoin-the Currency of FutureNiraj Dholakia
Ā 
Why buy bitcoins?
Why buy bitcoins?Why buy bitcoins?
Why buy bitcoins?adelonge
Ā 
Introduction to Blockchain, Crypto and Public Relations
Introduction to Blockchain, Crypto and Public RelationsIntroduction to Blockchain, Crypto and Public Relations
Introduction to Blockchain, Crypto and Public RelationsLars Voedisch
Ā 
Why Bitcoin Matters
Why Bitcoin MattersWhy Bitcoin Matters
Why Bitcoin MattersSteven Rhyner
Ā 
Bitcoins, blockchains and beyond
Bitcoins, blockchains and beyondBitcoins, blockchains and beyond
Bitcoins, blockchains and beyondjhaand
Ā 
Bitcoin: The Internet of Money
Bitcoin: The Internet of MoneyBitcoin: The Internet of Money
Bitcoin: The Internet of Moneywinklevosscap
Ā 
Bitcoin and Blockchains
Bitcoin and BlockchainsBitcoin and Blockchains
Bitcoin and BlockchainsSam Bowne
Ā 
Cryptocurrency
CryptocurrencyCryptocurrency
CryptocurrencyRandi130025
Ā 
Crypto currencies presentation by Dr. Andre Gholam
Crypto currencies presentation by Dr. Andre GholamCrypto currencies presentation by Dr. Andre Gholam
Crypto currencies presentation by Dr. Andre GholamPMILebanonChapter
Ā 
Bitcoin and the Rise of the Block Chains
Bitcoin and the Rise of the Block ChainsBitcoin and the Rise of the Block Chains
Bitcoin and the Rise of the Block ChainsDallas Kennedy
Ā 
What is Bitcoin and How is it related to Satoshi Nakamoto White Paper.pdf
What is Bitcoin and How is it related to Satoshi Nakamoto White Paper.pdfWhat is Bitcoin and How is it related to Satoshi Nakamoto White Paper.pdf
What is Bitcoin and How is it related to Satoshi Nakamoto White Paper.pdfSuraj Sharma
Ā 
Dubai Blockchain_channel_22072018
Dubai Blockchain_channel_22072018Dubai Blockchain_channel_22072018
Dubai Blockchain_channel_22072018Pekka Kelkka
Ā 
Bitcoin School Project
Bitcoin School ProjectBitcoin School Project
Bitcoin School ProjectAkashdeepKumar1
Ā 
Cryptocurrencies and the Banking Sector
Cryptocurrencies and the Banking SectorCryptocurrencies and the Banking Sector
Cryptocurrencies and the Banking SectorIlan Alon
Ā 
Bitcoin and Blockchain Technology: Hayek Money
Bitcoin and Blockchain Technology: Hayek MoneyBitcoin and Blockchain Technology: Hayek Money
Bitcoin and Blockchain Technology: Hayek MoneyFerdinando Maria Ametrano
Ā 
Bitcoin and Blockchains
Bitcoin and BlockchainsBitcoin and Blockchains
Bitcoin and BlockchainsSam Bowne
Ā 
Dubai blockchain channel 29th of july (4)
Dubai blockchain channel 29th of    july (4)Dubai blockchain channel 29th of    july (4)
Dubai blockchain channel 29th of july (4)Pekka Kelkka
Ā 
#blockchain_hashin_bitcoin_cryptocurranies
#blockchain_hashin_bitcoin_cryptocurranies#blockchain_hashin_bitcoin_cryptocurranies
#blockchain_hashin_bitcoin_cryptocurraniesMoaaz Mohamed
Ā 

Similar to Blockchain Workshop (20)

The Future of Bitcoin
The Future of BitcoinThe Future of Bitcoin
The Future of Bitcoin
Ā 
Presentation on Financial Management
Presentation on Financial ManagementPresentation on Financial Management
Presentation on Financial Management
Ā 
Bitcoin-the Currency of Future
Bitcoin-the Currency of FutureBitcoin-the Currency of Future
Bitcoin-the Currency of Future
Ā 
Why buy bitcoins?
Why buy bitcoins?Why buy bitcoins?
Why buy bitcoins?
Ā 
Introduction to Blockchain, Crypto and Public Relations
Introduction to Blockchain, Crypto and Public RelationsIntroduction to Blockchain, Crypto and Public Relations
Introduction to Blockchain, Crypto and Public Relations
Ā 
Why Bitcoin Matters
Why Bitcoin MattersWhy Bitcoin Matters
Why Bitcoin Matters
Ā 
Bitcoins, blockchains and beyond
Bitcoins, blockchains and beyondBitcoins, blockchains and beyond
Bitcoins, blockchains and beyond
Ā 
Bitcoin: The Internet of Money
Bitcoin: The Internet of MoneyBitcoin: The Internet of Money
Bitcoin: The Internet of Money
Ā 
Bitcoin and Blockchains
Bitcoin and BlockchainsBitcoin and Blockchains
Bitcoin and Blockchains
Ā 
Cryptocurrency
CryptocurrencyCryptocurrency
Cryptocurrency
Ā 
Crypto currencies presentation by Dr. Andre Gholam
Crypto currencies presentation by Dr. Andre GholamCrypto currencies presentation by Dr. Andre Gholam
Crypto currencies presentation by Dr. Andre Gholam
Ā 
Bitcoin and the Rise of the Block Chains
Bitcoin and the Rise of the Block ChainsBitcoin and the Rise of the Block Chains
Bitcoin and the Rise of the Block Chains
Ā 
What is Bitcoin and How is it related to Satoshi Nakamoto White Paper.pdf
What is Bitcoin and How is it related to Satoshi Nakamoto White Paper.pdfWhat is Bitcoin and How is it related to Satoshi Nakamoto White Paper.pdf
What is Bitcoin and How is it related to Satoshi Nakamoto White Paper.pdf
Ā 
Dubai Blockchain_channel_22072018
Dubai Blockchain_channel_22072018Dubai Blockchain_channel_22072018
Dubai Blockchain_channel_22072018
Ā 
Bitcoin School Project
Bitcoin School ProjectBitcoin School Project
Bitcoin School Project
Ā 
Cryptocurrencies and the Banking Sector
Cryptocurrencies and the Banking SectorCryptocurrencies and the Banking Sector
Cryptocurrencies and the Banking Sector
Ā 
Bitcoin and Blockchain Technology: Hayek Money
Bitcoin and Blockchain Technology: Hayek MoneyBitcoin and Blockchain Technology: Hayek Money
Bitcoin and Blockchain Technology: Hayek Money
Ā 
Bitcoin and Blockchains
Bitcoin and BlockchainsBitcoin and Blockchains
Bitcoin and Blockchains
Ā 
Dubai blockchain channel 29th of july (4)
Dubai blockchain channel 29th of    july (4)Dubai blockchain channel 29th of    july (4)
Dubai blockchain channel 29th of july (4)
Ā 
#blockchain_hashin_bitcoin_cryptocurranies
#blockchain_hashin_bitcoin_cryptocurranies#blockchain_hashin_bitcoin_cryptocurranies
#blockchain_hashin_bitcoin_cryptocurranies
Ā 

More from SahithiGurlinka

GDSC - GVPCE -Workshop on Git and GitHub
GDSC - GVPCE -Workshop on Git and GitHubGDSC - GVPCE -Workshop on Git and GitHub
GDSC - GVPCE -Workshop on Git and GitHubSahithiGurlinka
Ā 
GDSC Google Cloud Study jam Web Bootcamp - Day-4 Session 4
GDSC  Google Cloud Study jam Web Bootcamp - Day-4  Session 4GDSC  Google Cloud Study jam Web Bootcamp - Day-4  Session 4
GDSC Google Cloud Study jam Web Bootcamp - Day-4 Session 4SahithiGurlinka
Ā 
GDSC Google Cloud Study Jams Session - 3
GDSC Google Cloud Study Jams  Session -  3GDSC Google Cloud Study Jams  Session -  3
GDSC Google Cloud Study Jams Session - 3SahithiGurlinka
Ā 
GDSC Web Bootcamp - Day - 2 - JavaScript
GDSC Web Bootcamp -  Day - 2   - JavaScriptGDSC Web Bootcamp -  Day - 2   - JavaScript
GDSC Web Bootcamp - Day - 2 - JavaScriptSahithiGurlinka
Ā 
Beyond Words: Journey into Large Language Models(LLMs) - Day-1
Beyond Words: Journey into Large Language Models(LLMs) - Day-1Beyond Words: Journey into Large Language Models(LLMs) - Day-1
Beyond Words: Journey into Large Language Models(LLMs) - Day-1SahithiGurlinka
Ā 
GCSJ Session 4.pdf
GCSJ Session 4.pdfGCSJ Session 4.pdf
GCSJ Session 4.pdfSahithiGurlinka
Ā 
Cloud AI GenAI Overview.pptx
Cloud AI GenAI Overview.pptxCloud AI GenAI Overview.pptx
Cloud AI GenAI Overview.pptxSahithiGurlinka
Ā 
GDSC Study Jam Session 1
GDSC Study Jam Session 1GDSC Study Jam Session 1
GDSC Study Jam Session 1SahithiGurlinka
Ā 
Hacktoberfest.pptx
Hacktoberfest.pptxHacktoberfest.pptx
Hacktoberfest.pptxSahithiGurlinka
Ā 
Google Cloud Study Jams
Google Cloud Study JamsGoogle Cloud Study Jams
Google Cloud Study JamsSahithiGurlinka
Ā 
Building Career in Tech.pdf
Building Career in Tech.pdfBuilding Career in Tech.pdf
Building Career in Tech.pdfSahithiGurlinka
Ā 
Info Session 2023-24.pdf
Info Session 2023-24.pdfInfo Session 2023-24.pdf
Info Session 2023-24.pdfSahithiGurlinka
Ā 

More from SahithiGurlinka (13)

GDSC - GVPCE -Workshop on Git and GitHub
GDSC - GVPCE -Workshop on Git and GitHubGDSC - GVPCE -Workshop on Git and GitHub
GDSC - GVPCE -Workshop on Git and GitHub
Ā 
GDSC Google Cloud Study jam Web Bootcamp - Day-4 Session 4
GDSC  Google Cloud Study jam Web Bootcamp - Day-4  Session 4GDSC  Google Cloud Study jam Web Bootcamp - Day-4  Session 4
GDSC Google Cloud Study jam Web Bootcamp - Day-4 Session 4
Ā 
GDSC Google Cloud Study Jams Session - 3
GDSC Google Cloud Study Jams  Session -  3GDSC Google Cloud Study Jams  Session -  3
GDSC Google Cloud Study Jams Session - 3
Ā 
GDSC Web Bootcamp - Day - 2 - JavaScript
GDSC Web Bootcamp -  Day - 2   - JavaScriptGDSC Web Bootcamp -  Day - 2   - JavaScript
GDSC Web Bootcamp - Day - 2 - JavaScript
Ā 
Beyond Words: Journey into Large Language Models(LLMs) - Day-1
Beyond Words: Journey into Large Language Models(LLMs) - Day-1Beyond Words: Journey into Large Language Models(LLMs) - Day-1
Beyond Words: Journey into Large Language Models(LLMs) - Day-1
Ā 
GCSJ Session 4.pdf
GCSJ Session 4.pdfGCSJ Session 4.pdf
GCSJ Session 4.pdf
Ā 
AlgoChase.pptx
AlgoChase.pptxAlgoChase.pptx
AlgoChase.pptx
Ā 
Cloud AI GenAI Overview.pptx
Cloud AI GenAI Overview.pptxCloud AI GenAI Overview.pptx
Cloud AI GenAI Overview.pptx
Ā 
GDSC Study Jam Session 1
GDSC Study Jam Session 1GDSC Study Jam Session 1
GDSC Study Jam Session 1
Ā 
Hacktoberfest.pptx
Hacktoberfest.pptxHacktoberfest.pptx
Hacktoberfest.pptx
Ā 
Google Cloud Study Jams
Google Cloud Study JamsGoogle Cloud Study Jams
Google Cloud Study Jams
Ā 
Building Career in Tech.pdf
Building Career in Tech.pdfBuilding Career in Tech.pdf
Building Career in Tech.pdf
Ā 
Info Session 2023-24.pdf
Info Session 2023-24.pdfInfo Session 2023-24.pdf
Info Session 2023-24.pdf
Ā 

Recently uploaded

Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
Ā 
ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)Dr. Mazin Mohamed alkathiri
Ā 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitolTechU
Ā 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
Ā 
18-04-UA_REPORT_MEDIALITERAŠ”Y_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAŠ”Y_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAŠ”Y_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAŠ”Y_INDEX-DM_23-1-final-eng.pdfssuser54595a
Ā 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
Ā 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Celine George
Ā 
ā€œOh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
ā€œOh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...ā€œOh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
ā€œOh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
Ā 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...jaredbarbolino94
Ā 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Jisc
Ā 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxDr.Ibrahim Hassaan
Ā 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
Ā 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
Ā 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
Ā 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxEyham Joco
Ā 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfUjwalaBharambe
Ā 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxJiesonDelaCerna
Ā 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
Ā 

Recently uploaded (20)

Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
Ā 
ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)
Ā 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptx
Ā 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
Ā 
18-04-UA_REPORT_MEDIALITERAŠ”Y_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAŠ”Y_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAŠ”Y_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAŠ”Y_INDEX-DM_23-1-final-eng.pdf
Ā 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
Ā 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17
Ā 
ā€œOh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
ā€œOh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...ā€œOh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
ā€œOh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
Ā 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...
Ā 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...
Ā 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptx
Ā 
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
Ā 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
Ā 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
Ā 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
Ā 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptx
Ā 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Ā 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptx
Ā 
Model Call Girl in Bikash Puri Delhi reach out to us at šŸ”9953056974šŸ”
Model Call Girl in Bikash Puri  Delhi reach out to us at šŸ”9953056974šŸ”Model Call Girl in Bikash Puri  Delhi reach out to us at šŸ”9953056974šŸ”
Model Call Girl in Bikash Puri Delhi reach out to us at šŸ”9953056974šŸ”
Ā 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
Ā 

Blockchain Workshop

  • 1. The Internet: Layers of open protocols Ethernet - 1974 TCP/IP - 1974 HTTP- 1990 1979 1984 1995 1
  • 2. ā€˜The Netā€™ opening scene 1995 5 Ā© Columbia Pictures. All rights reserved. This content is excluded from our Creative Commons license. For more information, see https://ocw.mit.edu/help/faq-fair-use/ Sandra Bullo 5 ck
  • 3. First online sale: Pizza Hut in 1994 But money changed hands with delivery Ā© Pizza Hut. All rights reserved. This content is excluded from our Creative Commons license. For more information, see https://ocw.mit.edu/help/faq-fair-use/ 6
  • 4. Cryptography: Communications in the presence of adversaries Scytale Cipher Enigma Machine Asymmetric Cryptography Ancient Times 1920s - WWII 1976 to today Image is in the public domain via Wikipedia. Ā© Luringen on Wikimedia Commons. License CC BY-SA. All Image by CIA and in the public domain via Wikimedia Commons. rights reserved. This content is excluded from our Creative Commons license. For more information, see https://ocw.mit.edu/help/faq-fair-use/ 7
  • 5. 5 Early Cryptographic Digital Currencies Failed ā€¢ DigiCash (David Chaum) ā€“ 1989 ā€¢ Mondex (National Westminster Bank) - 1993 ā€¢ CyberCash (Lynch, Melton, Crocker & Wilson) ā€“ 1994
  • 6. The Internet: Cryptographic protocols Ethernet - 1974 TCP/IP - 1974 HTTP- 1990 SSL / TLS ā€“ 1996 1979 1984 1994 1998 6
  • 7. 7 Further Cryptographic Digital Currencies Failed ā€¢ DigiCash (David Chaum) ā€“ 1989 ā€¢ Mondex (National Westminster Bank) - 1993 ā€¢ CyberCash (Lynch, Melton, Crocker & Wilson) ā€“ 1994 ā€¢ E-gold (Gold & Silver Reserve) ā€“ 1996 ā€¢ Hashcash (Adam Back) ā€“ 1997 ā€¢ Bit Gold (Nick Szabo) ā€“ 1998 ā€¢ B-Money (Wei Dai) - 1998 ā€¢ Lucre (Ben Laurie) ā€“ 1999
  • 8. Digital Payments Innovation, though, Continued 2003 8 2007
  • 9. Role of Money Ā© Source Unknown. All rights reserved. This content is excluded from our Creative Commons license. For more information, see https://ocw.mit.edu/help/faq-fair-use/ Medium of Exchange Image by Rob Pongsajapan on flickr. CC BY. Store of Value Image by ajalfaro on flickr. CC BY-NC-SA Unit of Account 25
  • 10. Non Metal Money Image in the public domain by Gary Todd. Image by Bertramz on Wikimedia. Licesne: CC BY Salt Bars - Ethiopia Cowrie Shells - Nigeria Image by Sandsteinon Wikimedia.License CC-BY Image by Yusuke Kawasaki on Wikimedia. License: CC BY Tally Sticks - England Rai Stones - Yap 8
  • 11. Metal Money Bronze Aes Rude - Rome Ā© Chuy1530on Wikipedia. All rights reserved. This content is excluded from our Creative Commons license. For more information, see https://ocw.mit.edu/help/faq-fair-use/. Bronze Spade - China Image by Mary Harrsch on flickr. License CC BY-NC-SA Cooper Plate - Sweden Ā© StAnselm on Wikipedia. All rights reserved. This content is excluded from our Creative Commons license. For more information, see https://ocw.mit.edu/help/faq-fair-use/ 9
  • 12. Minted Money Image by Daderot on Wikimedia. License: CC0. Image is in the public domain. Image by Scott Semans World Coins. License: CC BY. Bronze Yuan - China Silver Dekadrachm - Greece Gold Aureus - Rome 10
  • 13. Paper Money Jiaozi Promissory Note - China I 5 Pound Note - England Continental Note ā€“ U.S. Images are in the public domain. 11
  • 14. Private Bank Notes United States Australia Canada England Images are in the public domain. 12
  • 15. Ledgers Principal Recordings of Accounts Proto Cuneiform Uruk, ca 3000 B.C Personal Ledger George Washington 1747 Images are in the public domain. 13
  • 16. Ledgers Principal Recordings of Accounts: Economic Activity Financial Relationships Types of Ledgers: Transaction vs. Balance General vs. Supporting or Sub Single Entry vs. Double Entry 14
  • 17. Characteristics of Good Ledgers ā€¢ Immutable, Consistency ā€¢ Timestamped ā€¢ Ownership ā€¢ Accuracy ā€¢ Description of Transaction ā€¢ Comprehensive 15
  • 18. Deposits & Negotiable Orders 17 Images are in the public domain.
  • 19. Fiat Currency ā€¢ Social & Economic Consensus Image by epSos.de on Wikimedia. License CC BY. ā€¢ Represented by Central Bank Liabilities & Commercial Bank Deposits ā€¢ Relies upon System of Ledgers Integrated into Fractional Banking System ā€¢ Accepted for Taxes ā€¢ Notes & Coins are Legal Tender for All Debts Public & Private ā€¢ Unique Tax Treatment 19
  • 20. Credit Cards First General Merchant Card American Express Bank of America Dinersā€™ Club First Plastic Card First General Purpose 1949 1959 Credit Card 1966 Ā© Diner's Club, American Express, Bank of America. All rights reserved. This content is excluded from our Creative Commons license. For more information, see https://ocw.mit.edu/help/faq-fair-use/ 23
  • 21. Central Banking, Money & Ledgers Image by Richard Gendal Brown from "Thoughts on the Future of Finance." Used with permission. 20
  • 22. 26 Characteristics of Money ā€¢ Durable ā€¢ Portable ā€¢ Divisible ā€¢ Uniform/Fungible (Crawfurd v. Royal Bank 1749) ā€¢ Acceptable ā€¢ Stable - Limited supply - Hard to Counterfeit
  • 23. 27 Design of Money ā€¢ Token vs. Account Based ā€¢ Physical vs. Digital ā€¢ Private Sector vs. Central Bank ā€¢ Widely Accessible vs. Wholesale
  • 24. 29 Early Cryptographic Digital Currencies ā€¦ All Failed ā€¢ DigiCash (David Chaum) ā€“ 1989 ā€¢ Mondex (National Westminster Bank) - 1993 ā€¢ CyberCash (Lynch, Melton, Crocker & Wilson) ā€“ 1994 ā€¢ E-gold (Gold & Silver Reserve) ā€“ 1996 ā€¢ Hashcash (Adam Back) ā€“ 1997 ā€¢ Bit Gold (Nick Szabo) ā€“ 1998 ā€¢ B-Money (Wei Dai) - 1998 ā€¢ Lucre (Ben Laurie) ā€“ 1999
  • 25. 30 Why did Early Digital Currencies Fail? ā€¢ Merchant adoption ā€¢ Centralization ā€¢ Double spending ā€¢ Consensus
  • 26. 32 The Riddle Remained How to move value peer-to-peer without any trusted central intermediary
  • 27. 33 Bitcoin: A Peer-to-Peer Electronic Cash System ā€¢From: Satoshi Nakamoto <satoshi <at> vistomail.com> Subject: Bitcoin P2P e-cash paper Newsgroups: gmane.comp.encryption.general Date: Friday 31st October 2008 18:10:00 UTC ā€¢ā€œI've been working on a new electronic cash system that's fully peer-to-peer, with no trusted third party.ā€
  • 28. A new layer?: Programmable transactions - 2009 ??? Ethernet - 1974 TCP/IP - 1974 HTTP- 1990 SSL / TLS - 1996 1979 1984 1995 1998 34
  • 29. Blockchain Technology timestamped append-only log auditable database network consensus protocol Secured via cryptography ā€¢ Hash functions for tamper resistance and integrity ā€¢ Digital signatures for consent Consensus for agreement Addresses ā€˜cost of trustā€™ (Byzantine Generals problem) ā€¢ Permissioned ā€¢ Permissionless 7
  • 30. 30 Blockchain Technology ā€¢ Verifiably moves ā€˜dataā€™ on a decentralized network ā€¢ The ā€˜dataā€™ can represent value or computer code ā€¢ Thus it goes directly to the plumbing of the financial sector and money ā€¢ Broad adoption rests on addressing technical, commercial and public policy hurdles ā€¢ It can be a catalyst for change in the world of finance and money
  • 31. Purpose of Blockchain The purpose of a blockchain is to have a network of computers agree upon a common state of data. Plain and simple. Any person or organization should be able to participate in this process. No person or organization should be able to control this process. With a blockchain we can decentralize where code runs and agree on the output. There is no single owner of the code's execution The code always runs as programmed. The code is transparently verifiable
  • 32. Pizza for bitcoins? May 18, 2010, 12:35:20 AM ā€¢ ā€œI'll pay 10,000 bitcoins for a couple of pizzas.. like maybe 2 large ones so I have some left over for the next day. I like having left over pizza to nibble on later. You can make the pizza yourself and bring it to my house or order it for me from a delivery place, but what I'm aiming for is getting food delivered in exchange for bitcoins where I don't have to order or prepare it myself, kind of like ordering a 'breakfast platter' at a hotel or something, they just bring you something to eat and you're happy! ā€¢ I like things like onions, peppers, sausage, mushrooms, tomatoes, pepperoni, etc.. just standard stuff no weird fish topping or anything like that. I also like regular cheese pizzas which may be cheaper to prepare or otherwise acquire. ā€¢ If you're interested please let me know and we can work out a deal. ā€¢ Thanks, Laszloā€ 16
  • 33. 33 Re: Pizza for bitcoins? May 21, 2010, 07:06:58 PM ā€¢ ā€œSo nobody wants to buy me pizza? Is the bitcoin amount I'm offering too low?ā€
  • 34. 34 Re: Pizza for bitcoins? May 22, 2010, 07:17:26 PM ā€¢ ā€œI just want to report that I successfully traded 10,000 bitcoins for pizza. Pictures: http://heliacal.net/~solar/bitcoin/pizza/ Thanks jercos!ā€
  • 35. 35 Medium of Exchange: 10,000 Bitcoins for 2 Pizzas ā€¢ Value: ā€¢ May 22, 2010 - $41 ā€¢ $20.50 per pizza ā€¢ September 23, 2023 ā€“ Rs. 22,09,75,36,390 (220 crores) ā€¢ Rs.110 crores per pizza
  • 36. 8 Bitcoin ā€“ Technical Features ā€¢ Cryptographic Hash Functions ā€¢ Timestamped Append-only Logs (Blocks) ā€¢ Block Headers & Merkle Trees ā€¢ Asymmetric Cryptography & Digital Signatures ā€¢ Addresses ā€¢ Consensus through Proof of Work ā€¢ Network of Nodes ā€¢ Native Currency ā€¢ Transaction Inputs & Outputs ā€¢ Unspent Transaction Output (UTXO) ā€¢ Scripting language
  • 37. NODES IN BLOCKCHAIN ā€œOn the most basic level, a node is simply a device running the software of a specific blockchain.ā€ ā€œNodes are the source of source of truth for a a blockchain.ā€
  • 38.
  • 39. Timestamped Append-only Log - Blockchain Image is in the public domain by National Institute of Standards and Technology. 13
  • 40. Merkle Tree ā€“ Binary Data Tree with Hashes 15 Image is in the public domain by National Institute Standards and Technology.
  • 41. We will Explore a Range of Perspectives Bitcoin Minimalist Smart Contract Minimalist Blockchain Minimalist Bitcoin Maximalist Smart Contract Maximalist Blockchain Maximalist But Anchor our Discussion in the Middle 41
  • 42. Blockchain ā€“ Proof of Work Innovation ā€“ Chained Proof of Work for Distributed Network Consensus & Timestamping Ā© Cryptographics.info. All rights reserved. This content is excluded from our Creative Commons license. For more information, see https://ocw.mit.edu/help/faq-fair-use/ 16
  • 43. Blockchain ā€“ Proof of Work Image by Anders Brownworth. Used with permission. 17
  • 44. Blockchain ā€“ Proof of Work Image by Anders Brownworth. Used with permission. 18
  • 45. Cryptography Cryptography is the science and practice of securing communication and data by converting information into an unreadable format, which can only be deciphered by authorized individuals . The primary goal of cryptography is to ensure the confidentiality, integrity, and authenticity of information.
  • 46.
  • 47. Types of Cryptography 1) Symmetric Key Encryption (Eg-AES 256)
  • 48. 2) Asymmetric Key Encryption
  • 49. A cryptographic hash function is a mathematical algorithm that takes an input (or message) and produces a fixed-size string of characters, which is typically a hexadecimal number. The key properties of a cryptographic hash function are: SHA-256 (Secure Hash Algorithm 256-bit) is a cryptographic hash function that is commonly used in blockchain technology, including in popular cryptocurrencies like Bitcoin. It plays a critical role in ensuring the security and integrity of blockchain data. Here's an explanation of how SHA-256 works and its role in blockchain: 3) Cryptographic Hash Functions ā€¢ Deterministic: The same input will always produce the same hash value. ā€¢ Fast to Compute: It's computationally efficient to calculate the hash value for any given input. ā€¢ Irreversible: It should be nearly impossible to reverse the process and derive the original input from the hash value. ā€¢ Avalanche Effect: A small change in the input should result in a significantly different hash value.
  • 50. Cryptography in Blockchain Cryptography plays a fundamental role in blockchain technology: ā€¢ Securing Transactions: In blockchain, cryptography is used to secure transactions. Each transaction is encrypted to ensure that only the intended parties can access the details, making it highly secure and tamper-resistant. ā€¢ Digital Signatures: Blockchain users have public and private keys. Public keys are like usernames, and private keys are secret passwords. When someone wants to make a transaction, they use their private key to create a digital signature. Others can use their public key to verify that the transaction is valid and came from the right person. ā€¢ Mining and Consensus: Cryptography is used in the mining process, where miners solve complex cryptographic puzzles to validate and add new blocks to the blockchain. This process ensures the integrity and security of the blockchain's transaction history.
  • 51. How Cryptography makes Cryptocurrency Secure ?
  • 52. Types of Blockchain 1) Public 2) Private 3) Hybrid 4) Consortium
  • 53.
  • 54.
  • 55. BenefitsofBlockchain ļ‚§ Security ļ‚§ Transparency ļ‚§ Immutability ļ‚§ Faster Transactions
  • 56. SECURITY In the digital age, security is paramount. Our personal information, financial assets, and even the integrity of our systems are constantly under threat from malicious actors. This is where blockchain comes in as a game-changer. ļ‚§ When a transaction is added to the blockchain, it is stored in a block that is linked to the previous one using complex mathematical algorithms. ļ‚§ Traditional centralized systems have single points of failure. In contrast, blockchain is decentralized, meaning data is distributed across a network of computers. There is no single vulnerable point for attackers to exploit. Even if one node is compromised, the rest of the network remains secure. ļ‚§ Once data is recorded on the blockchain, it cannot be altered or deleted.
  • 58. Immutability immutability refers to the quality of being unchangeable or unalterable. In the context of technology and data, it means that once information is recorded or stored, it cannot be modified or deleted.
  • 59. Blockchain ā€“ Consensus supports Longest Chain 19 Image by Meek Mark on Wikipedia . CC BY.
  • 60. 20 Bitcoin Proof of Work Difficulty ā€¢ Targets 10 minute average block generation time ā€¢ Defined by the # of leading zeros Hash output requires to solve proof of work ā€¢ Adjusts every 2016 blocks - about every two weeks ā€¢ Currently, > 18 leading zeros (out of 64 hexadecimal characters) ā€¢ Block 541974 (9/18/18)- 18 leading zeros 0000000000000000001104a863046dfbad1a2941128815669623ff93c2a3945f ā€¢ Genesis Block (1/3/09) ā€“ 10 leading zeros, though only required 8 000000000019d6689c085ae165831e934ff763ae46a2a6c172b3f1b60a8ce26f
  • 61. Bitcoin Mining Difficulty 21 Courtesy of Blockchain Luxembourg S.A. Used with permission. Source: Blockchain.com
  • 62. Bitcoin Mining Evolution Application Specific Integrated Circuit (ASICs) 2013 ā€“ 2018 4 ā€“ 16 TH/S Image by InstagramFOTOGRAFIN on Pixabay. Graphics Processing Units (GPUs) 2010 ā€“ 2013 20 - 300 MH/S Image is in the public domain. Central Processing Units (CPUs) 2009 ā€“ 2010 2 - 20 MH/S Image by MiNE on flickr. CC BY Modern Mining Factory Image by Axel Castillo. CC0 Public Domain. 23
  • 64. Native Currency Economic Incentive System ā€˜Monetary Policiesā€™ vary widely ā€¢ Bitcoin - BTC ā€¢ Created through Coinbase Transaction in each block ā€¢ ā€˜Monetary Policyā€™ preset in Bitcoin Core ā€¢ Creation originally 50 Bitcoin per block ā€¢ Reward halves (1/2s) every 210,000 blocks ā€¢ Currently 12.5 BTCs created per block ā€“ thus ā€˜inflationā€™ 4.1% ā€¢ Currently 17.3 million BTC; capping at 21 million BTC in 2040 ā€¢ Market based transaction fee mechanism also provided for in Bitcoin Core ā€¢ Ethereum ā€¢ Currently 3 ETH per block ā€“ thus ā€˜inflationā€™ 7.4% ā€¢ Recent proposal to decline to 2 ETH per block in 11/18 ā€¢ Fees paid in Gas (109 Gas per ETH) fo 25r computation are credited to miners
  • 65. Bitcoin vs Ethereum Design ā€¢ Founder: Satoshi Nakamoto ā€¢ Genesis: January 2009 ā€¢ Code: Non Turing (Script) ā€¢ Ledger: UTXO ā€“ Transaction ā€¢ Merkle Trees: Transactions ā€¢ Block Time: 10 minutes ā€¢ Consensus: Proof of Work ā€¢ Hash Function: SHA 256 Vatalik Buterin July 2015 Turing Complete (Solidity, Serpent, LLL or Mutan) State - Account Based Transactions, State, Storage, Receipts (w/nonces) 14 seconds Proof of Work Ethash
  • 66. Bitcoin ā€“ Technical Features ā€¢ Cryptography & Timestamped Logs ā€¢ Cryptographic Hash Functions ā€¢ Timestamped Append-only Logs (Blocks) ā€¢ Block Headers & Merkle Trees ā€¢ Asymmetric Cryptography & Digital Signatures ā€¢ Addresses ā€¢ Decentralized Network Consensus ā€¢ Proof of Work ā€¢ Native Currency ā€¢ Network ā€¢ Transaction Script & UTXO ā€¢ Transaction Inputs & Outputs ā€¢ Unspent Transaction Output (UTXO) set Ethereum? Yes āœ” āœ” āœ” āœ” āœ” āœ” Yes āœ” āœ” āœ” No State Transitions Account Based 7 languages ā€¢ Script language 7
  • 67. Smart Contracts ā€¢ ā€œA set of promises, ā€¢ specified in digital form, ā€¢ including protocols ā€¢ within which the parties perform on these promises.ā€ Nick Szabo, 1996 However ā€¦. ā€¢ Smart Contracts may not be ā€˜Smartā€™ ā€¢ Smart Contracts may not be ā€˜Con 6 tractsā€™
  • 68. Bitcoin vs Ethereum Design ā€¢ Currency: Bitcoin ā€¢ Mining: ASIC ā€¢ Hashrate: 54 Exahash/S ā€¢ Pre-sale: None ā€¢ Rewards: 12.5 BTC/block ā€¢ Monetary Policy: 1/2s every 210,000 blocks (4 yrs) ā€¢ Fees: Voluntary ETH GPU 260 Terahash/S ICO & prerelease of 72 m ETH 3 ETH/block Fixed, but changes by updates (was 5/block; proposal to 2) Needed & market based 9
  • 69. 11 Smart Contract Potential Use Cases ā€¢ Digital Identity ā€¢ Securities ā€¢ Derivatives ā€¢ Mortgages ā€¢ Supply Chain ā€¢ Clinical Trials Records Trade Finance Financial Data Land Title Auto Insurance Cancer Research
  • 70. 10 Smart Contract Platforms ā€¢ Ethereum (2015) - $22 b current market value ā€¢ EOS (2018) - $5 b ā€“ completed $4.2 b year long ICO in July ā€¢ NEO (2016) ā€“ $1.1 b - China; delegated BFT; supports wider range of code ā€¢ Ethereum Classic (2016) ā€“ $1.1 b - Created from the ā€˜DAOā€™ hard fork ā€¢ LISK (2016) ā€“ $360 m - code in Java; uses side chains ā€¢ Stratis (2017) - $150 m
  • 71.
  • 72.
  • 73. What is the Role of Finance? Moving, Allocating & Pricing: Money Image by thomasjphotos on flickr. CC BY-NC-SA Throughout the Economy Image by Jamie on flickr. CC BY. Risk Image by Marco Verch. License CC BY 73
  • 74. Financial Sector Challenges => Blockchain Potential Opportunities ā€¢ Repeated crises and instability ā€¢ Fiat currency instabilities associated with unsound policies ā€¢ Centralized intermediariesā€™ concentrate risks & economic rents ā€¢ Central Bank legacy payment systems ā€¢ Clearing & settlement costs & counterparty risks ā€¢ Financial inclusion ā€¢ Payment system costs: Ā½ - 1 % of Global GDP ā€¢ Financial sector costs: 7 Ā½ % of U.S. GDP 23
  • 75. Challenges with Blockchain Technology ā€¢ Performance, Scalability, & Efficiency ā€¢ Privacy & Security ā€¢ Interoperability ā€¢ Governance & Collective Action ā€¢ Commercial Use Cases ā€¢ Public Policy & Legal Frameworks 9 9
  • 76. Privacy & Security ā€¢ Contradictory Tensions of Pseudonymous Addresses ā€¢ Law Enforcement & Regulators want more Transparency ā€¢ Financial Institutions, Regulators & Some Users want less Public Transparency ā€¢ Concerns about Privacy Coins & Mechanisms Fostering Illicit Activities ā€¢ Coins: Dash, Monero, Zcash ā€¢ Mechanisms: Mixers or Tumblers ā€¢ Cybersecurity Challenges of Private Key Custody, Generation & Storage ā€¢ Significant Losses due to Hacks, Mismanagement and Thefts ā€¢ Possible Solutions involve a) Zero Knowledge Proofs & b) Pedersen Commitments ā€¢ Cryptographic Primitives that: a) lets Someone Prove a Statement is True without Revealing the Details of Exactly why that Statement is True & b) commit to data (like hash) but can 1 a 5 lso combine commitments