SlideShare a Scribd company logo
Blockchain & Bitcoin
At Opera Lunch Session – Boston
By Viet Le
Events
 JP Morgan Chase & CO. chief Jamie
Dimon: bitcoin is “fraud” and anyone
who buys bitcoin is “stupid”
 Neil Dwane of Allianz Global Investors
said it’s a “scam for criminals around
the world”
 ….
 The former chief economist of the
World Bank - Joseph Stigliz: Bitcoin
'Ought to Be Outlawed,'
Objectives – To answer the questions
 How can bitcoin store the “values”?
 If yes, what could be the value of bitcoin?
Crypto Primer
Public Key Cryptography - RSA - ECDSA
Merkle's Puzzles – Public Key
Cryptography
 Alice and Bob wish to communicate securely
 Bob creates 10 puzzles:
 All must be possible for Alice to solve with a moderate amount of time.
 The puzzles are in the form of an encrypted message with an unknown key
 The key must be short enough to allow a brute force attack
 Bob sends all of the puzzles to Alice
 Alice chooses one randomly, and solves it, and gets K and ID
 Alice encrypts her message with K and send to Bob encrypted message + ID
 Bob finds the secret key paired with that ID to deciphers Alice's message
RSA Public/Private Keys
 Take the prime numbers 13 and 7
 13 * 7 = 91
 Let's take public encryption key = 5
 Private key = f(91, 5) = 29
 f = Extended Euclidean Algorithm
RSA Algorithm
 Encrypt the C = 67 (ASCII)
 Multiply it by itself pub-key times (5
times) to get the encrypted value
 67×67 = 4489 = 30
 Since 4489 is larger than max, we
have to wrap it around. We do that
by dividing by 91 and taking the
remainder.
 4489 = 91×41 + 30
 30×67 = 2010 = 8
 8×67 = 536 = 81
 81×67 = 5427 = 58
 → encrypted version of 67 is 58.
 Decrypt: the scrambled 58
 Multiply it by itself priv-key times (29
times)
 58×58 = 3364 = 88 (remember, we
wrap around when the number is
greater than max)
 88×58 = 5104 = 8
 …
 9×58 = 522 = 67
 → decrypted version of 58 is 67.
ECDSA Algorithm: y2 = x3 + ax + b
Google ECC
 max: 115792089210356248762697446949407573530086143415290314195533631308867097853951
 curve: y² = x³ + ax + b
 a = 115792089210356248762697446949407573530086143415290314195533631308867097853948
 b = 41058363725152142129326129780047268409114441015993725554835256314039467401291
 Facts:
 Breaking a 228-bit RSA key requires less energy to than it takes to boil a teaspoon
of water. Comparatively, breaking a 228-bit elliptic curve key requires enough
energy to boil all the water on earth.
 For this level of security with RSA, you'd need a key with 2,380-bits
 ECDSA signature with a 256-bit key is over 20x faster than an RSA signature with a
2,048-bit key
Blockchain Technology
Bitcoin as the side product
Blockchain - Tamper-proof distributed
public ledger that manages transactions
Bitcoin Wallet
Hot Wallet vs. Cold Wallet
Bitcoin transactions
https://blockchain.info/
Blocks
Mining
Mining = Hash(blockheader, Nonce) < 0.00000000000000000000000000…001
Next difficulty estimate: 1,473,320,706,374
Block header – Bit and Byte
Consensus
Blockchain – con’t
Mining In Old Days
Mining nowsadays
Genesis Block & Coinbase Transaction
Limited Money Supply
Fork
Happy Ending
51% Attack
Where Does Money Come From?
Gold Standard: 35 USD = 1 once
Removed Gold Standard
Dollar Creation
US National Debt
Would the same “Nixon Thing”
happens to Bitcoin ?
Hard Forks
Free Coins
Why Can’t It Be?
 No one controls bitcoin
 No way to ban bitcoin
 The unstoppable power of
leaderless
 Decentralized vs Centralized
Network
What Makes The Value of Bitcoin?
 Historical electric power consumption on mining activities
 Inventions behind blockchain technology
 Like real estate, it is Inflation free
 After all:
 It is NOT about the product, it is about FREEDOM.
 Freedom of Money
Food For Thought
 Will US National Debt Go To The Moon ?
 If Yes, then Bitcoin also goes to the Moon
 What if bitcoin would replace 15% of dollars in circulation?
 $21 Trillion x 15% / 21 Million BTC = $150,000 / BTC
 What if bitcoin become world currency?
 1 BTC = $500,000 USD
Opera Solutions - Big Data Analytics on
Block-chain
 First time in the history all the currency accounts and transactions are
available publicly
 Signals for the Price Trend Prediction ???
 Growth rate of the newly created wallets
 Growth rate of the small value transactions
 Movement of “institution wallets”
 Growth rate of the global hashing power

More Related Content

Similar to Bitcoin & Blockchain Instroduction

Smart contracts and applications part II
Smart contracts and applications   part IISmart contracts and applications   part II
Smart contracts and applications part II
vpnmentor
 
Bitcoin - Understanding and Assessing potential Opportunities
Bitcoin - Understanding and Assessing potential OpportunitiesBitcoin - Understanding and Assessing potential Opportunities
Bitcoin - Understanding and Assessing potential Opportunities
QuasarVentures
 
Think bitcoin workshop slideshare
Think bitcoin workshop slideshareThink bitcoin workshop slideshare
Think bitcoin workshop slidesharethinkbitcoin
 
theorycoin.pptx
theorycoin.pptxtheorycoin.pptx
theorycoin.pptx
Ana Fiena
 
Bitcoin Transaction Malleability
Bitcoin Transaction MalleabilityBitcoin Transaction Malleability
Bitcoin Transaction Malleability
srkedmi
 
Intro to Bitcoin
Intro to BitcoinIntro to Bitcoin
Intro to Bitcoin
Ron Gross
 
notes.pdf
notes.pdfnotes.pdf
notes.pdf
test643768
 
CRYPTO CURRENCY.pptx
CRYPTO CURRENCY.pptxCRYPTO CURRENCY.pptx
CRYPTO CURRENCY.pptx
B.VIGNESH
 
The Bitcoin blockchain (en)
The Bitcoin blockchain (en)The Bitcoin blockchain (en)
The Bitcoin blockchain (en)
Davide Carboni
 
Blockchain and Formal verification (English)
Blockchain and Formal verification (English)Blockchain and Formal verification (English)
Blockchain and Formal verification (English)
Jun Furuse
 
Bitcoin and blockchain overview
Bitcoin and blockchain overviewBitcoin and blockchain overview
Bitcoin and blockchain overview
Ansel Teng
 
Study on Bitcoin
Study on Bitcoin Study on Bitcoin
Study on Bitcoin
Dhanith Krishna
 
CRYPTO CURRENCY-2022OD205.pdf
CRYPTO CURRENCY-2022OD205.pdfCRYPTO CURRENCY-2022OD205.pdf
CRYPTO CURRENCY-2022OD205.pdf
JESUNPK
 
Tmc mastering bitcoins ppt
Tmc mastering bitcoins pptTmc mastering bitcoins ppt
Tmc mastering bitcoins ppt
Urvashi Choudhary
 
Jason simeon genge theory of coin
Jason simeon genge theory of coinJason simeon genge theory of coin
Jason simeon genge theory of coin
Jason Simeon Genge
 
WTF is Blockchain???
WTF is Blockchain???WTF is Blockchain???
WTF is Blockchain???
Guy K. Kloss
 
20170620 MEETUP intro to blockchain and smart contracts (1)
20170620 MEETUP intro to blockchain and smart contracts (1)20170620 MEETUP intro to blockchain and smart contracts (1)
20170620 MEETUP intro to blockchain and smart contracts (1)
Brussels Legal Hackers
 
HifnCrypto101
HifnCrypto101HifnCrypto101
HifnCrypto101Jim Faith
 
Introducing blockchain
Introducing blockchainIntroducing blockchain
Introducing blockchain
Lon Barfield
 
An introduction to bit coins and bit coin mining
An introduction to bit coins and bit coin miningAn introduction to bit coins and bit coin mining
An introduction to bit coins and bit coin mining
Anirudh Kadevari
 

Similar to Bitcoin & Blockchain Instroduction (20)

Smart contracts and applications part II
Smart contracts and applications   part IISmart contracts and applications   part II
Smart contracts and applications part II
 
Bitcoin - Understanding and Assessing potential Opportunities
Bitcoin - Understanding and Assessing potential OpportunitiesBitcoin - Understanding and Assessing potential Opportunities
Bitcoin - Understanding and Assessing potential Opportunities
 
Think bitcoin workshop slideshare
Think bitcoin workshop slideshareThink bitcoin workshop slideshare
Think bitcoin workshop slideshare
 
theorycoin.pptx
theorycoin.pptxtheorycoin.pptx
theorycoin.pptx
 
Bitcoin Transaction Malleability
Bitcoin Transaction MalleabilityBitcoin Transaction Malleability
Bitcoin Transaction Malleability
 
Intro to Bitcoin
Intro to BitcoinIntro to Bitcoin
Intro to Bitcoin
 
notes.pdf
notes.pdfnotes.pdf
notes.pdf
 
CRYPTO CURRENCY.pptx
CRYPTO CURRENCY.pptxCRYPTO CURRENCY.pptx
CRYPTO CURRENCY.pptx
 
The Bitcoin blockchain (en)
The Bitcoin blockchain (en)The Bitcoin blockchain (en)
The Bitcoin blockchain (en)
 
Blockchain and Formal verification (English)
Blockchain and Formal verification (English)Blockchain and Formal verification (English)
Blockchain and Formal verification (English)
 
Bitcoin and blockchain overview
Bitcoin and blockchain overviewBitcoin and blockchain overview
Bitcoin and blockchain overview
 
Study on Bitcoin
Study on Bitcoin Study on Bitcoin
Study on Bitcoin
 
CRYPTO CURRENCY-2022OD205.pdf
CRYPTO CURRENCY-2022OD205.pdfCRYPTO CURRENCY-2022OD205.pdf
CRYPTO CURRENCY-2022OD205.pdf
 
Tmc mastering bitcoins ppt
Tmc mastering bitcoins pptTmc mastering bitcoins ppt
Tmc mastering bitcoins ppt
 
Jason simeon genge theory of coin
Jason simeon genge theory of coinJason simeon genge theory of coin
Jason simeon genge theory of coin
 
WTF is Blockchain???
WTF is Blockchain???WTF is Blockchain???
WTF is Blockchain???
 
20170620 MEETUP intro to blockchain and smart contracts (1)
20170620 MEETUP intro to blockchain and smart contracts (1)20170620 MEETUP intro to blockchain and smart contracts (1)
20170620 MEETUP intro to blockchain and smart contracts (1)
 
HifnCrypto101
HifnCrypto101HifnCrypto101
HifnCrypto101
 
Introducing blockchain
Introducing blockchainIntroducing blockchain
Introducing blockchain
 
An introduction to bit coins and bit coin mining
An introduction to bit coins and bit coin miningAn introduction to bit coins and bit coin mining
An introduction to bit coins and bit coin mining
 

Recently uploaded

Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIs
Vlad Stirbu
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
UiPathCommunity
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 

Recently uploaded (20)

Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIs
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 

Bitcoin & Blockchain Instroduction

  • 1. Blockchain & Bitcoin At Opera Lunch Session – Boston By Viet Le
  • 2. Events  JP Morgan Chase & CO. chief Jamie Dimon: bitcoin is “fraud” and anyone who buys bitcoin is “stupid”  Neil Dwane of Allianz Global Investors said it’s a “scam for criminals around the world”  ….  The former chief economist of the World Bank - Joseph Stigliz: Bitcoin 'Ought to Be Outlawed,'
  • 3. Objectives – To answer the questions  How can bitcoin store the “values”?  If yes, what could be the value of bitcoin?
  • 4. Crypto Primer Public Key Cryptography - RSA - ECDSA
  • 5. Merkle's Puzzles – Public Key Cryptography  Alice and Bob wish to communicate securely  Bob creates 10 puzzles:  All must be possible for Alice to solve with a moderate amount of time.  The puzzles are in the form of an encrypted message with an unknown key  The key must be short enough to allow a brute force attack  Bob sends all of the puzzles to Alice  Alice chooses one randomly, and solves it, and gets K and ID  Alice encrypts her message with K and send to Bob encrypted message + ID  Bob finds the secret key paired with that ID to deciphers Alice's message
  • 6. RSA Public/Private Keys  Take the prime numbers 13 and 7  13 * 7 = 91  Let's take public encryption key = 5  Private key = f(91, 5) = 29  f = Extended Euclidean Algorithm
  • 7. RSA Algorithm  Encrypt the C = 67 (ASCII)  Multiply it by itself pub-key times (5 times) to get the encrypted value  67×67 = 4489 = 30  Since 4489 is larger than max, we have to wrap it around. We do that by dividing by 91 and taking the remainder.  4489 = 91×41 + 30  30×67 = 2010 = 8  8×67 = 536 = 81  81×67 = 5427 = 58  → encrypted version of 67 is 58.  Decrypt: the scrambled 58  Multiply it by itself priv-key times (29 times)  58×58 = 3364 = 88 (remember, we wrap around when the number is greater than max)  88×58 = 5104 = 8  …  9×58 = 522 = 67  → decrypted version of 58 is 67.
  • 8. ECDSA Algorithm: y2 = x3 + ax + b
  • 9. Google ECC  max: 115792089210356248762697446949407573530086143415290314195533631308867097853951  curve: y² = x³ + ax + b  a = 115792089210356248762697446949407573530086143415290314195533631308867097853948  b = 41058363725152142129326129780047268409114441015993725554835256314039467401291  Facts:  Breaking a 228-bit RSA key requires less energy to than it takes to boil a teaspoon of water. Comparatively, breaking a 228-bit elliptic curve key requires enough energy to boil all the water on earth.  For this level of security with RSA, you'd need a key with 2,380-bits  ECDSA signature with a 256-bit key is over 20x faster than an RSA signature with a 2,048-bit key
  • 11. Blockchain - Tamper-proof distributed public ledger that manages transactions
  • 13. Hot Wallet vs. Cold Wallet
  • 17. Mining Mining = Hash(blockheader, Nonce) < 0.00000000000000000000000000…001 Next difficulty estimate: 1,473,320,706,374
  • 18. Block header – Bit and Byte
  • 23. Genesis Block & Coinbase Transaction
  • 25. Fork
  • 28. Where Does Money Come From?
  • 29. Gold Standard: 35 USD = 1 once
  • 33. Would the same “Nixon Thing” happens to Bitcoin ?
  • 36. Why Can’t It Be?  No one controls bitcoin  No way to ban bitcoin  The unstoppable power of leaderless  Decentralized vs Centralized Network
  • 37. What Makes The Value of Bitcoin?  Historical electric power consumption on mining activities  Inventions behind blockchain technology  Like real estate, it is Inflation free  After all:  It is NOT about the product, it is about FREEDOM.  Freedom of Money
  • 38. Food For Thought  Will US National Debt Go To The Moon ?  If Yes, then Bitcoin also goes to the Moon  What if bitcoin would replace 15% of dollars in circulation?  $21 Trillion x 15% / 21 Million BTC = $150,000 / BTC  What if bitcoin become world currency?  1 BTC = $500,000 USD
  • 39. Opera Solutions - Big Data Analytics on Block-chain  First time in the history all the currency accounts and transactions are available publicly  Signals for the Price Trend Prediction ???  Growth rate of the newly created wallets  Growth rate of the small value transactions  Movement of “institution wallets”  Growth rate of the global hashing power