SlideShare a Scribd company logo
1 of 93
BLOCKCHAIN
By Narendranath Reddy
Distributed Ledger
Name: Narendranath Reddy Thota
 d3 Whitepaper Core Team
 Trainer from Gama
 Blockchain Full Stack Developer
 Technology Analyst
 Software Developer
 Technology Speaker
MAERSK
Email: narendranath.thota@ust-global.com
P: +917288838869
Blockchain
 At a very high level, the Blockchain is a decentralized ledger, or list, of all transactions
across a peer-to-peer network. This is the technology underlying Bitcoin and other
cryptocurrencies, and it has the potential to disrupt a wide variety of business
processes.
 If the Internet is the foundation for digital innovation of all kinds, Blockchain technology
is the underpinning of a radical rethinking of how we pay for things—as well as how we
verify who owns what and who has the right to buy and sell it.
BlockChain what?
 No one knows who invented blockchain.
 The idea for it came from a paper published
online eight years ago
 The author, Satoshi Nakamoto, is thought to be
using a pseudonym.
BLOCKCHAIN Is Like
“The blockchain is a simple digital platform for
recording and verifying transactions so that
other people can’t erase them later -- and
anyone can see them.” - GIZMODO
Fiat Currency Characteristics
Cryptocurrency
1000+
Cryptographic Hash Functions
Merkle Tree
Digital Signatures
16
How does it work?
Source: http://blockgeeks.com/
17
Key Concepts
Public Key: (a long, randomly-generated string of numbers) is a users’ address on the
blockchain. Transactions (money sent from) get recorded as belonging to that address.
Private Key: Gives its owner access to their digital assets. Store your data on the
blockchain and it is incorruptible.
Replication: Every node in a decentralized system has a copy of the blockchain. No
centralized "official" copy exists and no user is "trusted" more than any
other. Transactions are broadcast to the network using software applications.
Mining nodes: They validate transactions, add them to the block they're creating and
then broadcast the completed block to other nodes. Blockchains use various
timestamping schemes, such as proof-of-work to serialize changes.
Peers keep the highest scoring version of the database that they currently know of.
Whenever a peer receives a higher scoring version (usually the old version with a single
new block added) they extend or overwrite their own database and retransmit the
improvement to their peers.
Encryption
Replication
Integrity
When miners try to compute a block, they pick all transactions that they want to be
added in the block, plus one coinbase (generation) transaction to their address.
For a block to be accepted by the network it needs to contain only valid transactions:
inputs that are not yet spent, inputs that have the valid amount, signature that verifies
ok and etc...
Mining
Bitcoin
Bitcoin Address Generation
http://lenschulwitz.com/base58
Private Key ECM – Elliptical Cure Multiplication
Transactions
Why Gopesh’s
Output is Unspent?
 Outputs of a transaction are initially unspent outputs, until
they are used as the input for another transaction, then they
are spent outputs.
The balance of an address is the sum of all unspent outputs
that were sent to that address.
Answer
Spent vs unspent
 The first block contained 50 mined BTC in address A (A = 50)
 The second block contained 50 mined BTC in address A, a transaction
sending 20 BTC to address B, and putting the change in address C (A = 50,
B = 20, C = 30)
 The third block contained 50 mined BTC in address A, a transaction
sending the 20 BTC from address B to address D (A = 50 + 50, C = 30, D =
20)
So, after three blocks, there are four unspent outputs:
•A has two unspent outputs worth 50 BTC each
•C has a single unspent output worth 30 BTC
•D has a single unspent output worth 20 BTC
And there are two spent outputs:
•the 50 BTC generated in the first block, spent in the 2nd
block
•the 20 BTC output created in the 2nd block and spent in
the 3rd block
Blockchain Cycle
Proof Of Work
Some Factors That Influence The Bitcoin Price
 Government Regulation
 Media Influence
 Stability of the Bitcoin Network
 The Bitcoin Demand and Supply
 Wider Mainstream Acceptance
 Technological Changes and Innovations
 Market Manipulation
Source: https://totalbitcoin.org/some-factors-that-
influence-the-bitcoin-price/
35
Abu Dhabi
Securities
Exchange
Announces
Blockchain e-
Voting Service
The Basics
 A type of distributed ledger
 comprises of unchangeable, digitally recorded data in packages called blocks.
 These digitally recorded "blocks" of data is stored in a linear chain.
 Each block in the chain contains transaction data
 Is cryptographically hashed.
 The blocks of hashed data draw upon the previous-block in the chain,
 This ensures all data in the overall "blockchain" has not been tampered with and remains unchanged.
The blockchain represents a "golden record" of transactions, a complete, historical record that
technically cannot be interfered with or undone.
38
Leading Blockchain Consortiums and Collaborative Projects
The very nascent Blockchain market is already seeing
massive consolidation with around four major mining
service companies gaining prominence globally over
independent miners and smaller companies. Future
years might see multiple interoperable blockchains
coming into existence.
National Currencies on Blockchain
E-Dinar Tunisia
E-CFA - west Africa
Lakshmi India
Definitions -
 Cryptology
 Cryptography
 Cryptanalysis
 Steganography
 Cryptosystem
History of Cryptography
 The first known evidence of the use of cryptography (in some form) was
found in an inscription carved around 1900 BC, in the main chamber of the
tomb of the nobleman Khnumhotep II, in Egypt.
 Around 400 B.C., the Spartans used a system of encrypting information by
writing a message on a sheet of papyrus.
 Around 100 B.C., Julius Caesar was known to use a form of encryption to
convey secret messages to his army generals posted in the war front.
Cryptography is everywhere
 Secure communication:
–web traffic: HTTPS
–wireless traffic: 802.11i WPA2 (and WEP), GSM, Bluetooth
 Encrypting files on disk: EFS, TrueCrypt
 Content protection (e.g. DVD, Blu-ray): CSS, AACS
 User authentication
… and much much more
Ciphers
In cryptography, a cipher is an algorithm for performing encryption or decryption—a
series of well-defined steps that can be followed as a procedure. An alternative, less
common term is encipherment.
CRYPTOGRAPHY METHODS
 Symmetric
 Same key for encryption and decryption
 Key distribution problem
 Asymmetric
 Key pairs for encryption and decryption
 Public and private keys
Symmetric Algorithm
 It is also called as Secret Key Cryptography
 Single key used for both encrypt & decrypt
 Key must be known to both the parties
Encryption Decryption
Key
Plaintext Ciphertext
Original
Plaintext
Symmetric Cryptosystem
Stream cipher or State cipher
 A Stream Cipher is a secret-key encryption algorithm that encrypts a single bit
at a time. With a Stream Cipher, the same plaintext bit or byte will encrypt to a
different bit or byte every time it is encrypted.
 e.g. :
Plain text: Pay 100
Binary of plain text: 010111101 (hypothetical)
Key: 100101011 ----- Perform XOR
____________________
Cipher text 110010110 ----- ZTU9^%D
 To decrypt make the XOR operation of the cipher text with the key .
Block cipher
 Block cipher technique involves encryption of one block of text at a time
.Decryption also takes one block of encrypted text at a time. Length of the
block is usually 64 or 128 bits.
e.g. :
Plain text: four and five
Four and five
Key Key Key
wvfa ast wvfa --- cipher text
Symmetric Algorithm
 Data Encryption Standard (DES):
56 bits key
 Advance Encryption Standard (AES):
128, 192 or 256 bits key
 International Data Encryption Algorithm(IDEA):
128 bits key
Asymmetric Algorithm
 Private keys are used for decrypting.
 Public keys are used for encrypting
encryption
plaintext ciphertext
public key
decryption
ciphertext plaintext
private key
Hybrid cryptosystem
 A hybrid cryptosystem can be constructed using any two separate cryptosystems:
 a key encapsulation scheme, which is a public-key cryptosystem,
 a data encapsulation scheme, which is a symmetric-key cryptosystem.
COMMON TYPES OF ATTACKS
Brute force
 Trying all key values in the keyspace.
Chosen Ciphertext
 Decrypt known ciphertext to discover key.
Dictionary Attack
 Find plaintext based on common words.
Frequency Analysis-(occurrence of same letter)
 Guess values based on frequency of occurrence.
Digital Signatures
SHA
http://www.fileformat.info/tool/hash.htm
Secure Hash Algorithm ( SHA )
 Secure Hash Algorithm (SHA) was developed by
NIST along with NSA.
 In 1993, SHA was published as a Federal
Information Processing Standard.
 It has following versions-
 SHA-0
 SHA-1
 SHA-2
 SHA-3
SHA
 SHA - standing for secure hash algorithm - is a hash algorithm used by certification
authorities to sign certificates and CRL (certificates revocation list). Introduced in 1993 by NSA
with SHA0, it is used to generate unique hash values from files.
 Example: A file hashed with SHA1 could look like:
752c14ea195c369bac3c3b7896975ee9fd15eeb7
 As for any cryptographic solution, SHA must evolve along with our computers' calculation
capacities in order to avoid any weakness.
 There are, therefore, several versions of SHA: SHA0 (obsolete because vulnerable), SHA1 (the
most popular one), SHA2 (the one we are interested in) and finally SHA3 introduced in 2012.
SHA2
SHA2, not often used for now, is the successor of SHA1 and gathered 4 kinds of
hash functions: SHA224, SHA256, SHA384 and SHA512.
It works the same way than SHA1 but is stronger and generate a longer hash.
Attacks
Collision
Preimage
Second PreImage
https://security.googleblog.com/2017/02/announcing-first-sha1-collision.html
https://shattered.io/
Comparison between MD5 and SHA-1 & SHA256
Point of discussion MD5 SHA-1
Message digest length in bits 128 160
Attack to try and find the
original message given a
message digest
Requires 2128 operations to
break in.
Requires 2160 operations to
break in, therefore more secure.
Attack to try and find two
messages producing same
message digest
Requires 264 operations to
break in.
Requires 280 operations to break
in.
Speed Faster Slower
Successful attempts so far There have been reported
attempts to some extent.
Announcing the first SHA1
collision – by Google
February 23, 2017
SHA-256
256 –( 32bytes)
Requires 2256 operations to
break in, therefore more secure.
Requires 216bytes operations to
break in.
Slower
No successful attempts so far
Parameters for various versions of SHA
Parameter SHA-1 SHA-256 SHA-384 SHA-512
Message digest size(in
bits)
160 256 384 512
Message size(in bits) <264 264 2128 2128
Block size (in bits) 512 512 1024 1024
Word size (in bits) 32 32 64 64
Steps in algorithm 80 64 80 80
Without technical
Bank - passport basic Analogy
One Way
Browser to Bank
Bank to Browser?
Whole Process
Client send req to the server
Server sends res to the Client [public key and certificate] Has Private key
installed
Client send one of the symmetric key to the server
Encrypted with server public key
Secure End – to – End Communication with symetic
http://www.fileformat.info/tool/hash.htm
Digital Certificate
Intelligent Courier guy
Brief
 What is the SSL Certificate?
 How does the client(Browser) know the server is genuinely his Bank
 What are certificates authorities and what role do they play?
 What is a digital certificate?
 Various ways SSL protocol could be breached?
 Sha1 and Sha 2 in certificate Chain
==
YES or NO
Proof Of Work
Proof Of Stake
Proof Of Existence
POE
 https://proofofexistence.com/
The Bitcoin Network
Node Types and Roles
Although nodes in the bitcoin P2P network are
equal, they may take on different
roles depending on the functionality they are
supporting.
A bitcoin node is a
collection of functions: routing, the Blockchain
database, mining, and wallet
services.
How does a new node find peers?
DNS – List of IP Address
DNS seeds are implementation of BIND (Berkeley Internet Name Daemon)
BIND get a list of bitcoin network details by crawlers
SPV Node
 A lightweight client, also known as a simple-payment-verification
(SPV)client, connects to bitcoin full nodes (mentioned previously) for
access to the bitcoin transaction information, but stores the user wallet
locally and independently creates, validates, and transmits transactions.
Lightweight clients interact directly with the bitcoin network, without an
intermediary.
Live Demo
http://localhost:3000/
Private Blockchain from Scratch
Important Links
 http://Bitcoin.org
 https://bitnodes.21.co
 https://insight.is
 https://Blockchain.info
 https://coinmarketcap.com/currencies/views/all/
 http://Btcrates.in
THANK
YOU.

More Related Content

What's hot

Intro to Blockchain Slides
Intro to Blockchain SlidesIntro to Blockchain Slides
Intro to Blockchain SlidesShannon Wells
 
Bitcoin, Blockchain and the Crypto Contracts - Part 2
Bitcoin, Blockchain and the Crypto Contracts - Part 2Bitcoin, Blockchain and the Crypto Contracts - Part 2
Bitcoin, Blockchain and the Crypto Contracts - Part 2Prithwis Mukerjee
 
Ethereum Mining How To
Ethereum Mining How ToEthereum Mining How To
Ethereum Mining How ToNugroho Gito
 
Blockchain Programming
Blockchain ProgrammingBlockchain Programming
Blockchain ProgrammingRhea Myers
 
Boolberry reduces blockchain bloat
Boolberry reduces blockchain bloatBoolberry reduces blockchain bloat
Boolberry reduces blockchain bloatboolberry
 
Bitcoin and Ethereum
Bitcoin and EthereumBitcoin and Ethereum
Bitcoin and EthereumJongseok Choi
 
Every thing bitcoin in baby language
Every thing bitcoin in baby languageEvery thing bitcoin in baby language
Every thing bitcoin in baby languageOssai Nduka
 
Bitcoin in a Nutshell
Bitcoin in a NutshellBitcoin in a Nutshell
Bitcoin in a NutshellDaniel Chan
 
BitCoin explained
BitCoin explainedBitCoin explained
BitCoin explainedHarelc
 
Dappsmedia smartcontract _write_smartcontracts_on_console_ethereum
Dappsmedia smartcontract _write_smartcontracts_on_console_ethereumDappsmedia smartcontract _write_smartcontracts_on_console_ethereum
Dappsmedia smartcontract _write_smartcontracts_on_console_ethereumTomoaki Sato
 
gething started - ethereum & using the geth golang client
gething started - ethereum & using the geth golang clientgething started - ethereum & using the geth golang client
gething started - ethereum & using the geth golang clientSathish VJ
 
Introduction to Ethereum
Introduction to EthereumIntroduction to Ethereum
Introduction to EthereumArnold Pham
 
Best practices to build secure smart contracts
Best practices to build secure smart contractsBest practices to build secure smart contracts
Best practices to build secure smart contractsGautam Anand
 

What's hot (20)

Blockchain
BlockchainBlockchain
Blockchain
 
bitcoin_presentation
bitcoin_presentationbitcoin_presentation
bitcoin_presentation
 
Intro to Blockchain Slides
Intro to Blockchain SlidesIntro to Blockchain Slides
Intro to Blockchain Slides
 
Blockchains 101
Blockchains 101Blockchains 101
Blockchains 101
 
Bitcoin, Blockchain and the Crypto Contracts - Part 2
Bitcoin, Blockchain and the Crypto Contracts - Part 2Bitcoin, Blockchain and the Crypto Contracts - Part 2
Bitcoin, Blockchain and the Crypto Contracts - Part 2
 
Bitcoin Internal
Bitcoin InternalBitcoin Internal
Bitcoin Internal
 
BitCoin Protocol
BitCoin ProtocolBitCoin Protocol
BitCoin Protocol
 
Ethereum Mining How To
Ethereum Mining How ToEthereum Mining How To
Ethereum Mining How To
 
Blockchain Programming
Blockchain ProgrammingBlockchain Programming
Blockchain Programming
 
Boolberry reduces blockchain bloat
Boolberry reduces blockchain bloatBoolberry reduces blockchain bloat
Boolberry reduces blockchain bloat
 
Bitcoin and Ethereum
Bitcoin and EthereumBitcoin and Ethereum
Bitcoin and Ethereum
 
Ethereum
EthereumEthereum
Ethereum
 
Every thing bitcoin in baby language
Every thing bitcoin in baby languageEvery thing bitcoin in baby language
Every thing bitcoin in baby language
 
Bitcoins Math
Bitcoins MathBitcoins Math
Bitcoins Math
 
Bitcoin in a Nutshell
Bitcoin in a NutshellBitcoin in a Nutshell
Bitcoin in a Nutshell
 
BitCoin explained
BitCoin explainedBitCoin explained
BitCoin explained
 
Dappsmedia smartcontract _write_smartcontracts_on_console_ethereum
Dappsmedia smartcontract _write_smartcontracts_on_console_ethereumDappsmedia smartcontract _write_smartcontracts_on_console_ethereum
Dappsmedia smartcontract _write_smartcontracts_on_console_ethereum
 
gething started - ethereum & using the geth golang client
gething started - ethereum & using the geth golang clientgething started - ethereum & using the geth golang client
gething started - ethereum & using the geth golang client
 
Introduction to Ethereum
Introduction to EthereumIntroduction to Ethereum
Introduction to Ethereum
 
Best practices to build secure smart contracts
Best practices to build secure smart contractsBest practices to build secure smart contracts
Best practices to build secure smart contracts
 

Similar to Blockchain Corporate Style

Similar to Blockchain Corporate Style (20)

Crypto currency - a digital asset
Crypto currency - a digital asset Crypto currency - a digital asset
Crypto currency - a digital asset
 
Blockchain data structures and fundamental
Blockchain data structures and fundamentalBlockchain data structures and fundamental
Blockchain data structures and fundamental
 
Cryptocurrency
CryptocurrencyCryptocurrency
Cryptocurrency
 
Hui
HuiHui
Hui
 
Hui
HuiHui
Hui
 
Understanding Blockchain
Understanding BlockchainUnderstanding Blockchain
Understanding Blockchain
 
Blockchain - a formal introduction
Blockchain - a formal introductionBlockchain - a formal introduction
Blockchain - a formal introduction
 
Introduction to Blockchain Web3 Session
Introduction to Blockchain Web3 SessionIntroduction to Blockchain Web3 Session
Introduction to Blockchain Web3 Session
 
Blockchain and Cryptocurrency for Dummies
Blockchain and Cryptocurrency for DummiesBlockchain and Cryptocurrency for Dummies
Blockchain and Cryptocurrency for Dummies
 
Blockchain Presentation
Blockchain PresentationBlockchain Presentation
Blockchain Presentation
 
crypto ppt.ppt
crypto ppt.pptcrypto ppt.ppt
crypto ppt.ppt
 
BlockChain.pptx
BlockChain.pptxBlockChain.pptx
BlockChain.pptx
 
Blockchain Demystified
Blockchain DemystifiedBlockchain Demystified
Blockchain Demystified
 
Blockchain Glossary.docx
Blockchain Glossary.docxBlockchain Glossary.docx
Blockchain Glossary.docx
 
Blockchain Future & Investments 2018 - Women in Product
Blockchain Future & Investments 2018 - Women in Product Blockchain Future & Investments 2018 - Women in Product
Blockchain Future & Investments 2018 - Women in Product
 
What is a Crypto Token_.pptx
What is a Crypto Token_.pptxWhat is a Crypto Token_.pptx
What is a Crypto Token_.pptx
 
Blockchain
BlockchainBlockchain
Blockchain
 
Blockchain_TezosDeveloperCommunitySNSCE.pdf
Blockchain_TezosDeveloperCommunitySNSCE.pdfBlockchain_TezosDeveloperCommunitySNSCE.pdf
Blockchain_TezosDeveloperCommunitySNSCE.pdf
 
Bitcoin and Blockchain
Bitcoin and BlockchainBitcoin and Blockchain
Bitcoin and Blockchain
 
Bitcoin, Banking and the Blockchain
Bitcoin, Banking and the BlockchainBitcoin, Banking and the Blockchain
Bitcoin, Banking and the Blockchain
 

Recently uploaded

Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Hyundai Motor Group
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 

Recently uploaded (20)

Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 

Blockchain Corporate Style

  • 2. Name: Narendranath Reddy Thota  d3 Whitepaper Core Team  Trainer from Gama  Blockchain Full Stack Developer  Technology Analyst  Software Developer  Technology Speaker MAERSK Email: narendranath.thota@ust-global.com P: +917288838869
  • 3. Blockchain  At a very high level, the Blockchain is a decentralized ledger, or list, of all transactions across a peer-to-peer network. This is the technology underlying Bitcoin and other cryptocurrencies, and it has the potential to disrupt a wide variety of business processes.  If the Internet is the foundation for digital innovation of all kinds, Blockchain technology is the underpinning of a radical rethinking of how we pay for things—as well as how we verify who owns what and who has the right to buy and sell it.
  • 4. BlockChain what?  No one knows who invented blockchain.  The idea for it came from a paper published online eight years ago  The author, Satoshi Nakamoto, is thought to be using a pseudonym. BLOCKCHAIN Is Like “The blockchain is a simple digital platform for recording and verifying transactions so that other people can’t erase them later -- and anyone can see them.” - GIZMODO
  • 5.
  • 6.
  • 11.
  • 12.
  • 13.
  • 16. 16 How does it work? Source: http://blockgeeks.com/
  • 17. 17 Key Concepts Public Key: (a long, randomly-generated string of numbers) is a users’ address on the blockchain. Transactions (money sent from) get recorded as belonging to that address. Private Key: Gives its owner access to their digital assets. Store your data on the blockchain and it is incorruptible. Replication: Every node in a decentralized system has a copy of the blockchain. No centralized "official" copy exists and no user is "trusted" more than any other. Transactions are broadcast to the network using software applications. Mining nodes: They validate transactions, add them to the block they're creating and then broadcast the completed block to other nodes. Blockchains use various timestamping schemes, such as proof-of-work to serialize changes. Peers keep the highest scoring version of the database that they currently know of. Whenever a peer receives a higher scoring version (usually the old version with a single new block added) they extend or overwrite their own database and retransmit the improvement to their peers. Encryption Replication Integrity When miners try to compute a block, they pick all transactions that they want to be added in the block, plus one coinbase (generation) transaction to their address. For a block to be accepted by the network it needs to contain only valid transactions: inputs that are not yet spent, inputs that have the valid amount, signature that verifies ok and etc... Mining
  • 19.
  • 20.
  • 22. Private Key ECM – Elliptical Cure Multiplication
  • 25.  Outputs of a transaction are initially unspent outputs, until they are used as the input for another transaction, then they are spent outputs. The balance of an address is the sum of all unspent outputs that were sent to that address. Answer
  • 26. Spent vs unspent  The first block contained 50 mined BTC in address A (A = 50)  The second block contained 50 mined BTC in address A, a transaction sending 20 BTC to address B, and putting the change in address C (A = 50, B = 20, C = 30)  The third block contained 50 mined BTC in address A, a transaction sending the 20 BTC from address B to address D (A = 50 + 50, C = 30, D = 20) So, after three blocks, there are four unspent outputs: •A has two unspent outputs worth 50 BTC each •C has a single unspent output worth 30 BTC •D has a single unspent output worth 20 BTC And there are two spent outputs: •the 50 BTC generated in the first block, spent in the 2nd block •the 20 BTC output created in the 2nd block and spent in the 3rd block
  • 27.
  • 28.
  • 31.
  • 32.
  • 33. Some Factors That Influence The Bitcoin Price  Government Regulation  Media Influence  Stability of the Bitcoin Network  The Bitcoin Demand and Supply  Wider Mainstream Acceptance  Technological Changes and Innovations  Market Manipulation Source: https://totalbitcoin.org/some-factors-that- influence-the-bitcoin-price/
  • 34.
  • 36. The Basics  A type of distributed ledger  comprises of unchangeable, digitally recorded data in packages called blocks.  These digitally recorded "blocks" of data is stored in a linear chain.  Each block in the chain contains transaction data  Is cryptographically hashed.  The blocks of hashed data draw upon the previous-block in the chain,  This ensures all data in the overall "blockchain" has not been tampered with and remains unchanged. The blockchain represents a "golden record" of transactions, a complete, historical record that technically cannot be interfered with or undone.
  • 37.
  • 38. 38 Leading Blockchain Consortiums and Collaborative Projects The very nascent Blockchain market is already seeing massive consolidation with around four major mining service companies gaining prominence globally over independent miners and smaller companies. Future years might see multiple interoperable blockchains coming into existence.
  • 39.
  • 40. National Currencies on Blockchain E-Dinar Tunisia E-CFA - west Africa Lakshmi India
  • 41.
  • 42. Definitions -  Cryptology  Cryptography  Cryptanalysis  Steganography  Cryptosystem
  • 43. History of Cryptography  The first known evidence of the use of cryptography (in some form) was found in an inscription carved around 1900 BC, in the main chamber of the tomb of the nobleman Khnumhotep II, in Egypt.  Around 400 B.C., the Spartans used a system of encrypting information by writing a message on a sheet of papyrus.  Around 100 B.C., Julius Caesar was known to use a form of encryption to convey secret messages to his army generals posted in the war front.
  • 44.
  • 45. Cryptography is everywhere  Secure communication: –web traffic: HTTPS –wireless traffic: 802.11i WPA2 (and WEP), GSM, Bluetooth  Encrypting files on disk: EFS, TrueCrypt  Content protection (e.g. DVD, Blu-ray): CSS, AACS  User authentication … and much much more
  • 46. Ciphers In cryptography, a cipher is an algorithm for performing encryption or decryption—a series of well-defined steps that can be followed as a procedure. An alternative, less common term is encipherment.
  • 47. CRYPTOGRAPHY METHODS  Symmetric  Same key for encryption and decryption  Key distribution problem  Asymmetric  Key pairs for encryption and decryption  Public and private keys
  • 48. Symmetric Algorithm  It is also called as Secret Key Cryptography  Single key used for both encrypt & decrypt  Key must be known to both the parties Encryption Decryption Key Plaintext Ciphertext Original Plaintext Symmetric Cryptosystem
  • 49. Stream cipher or State cipher  A Stream Cipher is a secret-key encryption algorithm that encrypts a single bit at a time. With a Stream Cipher, the same plaintext bit or byte will encrypt to a different bit or byte every time it is encrypted.  e.g. : Plain text: Pay 100 Binary of plain text: 010111101 (hypothetical) Key: 100101011 ----- Perform XOR ____________________ Cipher text 110010110 ----- ZTU9^%D  To decrypt make the XOR operation of the cipher text with the key .
  • 50. Block cipher  Block cipher technique involves encryption of one block of text at a time .Decryption also takes one block of encrypted text at a time. Length of the block is usually 64 or 128 bits. e.g. : Plain text: four and five Four and five Key Key Key wvfa ast wvfa --- cipher text
  • 51. Symmetric Algorithm  Data Encryption Standard (DES): 56 bits key  Advance Encryption Standard (AES): 128, 192 or 256 bits key  International Data Encryption Algorithm(IDEA): 128 bits key
  • 52. Asymmetric Algorithm  Private keys are used for decrypting.  Public keys are used for encrypting encryption plaintext ciphertext public key decryption ciphertext plaintext private key
  • 53. Hybrid cryptosystem  A hybrid cryptosystem can be constructed using any two separate cryptosystems:  a key encapsulation scheme, which is a public-key cryptosystem,  a data encapsulation scheme, which is a symmetric-key cryptosystem.
  • 54.
  • 55. COMMON TYPES OF ATTACKS Brute force  Trying all key values in the keyspace. Chosen Ciphertext  Decrypt known ciphertext to discover key. Dictionary Attack  Find plaintext based on common words. Frequency Analysis-(occurrence of same letter)  Guess values based on frequency of occurrence.
  • 58. Secure Hash Algorithm ( SHA )  Secure Hash Algorithm (SHA) was developed by NIST along with NSA.  In 1993, SHA was published as a Federal Information Processing Standard.  It has following versions-  SHA-0  SHA-1  SHA-2  SHA-3
  • 59. SHA  SHA - standing for secure hash algorithm - is a hash algorithm used by certification authorities to sign certificates and CRL (certificates revocation list). Introduced in 1993 by NSA with SHA0, it is used to generate unique hash values from files.  Example: A file hashed with SHA1 could look like: 752c14ea195c369bac3c3b7896975ee9fd15eeb7  As for any cryptographic solution, SHA must evolve along with our computers' calculation capacities in order to avoid any weakness.  There are, therefore, several versions of SHA: SHA0 (obsolete because vulnerable), SHA1 (the most popular one), SHA2 (the one we are interested in) and finally SHA3 introduced in 2012. SHA2 SHA2, not often used for now, is the successor of SHA1 and gathered 4 kinds of hash functions: SHA224, SHA256, SHA384 and SHA512. It works the same way than SHA1 but is stronger and generate a longer hash.
  • 60.
  • 62. Comparison between MD5 and SHA-1 & SHA256 Point of discussion MD5 SHA-1 Message digest length in bits 128 160 Attack to try and find the original message given a message digest Requires 2128 operations to break in. Requires 2160 operations to break in, therefore more secure. Attack to try and find two messages producing same message digest Requires 264 operations to break in. Requires 280 operations to break in. Speed Faster Slower Successful attempts so far There have been reported attempts to some extent. Announcing the first SHA1 collision – by Google February 23, 2017 SHA-256 256 –( 32bytes) Requires 2256 operations to break in, therefore more secure. Requires 216bytes operations to break in. Slower No successful attempts so far
  • 63. Parameters for various versions of SHA Parameter SHA-1 SHA-256 SHA-384 SHA-512 Message digest size(in bits) 160 256 384 512 Message size(in bits) <264 264 2128 2128 Block size (in bits) 512 512 1024 1024 Word size (in bits) 32 32 64 64 Steps in algorithm 80 64 80 80
  • 64.
  • 65. Without technical Bank - passport basic Analogy
  • 66.
  • 67.
  • 68. One Way Browser to Bank Bank to Browser?
  • 69.
  • 70.
  • 71.
  • 72. Whole Process Client send req to the server Server sends res to the Client [public key and certificate] Has Private key installed Client send one of the symmetric key to the server Encrypted with server public key Secure End – to – End Communication with symetic
  • 75. Brief  What is the SSL Certificate?  How does the client(Browser) know the server is genuinely his Bank  What are certificates authorities and what role do they play?  What is a digital certificate?  Various ways SSL protocol could be breached?  Sha1 and Sha 2 in certificate Chain
  • 76.
  • 78.
  • 79.
  • 80. Proof Of Work Proof Of Stake Proof Of Existence
  • 81.
  • 84. Node Types and Roles Although nodes in the bitcoin P2P network are equal, they may take on different roles depending on the functionality they are supporting. A bitcoin node is a collection of functions: routing, the Blockchain database, mining, and wallet services.
  • 85.
  • 86.
  • 87. How does a new node find peers? DNS – List of IP Address DNS seeds are implementation of BIND (Berkeley Internet Name Daemon) BIND get a list of bitcoin network details by crawlers
  • 88. SPV Node  A lightweight client, also known as a simple-payment-verification (SPV)client, connects to bitcoin full nodes (mentioned previously) for access to the bitcoin transaction information, but stores the user wallet locally and independently creates, validates, and transmits transactions. Lightweight clients interact directly with the bitcoin network, without an intermediary.
  • 89.
  • 92. Important Links  http://Bitcoin.org  https://bitnodes.21.co  https://insight.is  https://Blockchain.info  https://coinmarketcap.com/currencies/views/all/  http://Btcrates.in