SlideShare a Scribd company logo
1 of 24
Blockchain Workspace www.blockchainworkspace.com 1
Why Cryptography?
Blockchain Workspace www.blockchainworkspace.com 2
Blockchain - Why Now?
Blockchain Workspace www.blockchainworkspace.com 3
Be one of them?
Blockchain Workspace www.blockchainworkspace.com
• disconnected
• not taken seriously ever again
• vulnerable
Daddy and Facebook
4
Blockchain Workspace www.blockchainworkspace.com 5
Homework Assignment
Home work sent in:
• Explain in your own words what the difference is between symmetric and asymmetric encryption
• explain which “form” is used mostly in bitcoin and why!
Blockchain Workspace www.blockchainworkspace.com 6
How do you find the right places?
Blockchain Workspace www.blockchainworkspace.com 7
How do you get them?
Blockchain Workspace www.blockchainworkspace.com 8
How do you get rid of them?
Blockchain Workspace www.blockchainworkspace.com 9
Roles & objects
Source: Blockchain Workspace; CC by SA
Blockchain Workspace www.blockchainworkspace.com 10
Beginning of the end of security
English letter frequency
Blockchain Workspace www.blockchainworkspace.com
Hashing
11
Hash function:
1. Takes any digital input
Fixed size output (256 bits)
efficiently computable
2. Security properties:
collision free
hiding
puzzle-friendly
Blockchain Workspace www.blockchainworkspace.com
Source: Blockchain Workspace CC by SA
Feature 1 of 3: Collisions exist, but unfindable
12
Blockchain Workspace www.blockchainworkspace.com
Applications of Hashing properties
13
Puzzle Friendliness
Applications of Hashing properties
Blockchain Workspace www.blockchainworkspace.com 14
Source: Scott Richard CC BY SA, see original
Blockchain Workspace www.blockchainworkspace.com 15
Assignment Proof of Existence
• a masterpiece poem about bitcoin (2 minutes)
• proof of existence tool (1 minute)
• proof of existence that your poem existed today (3 minutes)
• proof to your neighbour that this poem already existed (2x2 minutes)
Blockchain Workspace www.blockchainworkspace.com
Hiding, puzzling & colliding?
Source: Blockchain Workspace; CC by SA
Blockchain Workspace www.blockchainworkspace.com
Source: Blockchain Workspace; CC by SA
Hashpointer
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Blockchain Workspace www.blockchainworkspace.com
Tamper evident
Blockchain Workspace www.blockchainworkspace.com 19
Symmetric versus Asymmetric Encryption
Blockchain Workspace www.blockchainworkspace.com
Source picture: stackexchange.com ; CC by SA, see original creator
Digital Signatures - easy
Blockchain Workspace www.blockchainworkspace.com 21
Digital Signatures - extended
Source picture: https://staging.signinghub.com/electronic-signatures/Source picture: Blockchain Workspace
Blockchain Workspace www.blockchainworkspace.com 22
Public/Private Keys for Identity
Source: Princeton University / Coursera: Introduction to Crypto and Cryptocurrencies
Blockchain Workspace www.blockchainworkspace.com 23
Principles Modern Cryptography
Core principles of Cryptography
1. Definitions
Exact, mathematical model and
definition of crypto ‘security’
2. Assumptions
Clearly stated; no double interpretation
3. Proofs of security
Blockchain Workspace www.blockchainworkspace.com
Thank You

More Related Content

Similar to Blockchain Cryptography

Blockchain 101 - public, tokenized blockchains
Blockchain 101 - public, tokenized blockchainsBlockchain 101 - public, tokenized blockchains
Blockchain 101 - public, tokenized blockchainsBrett Colbert
 
BlockchainHub Graz Meetup #22 - Atomic Swaps - Johannes Zweng
BlockchainHub Graz Meetup #22 - Atomic Swaps - Johannes ZwengBlockchainHub Graz Meetup #22 - Atomic Swaps - Johannes Zweng
BlockchainHub Graz Meetup #22 - Atomic Swaps - Johannes ZwengBlockchainHub Graz
 
Flaying the Blockchain Ledger for Fun, Profit, and Hip Hop
Flaying the Blockchain Ledger for Fun, Profit, and Hip HopFlaying the Blockchain Ledger for Fun, Profit, and Hip Hop
Flaying the Blockchain Ledger for Fun, Profit, and Hip HopAndrew Morris
 
J.burke HackMiami6
J.burke HackMiami6J.burke HackMiami6
J.burke HackMiami6Jesse Burke
 
Bitcoin & Ethereum Address
Bitcoin & Ethereum AddressBitcoin & Ethereum Address
Bitcoin & Ethereum AddressPo Wei Chen
 
Blockchain and bitcoin fundamentals (usages and applications)
Blockchain and bitcoin fundamentals (usages and applications)Blockchain and bitcoin fundamentals (usages and applications)
Blockchain and bitcoin fundamentals (usages and applications)Amir Rafati
 
Blockchain. A Guide For Beginners
Blockchain. A Guide For BeginnersBlockchain. A Guide For Beginners
Blockchain. A Guide For BeginnersElifTech
 
Bitcoin and the future of cryptocurrency
Bitcoin and the future of cryptocurrencyBitcoin and the future of cryptocurrency
Bitcoin and the future of cryptocurrencyBen Hall
 
localbitcoins-clone-script.pdf
localbitcoins-clone-script.pdflocalbitcoins-clone-script.pdf
localbitcoins-clone-script.pdfjemespetrick
 
Introduction to Blockchains
Introduction to BlockchainsIntroduction to Blockchains
Introduction to BlockchainsRamesh Nair
 
IEEE ICDM 2018 Tutorial on Blockchain Data Analytics
IEEE ICDM 2018 Tutorial on Blockchain Data AnalyticsIEEE ICDM 2018 Tutorial on Blockchain Data Analytics
IEEE ICDM 2018 Tutorial on Blockchain Data AnalyticsCuneyt Gurcan Akcora
 
Bitcoin Keys, Addresses & Wallets
Bitcoin Keys, Addresses & WalletsBitcoin Keys, Addresses & Wallets
Bitcoin Keys, Addresses & WalletsChristopher Allen
 
Blockchain, AI and Machine Learning
Blockchain, AI and Machine LearningBlockchain, AI and Machine Learning
Blockchain, AI and Machine LearningTao Wang
 
Sullivan white boxcrypto-baythreat-2013
Sullivan white boxcrypto-baythreat-2013Sullivan white boxcrypto-baythreat-2013
Sullivan white boxcrypto-baythreat-2013Cloudflare
 
Blockchains 101 - Muneeb Ali, Blockstack Labs
Blockchains 101  - Muneeb Ali, Blockstack LabsBlockchains 101  - Muneeb Ali, Blockstack Labs
Blockchains 101 - Muneeb Ali, Blockstack LabsWithTheBest
 
the age of cryptocurrency at Devoxx Morocco
the age of cryptocurrency at Devoxx  Moroccothe age of cryptocurrency at Devoxx  Morocco
the age of cryptocurrency at Devoxx MoroccoBellaj Badr
 
Learning Python with Minecraft and my Dad - PyOhio 2018
Learning Python with Minecraft and my Dad - PyOhio 2018Learning Python with Minecraft and my Dad - PyOhio 2018
Learning Python with Minecraft and my Dad - PyOhio 2018Hank Preston
 

Similar to Blockchain Cryptography (20)

Blockchain
BlockchainBlockchain
Blockchain
 
notes.pdf
notes.pdfnotes.pdf
notes.pdf
 
Blockchain 101 - public, tokenized blockchains
Blockchain 101 - public, tokenized blockchainsBlockchain 101 - public, tokenized blockchains
Blockchain 101 - public, tokenized blockchains
 
BlockchainHub Graz Meetup #22 - Atomic Swaps - Johannes Zweng
BlockchainHub Graz Meetup #22 - Atomic Swaps - Johannes ZwengBlockchainHub Graz Meetup #22 - Atomic Swaps - Johannes Zweng
BlockchainHub Graz Meetup #22 - Atomic Swaps - Johannes Zweng
 
Flaying the Blockchain Ledger for Fun, Profit, and Hip Hop
Flaying the Blockchain Ledger for Fun, Profit, and Hip HopFlaying the Blockchain Ledger for Fun, Profit, and Hip Hop
Flaying the Blockchain Ledger for Fun, Profit, and Hip Hop
 
J.burke HackMiami6
J.burke HackMiami6J.burke HackMiami6
J.burke HackMiami6
 
Bitcoin & Ethereum Address
Bitcoin & Ethereum AddressBitcoin & Ethereum Address
Bitcoin & Ethereum Address
 
Blockchain and bitcoin fundamentals (usages and applications)
Blockchain and bitcoin fundamentals (usages and applications)Blockchain and bitcoin fundamentals (usages and applications)
Blockchain and bitcoin fundamentals (usages and applications)
 
Blockchain. A Guide For Beginners
Blockchain. A Guide For BeginnersBlockchain. A Guide For Beginners
Blockchain. A Guide For Beginners
 
Bitcoin and the future of cryptocurrency
Bitcoin and the future of cryptocurrencyBitcoin and the future of cryptocurrency
Bitcoin and the future of cryptocurrency
 
localbitcoins-clone-script.pdf
localbitcoins-clone-script.pdflocalbitcoins-clone-script.pdf
localbitcoins-clone-script.pdf
 
Introduction to Blockchains
Introduction to BlockchainsIntroduction to Blockchains
Introduction to Blockchains
 
IEEE ICDM 2018 Tutorial on Blockchain Data Analytics
IEEE ICDM 2018 Tutorial on Blockchain Data AnalyticsIEEE ICDM 2018 Tutorial on Blockchain Data Analytics
IEEE ICDM 2018 Tutorial on Blockchain Data Analytics
 
Blockchain for dummies
Blockchain for dummiesBlockchain for dummies
Blockchain for dummies
 
Bitcoin Keys, Addresses & Wallets
Bitcoin Keys, Addresses & WalletsBitcoin Keys, Addresses & Wallets
Bitcoin Keys, Addresses & Wallets
 
Blockchain, AI and Machine Learning
Blockchain, AI and Machine LearningBlockchain, AI and Machine Learning
Blockchain, AI and Machine Learning
 
Sullivan white boxcrypto-baythreat-2013
Sullivan white boxcrypto-baythreat-2013Sullivan white boxcrypto-baythreat-2013
Sullivan white boxcrypto-baythreat-2013
 
Blockchains 101 - Muneeb Ali, Blockstack Labs
Blockchains 101  - Muneeb Ali, Blockstack LabsBlockchains 101  - Muneeb Ali, Blockstack Labs
Blockchains 101 - Muneeb Ali, Blockstack Labs
 
the age of cryptocurrency at Devoxx Morocco
the age of cryptocurrency at Devoxx  Moroccothe age of cryptocurrency at Devoxx  Morocco
the age of cryptocurrency at Devoxx Morocco
 
Learning Python with Minecraft and my Dad - PyOhio 2018
Learning Python with Minecraft and my Dad - PyOhio 2018Learning Python with Minecraft and my Dad - PyOhio 2018
Learning Python with Minecraft and my Dad - PyOhio 2018
 

Recently uploaded

Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - Englishneillewis46
 
How to Manage Call for Tendor in Odoo 17
How to Manage Call for Tendor in Odoo 17How to Manage Call for Tendor in Odoo 17
How to Manage Call for Tendor in Odoo 17Celine George
 
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxOn_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxPooja Bhuva
 
What is 3 Way Matching Process in Odoo 17.pptx
What is 3 Way Matching Process in Odoo 17.pptxWhat is 3 Way Matching Process in Odoo 17.pptx
What is 3 Way Matching Process in Odoo 17.pptxCeline George
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxJisc
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxmarlenawright1
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17Celine George
 
Details on CBSE Compartment Exam.pptx1111
Details on CBSE Compartment Exam.pptx1111Details on CBSE Compartment Exam.pptx1111
Details on CBSE Compartment Exam.pptx1111GangaMaiya1
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxRamakrishna Reddy Bijjam
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and ModificationsMJDuyan
 
Introduction to TechSoup’s Digital Marketing Services and Use Cases
Introduction to TechSoup’s Digital Marketing  Services and Use CasesIntroduction to TechSoup’s Digital Marketing  Services and Use Cases
Introduction to TechSoup’s Digital Marketing Services and Use CasesTechSoup
 
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxCOMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxannathomasp01
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxPooja Bhuva
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Jisc
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17Celine George
 
Economic Importance Of Fungi In Food Additives
Economic Importance Of Fungi In Food AdditivesEconomic Importance Of Fungi In Food Additives
Economic Importance Of Fungi In Food AdditivesSHIVANANDaRV
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024Elizabeth Walsh
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxJisc
 
OSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & SystemsOSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & SystemsSandeep D Chaudhary
 

Recently uploaded (20)

Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
How to Manage Call for Tendor in Odoo 17
How to Manage Call for Tendor in Odoo 17How to Manage Call for Tendor in Odoo 17
How to Manage Call for Tendor in Odoo 17
 
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxOn_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
 
What is 3 Way Matching Process in Odoo 17.pptx
What is 3 Way Matching Process in Odoo 17.pptxWhat is 3 Way Matching Process in Odoo 17.pptx
What is 3 Way Matching Process in Odoo 17.pptx
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
Details on CBSE Compartment Exam.pptx1111
Details on CBSE Compartment Exam.pptx1111Details on CBSE Compartment Exam.pptx1111
Details on CBSE Compartment Exam.pptx1111
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
Introduction to TechSoup’s Digital Marketing Services and Use Cases
Introduction to TechSoup’s Digital Marketing  Services and Use CasesIntroduction to TechSoup’s Digital Marketing  Services and Use Cases
Introduction to TechSoup’s Digital Marketing Services and Use Cases
 
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxCOMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
 
OS-operating systems- ch05 (CPU Scheduling) ...
OS-operating systems- ch05 (CPU Scheduling) ...OS-operating systems- ch05 (CPU Scheduling) ...
OS-operating systems- ch05 (CPU Scheduling) ...
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptx
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17
 
Economic Importance Of Fungi In Food Additives
Economic Importance Of Fungi In Food AdditivesEconomic Importance Of Fungi In Food Additives
Economic Importance Of Fungi In Food Additives
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 
OSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & SystemsOSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & Systems
 

Blockchain Cryptography

Editor's Notes

  1. What is the real need to use this knowledge. How can you actually use this knowledge.
  2. Repeat of essence of first 1.5 hours Encryption {key} Timestamping and consensus {stamp} Verification {check} Where is the accidental discovery? Where is the dissatisfaction in the customer group? Do you recognize the Me-too within your own branche?
  3. [Beamer off] Sign: Cryptographic Hash Functions - <thumb> Sign: Hash Pointers and Data Structures - <pointing finger> Sign: Digital Signatures - <Air sign> Sign: Public Keys as Identities - <‘ME’ on forehead> Sign: Chain - <grip hands>
  4. One uniquely identifiable person … -> virtual identity (public address) & multi-sign options. Why: because your public address gives you worldwide transparency about your virtual identity, while your private key gives you control.
  5. Each convertor has KYC obligations. There are “tiers” or “tranches” Localbitcoins: barter trade on a local level
  6. Check for valid bitcoin addresses that only you control! bitaddress.org
  7. kraken, litebit.eu, poloniex etc. you can convert back to many currencies and transfer it back to your old (reliable?) bank account.
  8. <ask: what kind of attacks are possible?> Roles, objects & ATTACKS: plain text, cipher text, key [Beamer on] <Review + Assignment focus> [Beamer off] <Before assignment DIY One Time Pad>
  9. Concluding assignment DIY One Time Pad You need a good source of randomness for your keys
  10. <So which primitives do we need to develop means of safe store and exchange of value? What extended features features should cryptographic primitives have?> We need more security, we need better usability, more efficiency and self sovereigned privacy? Sign: Cryptographic Hash Functions - <thumb> Sign: Hash Pointers and Data Structures - <pointing finger> Sign: Digital Signatures - <Air sign> Sign: Public Keys as Identities - <‘ME’ on forehead> Sign: Chain - <grip hands> <Exercise: 3 groups -> think of the properties of Cryptographic Hash Functions, 1. explain how it should work, 2. think of an application >
  11. By Scott Richard CC BY SA. See Original: https://www.flickr.com/photos/32029534@N00/23502453065
  12. Assignment Get your phones, create a masterpiece poem about bitcoin (2 minutes), search with Google for proof of existence tool (1 minute), proof of existence that your poem existed today (3 minutes), proof to your neighbor that this poem already existed (2x2 minutes) What did you learn? Payment of a service fee -> takes too much time The smallest error…. https://notbot.me https://proofofexistence.com/
  13. Which two very important features in one go? <hash+pointing> Why should we care? This is the Chain-trick, the data-minimising trick, the hiding trick, the access management trick in blockchain techniques. The inner working becomes clearer to us -> later.
  14. Hashpointer -> hash that points to data and validates it Log N validation times No circular chains allowed / possible Which of the following changes can be detected in a blockchain data structure? Adding a block, removing a block, modifying data in a block, changing the order of blocks. Answer: all.
  15. What is the difference & why should we care? symmetric algorithms: (also called “secret key”) use the same key for both encryption and decryption; asymmetric algorithms: (also called “public key”) use different keys for encryption and decryption.
  16. https://bitcoin.stackexchange.com/users/307/deathandtaxes What do we need to make it work? Think of cryptography. Is this an example of symmetric or asymmetric cryptography?
  17. <Which two very important features in one go? <hash/Digest+privkey_encryption> Why should we care? Various Proofs: Identity, Existence, Location, Ownership etc. Fun trick: sign a hash pointer. Bitcoin: ECDSA: Elliptic Curve Digital Signature Algorithm
  18. Useful tricks: 1. The public key IS the Identity, the private key PROOFS the Identity (Authentication) 2. Decentralised key generation: anyone can make a new identity at any time and as many as you want. These identities are called ADDRESSES in bitcoin.
  19. Proofs given an guarantee of security, …. only RELATIVE TO Definitions and Assumptions Provable secure schemes can be broken! If: a. definition does not correspond with reality b. assumption is invalid