My presentation prepared for the one-day national level workshop on "Blockchain Technologies" organised by the Department of Information Technology, Academy of Maritime Education and Training. The presentation covers the definition, classification, components, structure and working of ethereum and bitcoin blockchains.
How to Create Blockchain Products by Slice.Market CTOProduct School
Main takeaways:
-Intro to blockchain concepts, public/private keys, signing transactions, wallets,
-Product challenges unique to blockchain
-Metamask and other tools that people currently use to interact with the Ethereum blockchain
-Common design and product considerations when making a blockchain product
Blockchain : A Catalyst for New Approaches in Insurance VIJAY MUTHU
Blockchain technology has a wide variety of use cases in insurance. This excellent PwC study shows the possible impacts
in the insurance value chain which blockchain can bring about.
Webinar: Blockchain – A Revolution You Can’t Stop | by IntellectsoftIntellectsoft
More Details:
Intellectsoft Software Development Company: intellectsoft.net
Blockchain Consulting & Development Lab: blockchain.intellectsoft.net
Watch the Webinar - https://youtu.be/2av_goSQVVo?list=PLMifjE1aUsLMMLnvZKwH1Y3WPjFb13p-f
The revolutionary invention of blockchain is still a controversial topic, and Intellectsoft software development company is about to bring clarity in it. Being the leader in blockchain developing and consulting, it explains in simpler words the elegance of using this brand-new technology as a business decision. Specifically, the company facilitates the understanding of blockchain by both offering the readers essential facts about the innovation and creating applicable recommendations for further practical implementation.
To start with, Intellectsoft provides an overview of blockchain essentials, investigating the nature of this technology along with its structural elements. As a result, a key concepts of blockchain, including digital fingerprinting and access keys, are no longer a mystery for readers. Furthermore, the opportunities of Smart Contracts and mining are explained. In these sections, Intellectsoft already illustrates previously presented theoretical assumptions with practical examples. And the overview achieves a higher clarity, which facilitates the task of developing a blockchain decision for anyone interested. Then, the presentation proceeds to the question of blockchain real-time applications. This includes providing the list of industries that can benefit the most from the innovation and the real advantages their representatives can gain. The special attention is paid to financial services, government, and healthcare, among others. Finally, after describing the major differences between private and public blockchain, Intellectsoft creates recommendations for those interested in the implementation of this decision into business. And after reading, you will get much closer to the decision whether blockchain really deserves its place in your business practice specifically.
How to Create Blockchain Products by Slice.Market CTOProduct School
Main takeaways:
-Intro to blockchain concepts, public/private keys, signing transactions, wallets,
-Product challenges unique to blockchain
-Metamask and other tools that people currently use to interact with the Ethereum blockchain
-Common design and product considerations when making a blockchain product
Blockchain : A Catalyst for New Approaches in Insurance VIJAY MUTHU
Blockchain technology has a wide variety of use cases in insurance. This excellent PwC study shows the possible impacts
in the insurance value chain which blockchain can bring about.
Webinar: Blockchain – A Revolution You Can’t Stop | by IntellectsoftIntellectsoft
More Details:
Intellectsoft Software Development Company: intellectsoft.net
Blockchain Consulting & Development Lab: blockchain.intellectsoft.net
Watch the Webinar - https://youtu.be/2av_goSQVVo?list=PLMifjE1aUsLMMLnvZKwH1Y3WPjFb13p-f
The revolutionary invention of blockchain is still a controversial topic, and Intellectsoft software development company is about to bring clarity in it. Being the leader in blockchain developing and consulting, it explains in simpler words the elegance of using this brand-new technology as a business decision. Specifically, the company facilitates the understanding of blockchain by both offering the readers essential facts about the innovation and creating applicable recommendations for further practical implementation.
To start with, Intellectsoft provides an overview of blockchain essentials, investigating the nature of this technology along with its structural elements. As a result, a key concepts of blockchain, including digital fingerprinting and access keys, are no longer a mystery for readers. Furthermore, the opportunities of Smart Contracts and mining are explained. In these sections, Intellectsoft already illustrates previously presented theoretical assumptions with practical examples. And the overview achieves a higher clarity, which facilitates the task of developing a blockchain decision for anyone interested. Then, the presentation proceeds to the question of blockchain real-time applications. This includes providing the list of industries that can benefit the most from the innovation and the real advantages their representatives can gain. The special attention is paid to financial services, government, and healthcare, among others. Finally, after describing the major differences between private and public blockchain, Intellectsoft creates recommendations for those interested in the implementation of this decision into business. And after reading, you will get much closer to the decision whether blockchain really deserves its place in your business practice specifically.
Blockchain is one of the trending technology that is catching up in the tech space. It solves multiple use cases where the data integrity should be high. In this ppt, the author has worked on explaining the concepts in a simple and elegant way
A Blockchain is essentially a distributed database of records or public ledger of all transactions or digital events that have been executed and shared among participating entities. Each transaction in the public ledger is verified by consensus of a majority of the participants in the system. And, once entered, information can never be erased. The Blockchain contains a certain and verifiable record pf every single transaction ever made. Bitcoin, the decentralized peer-to-peer digital currency, is the most popular example that uses block chain technology.
The Bitcoin itself is highly controversial but the underlying Block-chain technology has worked flawlessly and is all set to democratize our digital world. The main advantage of Block chain is that it establishes a system of creating a distributed consensus in the digital online world. It is finding applications in both financial (e.g. Nasdaq Private Equity, Insurance) and non-financial worlds (e.g. Decentralized IoT, Decentralized proof of existence of documents) by removing the dependency on a single Trusted entity. This disruptive technology opens the door for developing a democratic open and scalable digital economy from a centralized one.
Blockchain Application Design and Development, and the Case of Programmable M...Ingo Weber
Slides from my CLOSER 2021 keynote ( https://www.insticc.org/node/TechnicalProgram/closer/2021/presentationDetails/1390 )
Blockchain has emerged as a decentralized platform for managing digital assets and executing 'smart contracts', i.e., user-defined code. While blockchain's suitability for a given use case should always be scrutinized, it does have the potential to disrupt many of the connection points between individuals, companies, and government entities. In this keynote talk, I will provide an overview of what architects and developers need to know in order to build blockchain-based applications, and how it relates to the cloud and software services. Among others, I will cover blockchain-as-a-service concepts, as well as architectural concerns and model-driven engineering for blockchain applications, the latter also in relation to collaborative business processes. To highlight some of the challenges, I will discuss insights from a project on "programmable money", i.e., blockchain-based money for conditional payments where the money itself checks whether it can be spent in a certain way at the point of payment. Finally, I will touch on insights into current adoption of blockchain.
Blockchain Essentials for Enterprise ArchitectsGokul Alex
My session on Blockchain : Protocols, Platforms, Principles and Paradigms presented in the Benagluru Chamber of Industries and Commerce #BCIC Talk Series held at VMware Software India in collaboration with WomenWhoCode. This presentation is a compilation of essential concepts about Bitcoin, Ethereum, IPFS, Hyperledger, R3 Corda.
Deja vu Security - Blockchain Security Summit - Adam CecchettiScott Strang
Deja vu Security and Peach Tech founder Adam Cecchetti slides from Deja vu Security's December 2017 Security Summit.
The Realities of Enterprise Blockchain
Blockchain is currently everywhere and on the minds of everyone from entrepreneurs to enterprise architects. This talk will explore some of the enterprise focused Blockchain technologies. It will overview how they can fit in the enterprise security ecosystem and what security, integrity, and transnational guarantees they can and cannot provide.
A presentation explaining the concepts of Blockchain. It covers the introduction to blockchain, types of blockchain, process of adding blocks in bitcoin blockchain, hyperledger block structure, use cases of blockchain explained.
The fundamental security properties of blockchain originate from both bitcoin architecture and cryptography advances. the proficiency of the cryptographic chain of blocks was advanced giving birth to various inborn security qualities.
Blockchain and Smart Contracts (Series: Blockchain Basics)Financial Poise
Blockchain is a tool. Samson Williams likens blockchain to a group text message, in which each participant receives a distributed, time-stamped, tamper-resistant (and encrypted) record of data transactions. Each group text has these characteristics. Everyone in the group “sees” the data, and none can change or gainsay any group message. Smart contracts are computer code put on the blockchain (how, exactly?) that establishes self-executing terms and conditions of a transaction. Are smart contracts smart? If certain data comes in and fulfills a pre-set term or condition, then rights and responsibilities are formed, terminated, modified, or shifted among the parties. Ah certainty and transparency, but also ah garbage in and garbage out. Are some contractual terms not amenable to smart contracting? And are smart contracts necessarily contracts? If not, can they still be useful? If a smart contract is a contract, what is the governing document? Is it the words business people and lawyers use, or is it the code that is supposed to reflect the words?
To view the accompanying webinar, go to: https://www.financialpoise.com/financial-poise-webinars/blockchain-and-smart-contracts-2021/
An introduction to blockchains, a session handled by Adri Jovin J J, Department of Information Technology, Sri Ramakrishna Institute of Technology. This gives a basic outline of the blockchains.
Yao Yao, Jack Rasmus-Vorrath, Ivelin Angelov
https://github.com/yaowser/basic_blockchain
https://www.slideshare.net/YaoYao44/blockchain-security-and-demonstration/
Distributed ledger technology over a network of computers, which provides an alternative to the centralized system
Distributed Database
Peer-to-Peer Transmission
Transparency with Pseudonymity
Records are immutable
Computational Logic
https://www.youtube.com/watch?v=5ArZxRdhyPc
Blockchain is one of the trending technology that is catching up in the tech space. It solves multiple use cases where the data integrity should be high. In this ppt, the author has worked on explaining the concepts in a simple and elegant way
A Blockchain is essentially a distributed database of records or public ledger of all transactions or digital events that have been executed and shared among participating entities. Each transaction in the public ledger is verified by consensus of a majority of the participants in the system. And, once entered, information can never be erased. The Blockchain contains a certain and verifiable record pf every single transaction ever made. Bitcoin, the decentralized peer-to-peer digital currency, is the most popular example that uses block chain technology.
The Bitcoin itself is highly controversial but the underlying Block-chain technology has worked flawlessly and is all set to democratize our digital world. The main advantage of Block chain is that it establishes a system of creating a distributed consensus in the digital online world. It is finding applications in both financial (e.g. Nasdaq Private Equity, Insurance) and non-financial worlds (e.g. Decentralized IoT, Decentralized proof of existence of documents) by removing the dependency on a single Trusted entity. This disruptive technology opens the door for developing a democratic open and scalable digital economy from a centralized one.
Blockchain Application Design and Development, and the Case of Programmable M...Ingo Weber
Slides from my CLOSER 2021 keynote ( https://www.insticc.org/node/TechnicalProgram/closer/2021/presentationDetails/1390 )
Blockchain has emerged as a decentralized platform for managing digital assets and executing 'smart contracts', i.e., user-defined code. While blockchain's suitability for a given use case should always be scrutinized, it does have the potential to disrupt many of the connection points between individuals, companies, and government entities. In this keynote talk, I will provide an overview of what architects and developers need to know in order to build blockchain-based applications, and how it relates to the cloud and software services. Among others, I will cover blockchain-as-a-service concepts, as well as architectural concerns and model-driven engineering for blockchain applications, the latter also in relation to collaborative business processes. To highlight some of the challenges, I will discuss insights from a project on "programmable money", i.e., blockchain-based money for conditional payments where the money itself checks whether it can be spent in a certain way at the point of payment. Finally, I will touch on insights into current adoption of blockchain.
Blockchain Essentials for Enterprise ArchitectsGokul Alex
My session on Blockchain : Protocols, Platforms, Principles and Paradigms presented in the Benagluru Chamber of Industries and Commerce #BCIC Talk Series held at VMware Software India in collaboration with WomenWhoCode. This presentation is a compilation of essential concepts about Bitcoin, Ethereum, IPFS, Hyperledger, R3 Corda.
Deja vu Security - Blockchain Security Summit - Adam CecchettiScott Strang
Deja vu Security and Peach Tech founder Adam Cecchetti slides from Deja vu Security's December 2017 Security Summit.
The Realities of Enterprise Blockchain
Blockchain is currently everywhere and on the minds of everyone from entrepreneurs to enterprise architects. This talk will explore some of the enterprise focused Blockchain technologies. It will overview how they can fit in the enterprise security ecosystem and what security, integrity, and transnational guarantees they can and cannot provide.
A presentation explaining the concepts of Blockchain. It covers the introduction to blockchain, types of blockchain, process of adding blocks in bitcoin blockchain, hyperledger block structure, use cases of blockchain explained.
The fundamental security properties of blockchain originate from both bitcoin architecture and cryptography advances. the proficiency of the cryptographic chain of blocks was advanced giving birth to various inborn security qualities.
Blockchain and Smart Contracts (Series: Blockchain Basics)Financial Poise
Blockchain is a tool. Samson Williams likens blockchain to a group text message, in which each participant receives a distributed, time-stamped, tamper-resistant (and encrypted) record of data transactions. Each group text has these characteristics. Everyone in the group “sees” the data, and none can change or gainsay any group message. Smart contracts are computer code put on the blockchain (how, exactly?) that establishes self-executing terms and conditions of a transaction. Are smart contracts smart? If certain data comes in and fulfills a pre-set term or condition, then rights and responsibilities are formed, terminated, modified, or shifted among the parties. Ah certainty and transparency, but also ah garbage in and garbage out. Are some contractual terms not amenable to smart contracting? And are smart contracts necessarily contracts? If not, can they still be useful? If a smart contract is a contract, what is the governing document? Is it the words business people and lawyers use, or is it the code that is supposed to reflect the words?
To view the accompanying webinar, go to: https://www.financialpoise.com/financial-poise-webinars/blockchain-and-smart-contracts-2021/
An introduction to blockchains, a session handled by Adri Jovin J J, Department of Information Technology, Sri Ramakrishna Institute of Technology. This gives a basic outline of the blockchains.
Yao Yao, Jack Rasmus-Vorrath, Ivelin Angelov
https://github.com/yaowser/basic_blockchain
https://www.slideshare.net/YaoYao44/blockchain-security-and-demonstration/
Distributed ledger technology over a network of computers, which provides an alternative to the centralized system
Distributed Database
Peer-to-Peer Transmission
Transparency with Pseudonymity
Records are immutable
Computational Logic
https://www.youtube.com/watch?v=5ArZxRdhyPc
Blockchain - Primer for City CIOs v05 01 22.pdfssusera441c2
Blockchain primary for city government chief information officers. Originally prepared for the Cities Leadership Forum hosted by Cities Institute, Philadelphia March 2022.
Blockchain in Banking, Business and BeyondMichael Novak
An introduction to Blockchain, Smart Contracts, and use cases in industries such as Digital Identification, eCommerce, Healthcare, Government, and Finance.
Nov 2 security for blockchain and analytics ulf mattsson 2020 nov 2bUlf Mattsson
Blockchain
- What is Blockchain?
- Blockchain trends
Emerging data protection techniques
- Secure multiparty computation
- Trusted execution environments
- Use cases for analytics
- Industry Standards
Tokenization
- Convert a digital value into a digital token
- Tokenization local or in a centralized model
- Tokenization and scalability
Cloud
- Analytics in Hybrid cloud
Slides for the talk by Dr Michael Zargham at the University of Pennsylvania's Warren Center for Network and Data Sciences on April 19, 2018. Concepts, formal theory and data is presented.
IoT and Blockchain Challenges and RisksAhmed Banafa
The biggest challenge facing IoT security is coming from the very architecture of the current IoT ecosystem; it’s all based on a centralized model known as the server/client model. All devices are identified, authenticated and connected through cloud servers that support huge processing and storage capacities. The connection between devices will have to go through the cloud, even if they happen to be a few feet apart. While this model has connected computing devices for decades and will continue to support today IoT networks, it will not be able to respond to the growing needs of the huge IoT ecosystems of tomorrow.
Introduction to Relational Database Management SystemsAdri Jovin
This presentation contains information relevant to the relational database management systems and the various operations that are performed over a relational database.
This presentation contains the concepts related to database design using ER Diagram. The content is adapted from the contents of the authors of the book mentioned in the reference.
Introduction to Database Management SystemsAdri Jovin
This presentation contains content relevant to the introduction to the database management systems. The content is adapted from the original work of Abe Silberschatz et. al.
Introduction to Artificial Neural NetworksAdri Jovin
This presentation describes the various components, classification and application of Artificial Neural Networks. It also gives an outline on the other soft computing techniques also.
This presentation gives an outline of the course Soft Computing, which is a Professional Elective offered by the Department of Information Technology, Sri Ramakrishna Institute of Technology, Coimbatore.
My presentation on Image-based Security prepared for the Faculty Development Programme on "Research Issues in Digital Image Processing". This covers the concepts of Visual Cryptography and is based on the book "Handbook of Image-based Security Techniques"
This presentation provides an introduction to cybersecurity. This presentation is a part of the Five days Faculty Development Program on Cybersecurity organized by the Department of Information Technology, Sri Ramakrishna Institute of Technology.
Advanced Encryption System & Block Cipher Modes of OperationsAdri Jovin
This presentation contains the contents pertaining to the undergraduate course on Cryptography and Network Security (UITC203) at Sri Ramakrishna Institute of Technology. This covers the Advanced Encryption Standard and the various block cipher moder of operations.
This presentation contains the contents pertaining to the undergraduate course on Cryptography and Network Security (UITC203) at Sri Ramakrishna Institute of Technology. This covers a case study on the heartbleed bug, a major security issue faced by the internet community in 2014 due to implementation issues.
Zoom: Privacy and Security - A case studyAdri Jovin
This presentation contains the contents pertaining to the undergraduate course on Cryptography and Network Security (UITC203) at Sri Ramakrishna Institute of Technology. This covers a case study on security and privacy issues faced by Zoom, a prominent online cloud-based video conferencing application.
This presentation contains the contents pertaining to the undergraduate course on Cryptography and Network Security (UITC203) at Sri Ramakrishna Institute of Technology. This covers the Elliptic Curve Cryptography and the basis of elliptic curve arithmetics.
This presentation contains the contents pertaining to the undergraduate course on Cryptography and Network Security (UITC203) at Sri Ramakrishna Institute of Technology. This covers the ElGamal Cryptosystem.
This presentation contains the contents pertaining to the undergraduate course on Cryptography and Network Security (UITC203) at Sri Ramakrishna Institute of Technology. This covers the Data Encryption Standard and its variants.
This presentation contains the contents pertaining to the undergraduate course on Cryptography and Network Security (UITC203) at Sri Ramakrishna Institute of Technology. This covers the classical cryptographic techniques that were in practice and the basic concepts behind the design of Feistel ciphers
Mathematical Foundations of CryptographyAdri Jovin
This presentation contains the contents pertaining to the undergraduate course on Cryptography and Network Security (UITC203) at Sri Ramakrishna Institute of Technology. This covers the basic concepts of mathematics that are essential to work with cryptography.
Overview of the fundamental roles in Hydropower generation and the components involved in wider Electrical Engineering.
This paper presents the design and construction of hydroelectric dams from the hydrologist’s survey of the valley before construction, all aspects and involved disciplines, fluid dynamics, structural engineering, generation and mains frequency regulation to the very transmission of power through the network in the United Kingdom.
Author: Robbie Edward Sayers
Collaborators and co editors: Charlie Sims and Connor Healey.
(C) 2024 Robbie E. Sayers
About
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Technical Specifications
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
Key Features
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface
• Compatible with MAFI CCR system
• Copatiable with IDM8000 CCR
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
Application
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Cosmetic shop management system project report.pdfKamal Acharya
Buying new cosmetic products is difficult. It can even be scary for those who have sensitive skin and are prone to skin trouble. The information needed to alleviate this problem is on the back of each product, but it's thought to interpret those ingredient lists unless you have a background in chemistry.
Instead of buying and hoping for the best, we can use data science to help us predict which products may be good fits for us. It includes various function programs to do the above mentioned tasks.
Data file handling has been effectively used in the program.
The automated cosmetic shop management system should deal with the automation of general workflow and administration process of the shop. The main processes of the system focus on customer's request where the system is able to search the most appropriate products and deliver it to the customers. It should help the employees to quickly identify the list of cosmetic product that have reached the minimum quantity and also keep a track of expired date for each cosmetic product. It should help the employees to find the rack number in which the product is placed.It is also Faster and more efficient way.
Welcome to WIPAC Monthly the magazine brought to you by the LinkedIn Group Water Industry Process Automation & Control.
In this month's edition, along with this month's industry news to celebrate the 13 years since the group was created we have articles including
A case study of the used of Advanced Process Control at the Wastewater Treatment works at Lleida in Spain
A look back on an article on smart wastewater networks in order to see how the industry has measured up in the interim around the adoption of Digital Transformation in the Water Industry.
Final project report on grocery store management system..pdfKamal Acharya
In today’s fast-changing business environment, it’s extremely important to be able to respond to client needs in the most effective and timely manner. If your customers wish to see your business online and have instant access to your products or services.
Online Grocery Store is an e-commerce website, which retails various grocery products. This project allows viewing various products available enables registered users to purchase desired products instantly using Paytm, UPI payment processor (Instant Pay) and also can place order by using Cash on Delivery (Pay Later) option. This project provides an easy access to Administrators and Managers to view orders placed using Pay Later and Instant Pay options.
In order to develop an e-commerce website, a number of Technologies must be studied and understood. These include multi-tiered architecture, server and client-side scripting techniques, implementation technologies, programming language (such as PHP, HTML, CSS, JavaScript) and MySQL relational databases. This is a project with the objective to develop a basic website where a consumer is provided with a shopping cart website and also to know about the technologies used to develop such a website.
This document will discuss each of the underlying technologies to create and implement an e- commerce website.
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Dr.Costas Sachpazis
Terzaghi's soil bearing capacity theory, developed by Karl Terzaghi, is a fundamental principle in geotechnical engineering used to determine the bearing capacity of shallow foundations. This theory provides a method to calculate the ultimate bearing capacity of soil, which is the maximum load per unit area that the soil can support without undergoing shear failure. The Calculation HTML Code included.
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Blockchain Technologies
1. Blockchain Technologies
Adri Jovin J J, M.Tech., Ph.D., B.G.L.,
Assistant Professor (Sl. Gr.), Department of Information Technology
Sri Ramakrishna Institute of Technology
2. This presentation is intended…
• For beginners
• To understand the characteristics and uses of blockchain
• To discuss about the roles and users in a blockchain
• To discuss about public and private blockchains
• To get enlightened about consensus and the need for consensus in a blockchain
26-05-2021 Blockchain Technologies 2
3. Agent-based Intelligent Systems
• Code Mobility using Mobile Agents
• Decentralization, Distribution of authority
• Comprises of 3 components
• Code
• State
• Data
26-05-2021 Blockchain Technologies 3
4. Distributed Ledger Technologies (DLT)
“The arc of the internet is now bending towards decentralization.”
— Naval Ravikant
• Decentralization – a major transformation
• Giving the rights to the user
• Crypto-economy
• Computer security engineer, applied cryptographer, and distributed systems engineer
26-05-2021 Blockchain Technologies 4
5. DLT (Contd…)
Distributed Ledger – a type of data structure
Includes blockchains and smart contracts
3 basic components
• Data Model – maintains the current state of the ledger
• Language of transactions – changes the state of the ledger
• Protocol – used to build consensus among participants
26-05-2021 Blockchain Technologies 5
6. What is blockchain?
Peer-to-peer distributed ledger
Forged by consensus
Combined with a system
Used to build transactional applications that establish
• Trust
• Accountability
• Transparency
26-05-2021 Blockchain Technologies 6
7. Application Domains
• Goods Transfer (e.g. Supply Chain)
• Digital Media Transfer (e.g. Sale of Art)
• Remote Services Delivery (e.g. Travel and Tourism)
• Decentralized Business Logic (e.g. Moving Computing to Data Sources)
• Distributed Intelligence (e.g. Education Credentialing)
• Distributed Resources (e.g. Power Generation and Distribution)
• Crowd Funding (e.g. Startup Fund Raising)
• Crowd Operations (e.g. Electronic Voting)
• Identity Management (e.g. One ID for all life functions)
• Government Public Records (e.g. Open Governing)
26-05-2021 Blockchain Technologies 7
8. Definition of blockchain
According to Hyperledger
A blockchain is a peer-to-peer distributed ledger forged by consensus, combined with a
system for "smart contracts" and other assistive technologies.
Smart contracts are computer programs that execute predefined actions when certain
conditions within the system are met.
Consensus refers to a system of ensuring that parties agree to a certain state of the
system as the true state.
26-05-2021 Blockchain Technologies 8
9. Bitcoin vs Blockchain
• Bitcoin made blockchain popular
• Bitcoin - Major innovation of blockchain
• Bitcoin is a use case for blockchain
• Transacted over an open, public, anonymous blockchain network
• Continuously working digital currency
26-05-2021 Blockchain Technologies 9
10. Blockchain – a little deeper perspective
Subset of DLT
Block - set of transactions that are bundled together and added to the chain at the same time
Block contains 4 pieces of metadata
• Reference of the previous block
• Proof of work, also known as nonce
• Timestamp
• Merkle tree root for the transactions included in this block
26-05-2021 Blockchain Technologies 10
11. Blockchain is Immutable
• If the data is tampered with anywhere in the chain, the links will break
• This provides immutability and security.
26-05-2021 Blockchain Technologies 11
12. Transactions
• Record of an event, cryptographically secured with a digital signature, that is verified, ordered,
and bundled together into blocks
• Cryptography has a key role to play both in the security, as well as in the immutability of the
transactions recorded on blockchains.
26-05-2021 Blockchain Technologies 12
13. Databases vs Blockchains
Blockchains Databases
Write-only data
structure
Data can be easily
modified and deleted
Decentralized
applications
Centralized
applications
26-05-2021 Blockchain Technologies 13
15. Components of Blockchain
Ledger: A distributed, immutable historical record
Peer Network: Stores, updates, and maintains the ledger
Membership Services: User authentication, authorization, and identity management
Smart Contract: Program that runs on the blockchain
Wallet: Stores users' credentials
Events: Notifications of updates and actions on the blockchain
Systems Management: Component creation, modification, and monitoring
Systems Integration: Integration of blockchain with external systems.
26-05-2021 Blockchain Technologies 15
17. UTXO
• Unique identifier of the transaction that created the UTXO
• Index of the UTXO in the transaction’s output list
• Value
• Optional: Conditions under which output can be spent
26-05-2021 Blockchain Technologies 17
18. Transaction
• Reference number of the current transaction
• References to one or more input UTXOs
• References to one or more output UTXOs newly generated by the current transaction
• Total input and output amount
26-05-2021 Blockchain Technologies 18
24. Roles of Participants
26-05-2021 Blockchain Technologies 24
• Transfer of values by
creating transactions • Verify transactions
• Broadcast transactions
• Compete to create a block
• Reach consensus by validating block
• Broadcasting new block
• Confirm transactions
USER MINER
25. Creating a block
26-05-2021 Blockchain Technologies 25
Transaction
added
Rejected
Transaction
Valid
Transaction
Pool of
Unconfirmed
Transaction
Select set of
Transactions
to create
block
Miners
compete by
solving
puzzle
Solved block
broadcast
Verify new
block
New block
added to
chain and
confirmed
26. Types of blockchains (Application based)
Blockchains (based
on application)
Type 1: Only
Cryptocurrency
Type 2: Currency +
Business Logic
Type 3: Only
Business Logic
26-05-2021 Blockchain Technologies 26
27. Types of blockchains (Access based)
Blockchains
Public Private Permissioned
26-05-2021 Blockchain Technologies 27
28. Bitcoin vs Ethereum
Wallet/ Exchange Applications
Bitcoin Blockchain Protocol/ Operations
Peer to peer Network and Operating Systems
Hardware
Verticals: End User Applications
Application Frameworks: Smart Contracts
Ethereum Blockchain and Ethereum Virtual
Machine
Peer-to-peer Network and Operating Systems
Hardware
26-05-2021 Blockchain Technologies 28
29. Smart Contracts
• Data
• Functions or Methods with modifiers
• Get/ Set functions
Solidity is a programming language specifically designed to execute Smart Contracts
26-05-2021 Blockchain Technologies 29
30. Security in Ethereum and Bitcoin
• Both the blockchains use Elliptic-Curve Cryptography rather than using RSA
• 256 bits ECC key pair ≅3072 bits RSA key pair
• Hashing for integrity (SHA-3, SHA-256, Keccak)
• Hashing is used to generate
Account Addresses
Digital Signature
Transaction Hash
Receipt Hash
Block Header Hash
26-05-2021 Blockchain Technologies 30
31. Address of accounts
1. 256 – bit random number = private key
2. ECC algorithm is applied to private key to generate public key
3. Hashing applied to public key = account address (20 bytes)
Transaction for transferring assets should be
• Authorized
• Non-repudiable
• Unmodifiable
26-05-2021 Blockchain Technologies 31
33. Integrity of a block
• Block header contents are not tampered
• Transactions are not tampered
• State Transitions are computed, hashed and verified
26-05-2021 Blockchain Technologies 33
35. Establishing Trust in a Blockchain
• Secure chain using protocols
• Validate blocks and transactions
• Verifying the availability of resources
• Executing and confirming transactions
26-05-2021 Blockchain Technologies 35
36. Consensus Algorithm
• Ensures that the data on the ledger is the same for all the nodes in the network
• Prevents malicious actors from manipulating the data
• Varies with different implementations
26-05-2021 Blockchain Technologies 36
37. Types
• Proof of Work
• Proof of Stake
• Proof of Elapsed Time
• Proof of Authority
26-05-2021 Blockchain Technologies 37
38. Proof of Work
• Involves solving a computational challenging puzzle in order to create new blocks
• Requires a huge amount of energy to be expended, given the computationally heavy
algorithm
• Has a high latency of transaction validation
• Concentration of mining power is located in countries where electricity is cheap
Proof-of-work (PoW) is the outcome of a successful mining process and, although the proof is hard to create, [it] is easy
to verify.
- 2016 Kudelski Security report
26-05-2021 Blockchain Technologies 38
39. PoW in Bitcoin and Ethereum
26-05-2021 Blockchain Technologies 39
Block Header
Element
(BHash)
Nonce
H=Hash(Bhash, Nonce)
H<F(Difficulty)
Change
Variable
Nonce
Solved winner
adds block to the
blockchain
Broadcasts Block
40. Proof of Stake (PoS)
• Generalization of the Proof of Work
• Nodes are known as the 'validators‘ that validate the transactions to earn a transaction fee
• Nodes are randomly selected to validate blocks
• PoS algorithm saves expensive computational resources that are spent in mining under a
PoW consensus
26-05-2021 Blockchain Technologies 40
41. Proof of Elapsed Time (PoET)
• Developed by Intel
• Hybrid of a random lottery and first-come-first-serve basis
• Each validator is given a random wait time
• The validator with the shortest wait time for a particular transaction block is elected the
leader.
• This "leader" gets to create the next block on the chain
26-05-2021 Blockchain Technologies 41
42. Proof of Authority
• Used for permissioned ledgers
• Uses a set of 'authorities', which are designated nodes that are allowed to create new blocks
and secure the ledger
• Require sign-off by a majority of authorities in order for a block to be created
26-05-2021 Blockchain Technologies 42
A Merkle root is the hash of all the hashes of all the transactions that are part of a block in a blockchain network.
According to Andreas M. Antonopoulos, in the Bitcoin protocol,
"Merkle trees are used to summarize all the transactions in a block, producing an overall digital fingerprint of the entire set of transactions, providing a very efficient process to verify whether a transaction is included in a block."