SlideShare a Scribd company logo
Blockchain Technologies
Adri Jovin J J, M.Tech., Ph.D., B.G.L.,
Assistant Professor (Sl. Gr.), Department of Information Technology
Sri Ramakrishna Institute of Technology
This presentation is intended…
• For beginners
• To understand the characteristics and uses of blockchain
• To discuss about the roles and users in a blockchain
• To discuss about public and private blockchains
• To get enlightened about consensus and the need for consensus in a blockchain
26-05-2021 Blockchain Technologies 2
Agent-based Intelligent Systems
• Code Mobility using Mobile Agents
• Decentralization, Distribution of authority
• Comprises of 3 components
• Code
• State
• Data
26-05-2021 Blockchain Technologies 3
Distributed Ledger Technologies (DLT)
“The arc of the internet is now bending towards decentralization.”
— Naval Ravikant
• Decentralization – a major transformation
• Giving the rights to the user
• Crypto-economy
• Computer security engineer, applied cryptographer, and distributed systems engineer
26-05-2021 Blockchain Technologies 4
DLT (Contd…)
Distributed Ledger – a type of data structure
Includes blockchains and smart contracts
3 basic components
• Data Model – maintains the current state of the ledger
• Language of transactions – changes the state of the ledger
• Protocol – used to build consensus among participants
26-05-2021 Blockchain Technologies 5
What is blockchain?
Peer-to-peer distributed ledger
Forged by consensus
Combined with a system
Used to build transactional applications that establish
• Trust
• Accountability
• Transparency
26-05-2021 Blockchain Technologies 6
Application Domains
• Goods Transfer (e.g. Supply Chain)
• Digital Media Transfer (e.g. Sale of Art)
• Remote Services Delivery (e.g. Travel and Tourism)
• Decentralized Business Logic (e.g. Moving Computing to Data Sources)
• Distributed Intelligence (e.g. Education Credentialing)
• Distributed Resources (e.g. Power Generation and Distribution)
• Crowd Funding (e.g. Startup Fund Raising)
• Crowd Operations (e.g. Electronic Voting)
• Identity Management (e.g. One ID for all life functions)
• Government Public Records (e.g. Open Governing)
26-05-2021 Blockchain Technologies 7
Definition of blockchain
According to Hyperledger
A blockchain is a peer-to-peer distributed ledger forged by consensus, combined with a
system for "smart contracts" and other assistive technologies.
Smart contracts are computer programs that execute predefined actions when certain
conditions within the system are met.
Consensus refers to a system of ensuring that parties agree to a certain state of the
system as the true state.
26-05-2021 Blockchain Technologies 8
Bitcoin vs Blockchain
• Bitcoin made blockchain popular
• Bitcoin - Major innovation of blockchain
• Bitcoin is a use case for blockchain
• Transacted over an open, public, anonymous blockchain network
• Continuously working digital currency
26-05-2021 Blockchain Technologies 9
Blockchain – a little deeper perspective
Subset of DLT
Block - set of transactions that are bundled together and added to the chain at the same time
Block contains 4 pieces of metadata
• Reference of the previous block
• Proof of work, also known as nonce
• Timestamp
• Merkle tree root for the transactions included in this block
26-05-2021 Blockchain Technologies 10
Blockchain is Immutable
• If the data is tampered with anywhere in the chain, the links will break
• This provides immutability and security.
26-05-2021 Blockchain Technologies 11
Transactions
• Record of an event, cryptographically secured with a digital signature, that is verified, ordered,
and bundled together into blocks
• Cryptography has a key role to play both in the security, as well as in the immutability of the
transactions recorded on blockchains.
26-05-2021 Blockchain Technologies 12
Databases vs Blockchains
Blockchains Databases
Write-only data
structure
Data can be easily
modified and deleted
Decentralized
applications
Centralized
applications
26-05-2021 Blockchain Technologies 13
Structure of Blockchain
26-05-2021 Blockchain Technologies 14
Transactions Blocks Blockchain
Consensus
and Verify
Components of Blockchain
Ledger: A distributed, immutable historical record
Peer Network: Stores, updates, and maintains the ledger
Membership Services: User authentication, authorization, and identity management
Smart Contract: Program that runs on the blockchain
Wallet: Stores users' credentials
Events: Notifications of updates and actions on the blockchain
Systems Management: Component creation, modification, and monitoring
Systems Integration: Integration of blockchain with external systems.
26-05-2021 Blockchain Technologies 15
Bitcoin- Basic block
Unspent Transaction Output (UTXO)
26-05-2021 Blockchain Technologies 16
Reference Number
Input Output
UTXO1 UTXO1
UTXO2 UTXO2
UTXO3 UTXO3
UTXOn UTXOm
UTXO
• Unique identifier of the transaction that created the UTXO
• Index of the UTXO in the transaction’s output list
• Value
• Optional: Conditions under which output can be spent
26-05-2021 Blockchain Technologies 17
Transaction
• Reference number of the current transaction
• References to one or more input UTXOs
• References to one or more output UTXOs newly generated by the current transaction
• Total input and output amount
26-05-2021 Blockchain Technologies 18
Sample Transaction
26-05-2021 Blockchain Technologies 19
Input UTXO
Output UTXO
Total amount spent
Sample Transaction (Contd…)
26-05-2021 Blockchain Technologies 20
Sample Transaction (Contd…)
26-05-2021 Blockchain Technologies 21
Sample Block
26-05-2021 Blockchain Technologies 22
Sample Block (Contd…)
26-05-2021 Blockchain Technologies 23
Roles of Participants
26-05-2021 Blockchain Technologies 24
• Transfer of values by
creating transactions • Verify transactions
• Broadcast transactions
• Compete to create a block
• Reach consensus by validating block
• Broadcasting new block
• Confirm transactions
USER MINER
Creating a block
26-05-2021 Blockchain Technologies 25
Transaction
added
Rejected
Transaction
Valid
Transaction
Pool of
Unconfirmed
Transaction
Select set of
Transactions
to create
block
Miners
compete by
solving
puzzle
Solved block
broadcast
Verify new
block
New block
added to
chain and
confirmed
Types of blockchains (Application based)
Blockchains (based
on application)
Type 1: Only
Cryptocurrency
Type 2: Currency +
Business Logic
Type 3: Only
Business Logic
26-05-2021 Blockchain Technologies 26
Types of blockchains (Access based)
Blockchains
Public Private Permissioned
26-05-2021 Blockchain Technologies 27
Bitcoin vs Ethereum
Wallet/ Exchange Applications
Bitcoin Blockchain Protocol/ Operations
Peer to peer Network and Operating Systems
Hardware
Verticals: End User Applications
Application Frameworks: Smart Contracts
Ethereum Blockchain and Ethereum Virtual
Machine
Peer-to-peer Network and Operating Systems
Hardware
26-05-2021 Blockchain Technologies 28
Smart Contracts
• Data
• Functions or Methods with modifiers
• Get/ Set functions
Solidity is a programming language specifically designed to execute Smart Contracts
26-05-2021 Blockchain Technologies 29
Security in Ethereum and Bitcoin
• Both the blockchains use Elliptic-Curve Cryptography rather than using RSA
• 256 bits ECC key pair ≅3072 bits RSA key pair
• Hashing for integrity (SHA-3, SHA-256, Keccak)
• Hashing is used to generate
 Account Addresses
 Digital Signature
 Transaction Hash
 Receipt Hash
 Block Header Hash
26-05-2021 Blockchain Technologies 30
Address of accounts
1. 256 – bit random number = private key
2. ECC algorithm is applied to private key to generate public key
3. Hashing applied to public key = account address (20 bytes)
Transaction for transferring assets should be
• Authorized
• Non-repudiable
• Unmodifiable
26-05-2021 Blockchain Technologies 31
Complete transaction Verification
• Timestamp
• Nonce
• Account Balances
• Sufficiency of Fees
26-05-2021 Blockchain Technologies 32
Integrity of a block
• Block header contents are not tampered
• Transactions are not tampered
• State Transitions are computed, hashed and verified
26-05-2021 Blockchain Technologies 33
Merkle Tree
60
41
10 31
10
4 6
21
19
26-05-2021 Blockchain Technologies 34
Establishing Trust in a Blockchain
• Secure chain using protocols
• Validate blocks and transactions
• Verifying the availability of resources
• Executing and confirming transactions
26-05-2021 Blockchain Technologies 35
Consensus Algorithm
• Ensures that the data on the ledger is the same for all the nodes in the network
• Prevents malicious actors from manipulating the data
• Varies with different implementations
26-05-2021 Blockchain Technologies 36
Types
• Proof of Work
• Proof of Stake
• Proof of Elapsed Time
• Proof of Authority
26-05-2021 Blockchain Technologies 37
Proof of Work
• Involves solving a computational challenging puzzle in order to create new blocks
• Requires a huge amount of energy to be expended, given the computationally heavy
algorithm
• Has a high latency of transaction validation
• Concentration of mining power is located in countries where electricity is cheap
Proof-of-work (PoW) is the outcome of a successful mining process and, although the proof is hard to create, [it] is easy
to verify.
- 2016 Kudelski Security report
26-05-2021 Blockchain Technologies 38
PoW in Bitcoin and Ethereum
26-05-2021 Blockchain Technologies 39
Block Header
Element
(BHash)
Nonce
H=Hash(Bhash, Nonce)
H<F(Difficulty)
Change
Variable
Nonce
Solved winner
adds block to the
blockchain
Broadcasts Block
Proof of Stake (PoS)
• Generalization of the Proof of Work
• Nodes are known as the 'validators‘ that validate the transactions to earn a transaction fee
• Nodes are randomly selected to validate blocks
• PoS algorithm saves expensive computational resources that are spent in mining under a
PoW consensus
26-05-2021 Blockchain Technologies 40
Proof of Elapsed Time (PoET)
• Developed by Intel
• Hybrid of a random lottery and first-come-first-serve basis
• Each validator is given a random wait time
• The validator with the shortest wait time for a particular transaction block is elected the
leader.
• This "leader" gets to create the next block on the chain
26-05-2021 Blockchain Technologies 41
Proof of Authority
• Used for permissioned ledgers
• Uses a set of 'authorities', which are designated nodes that are allowed to create new blocks
and secure the ledger
• Require sign-off by a majority of authorities in order for a block to be created
26-05-2021 Blockchain Technologies 42
Key takeaways
Decentralization
Distributed Immutable Ledger
UTXO
Smart Contract
EVM
Merkle Tree
Proof of Work
26-05-2021 Blockchain Technologies 43
References
http://hyperledger.org/about
https://github.com/hyperledger-archives/education/tree/master/LFS171x
https://hbr.org/2017/02/a-brief-history-of-blockchain
https://www.investopedia.com/terms/m/merkle-root-cryptocurrency.asp
http://chimera.labs.oreilly.com/books/1234000001802/ch07.html
#_structure_of_a_block
26-05-2021 Blockchain Technologies 44
Thank you!
26-05-2021 Blockchain Technologies 45

More Related Content

What's hot

Blockchain workshop 101
Blockchain workshop 101Blockchain workshop 101
Blockchain workshop 101
Karthikeyan VK
 
Blockchain: The New Technology of Trust
Blockchain: The New Technology of TrustBlockchain: The New Technology of Trust
Blockchain: The New Technology of Trust
Macha Pujitha
 
Use case of block chain unit 4 AKTU
Use case of block chain unit 4 AKTUUse case of block chain unit 4 AKTU
Use case of block chain unit 4 AKTU
Rohit Verma
 
Blockchain tutorial
Blockchain tutorial Blockchain tutorial
Blockchain tutorial
Rohit Verma
 
Blockchain
BlockchainBlockchain
Blockchain
Sai Nath
 
Blockchain: Bitcoin and Beyond
Blockchain: Bitcoin and BeyondBlockchain: Bitcoin and Beyond
Blockchain: Bitcoin and Beyond
Sanjeev Verma, PhD
 
Basic blockchain
Basic blockchainBasic blockchain
Basic blockchain
Aleksey Gudkov
 
The Blockchain as a Software Connector
The Blockchain as a Software ConnectorThe Blockchain as a Software Connector
The Blockchain as a Software Connector
Cesare Pautasso
 
Blockchain notes b tech aktu by krazy kreation (kulbhushan)
Blockchain notes b tech aktu by krazy kreation (kulbhushan)Blockchain notes b tech aktu by krazy kreation (kulbhushan)
Blockchain notes b tech aktu by krazy kreation (kulbhushan)
rahulmondol
 
Blockchain Application Design and Development, and the Case of Programmable M...
Blockchain Application Design and Development, and the Case of Programmable M...Blockchain Application Design and Development, and the Case of Programmable M...
Blockchain Application Design and Development, and the Case of Programmable M...
Ingo Weber
 
Blockchain Essentials for Enterprise Architects
Blockchain Essentials for Enterprise ArchitectsBlockchain Essentials for Enterprise Architects
Blockchain Essentials for Enterprise Architects
Gokul Alex
 
Blockchain
BlockchainBlockchain
Blockchain
Mohit Singh
 
Deja vu Security - Blockchain Security Summit - Adam Cecchetti
Deja vu Security - Blockchain Security Summit - Adam CecchettiDeja vu Security - Blockchain Security Summit - Adam Cecchetti
Deja vu Security - Blockchain Security Summit - Adam Cecchetti
Scott Strang
 
Blockchain
BlockchainBlockchain
Blockchain on Azure
Blockchain on AzureBlockchain on Azure
Blockchain on Azure
Nuri Cankaya
 
Security and privacy with blockchain
Security and privacy with blockchainSecurity and privacy with blockchain
Security and privacy with blockchain
Celine George
 
Blockchain technology
Blockchain technologyBlockchain technology
Blockchain technology
SubhashKumar329
 
Blockchain Essentials - Harnessing the Technology for Banking Industry
Blockchain Essentials - Harnessing the Technology for Banking IndustryBlockchain Essentials - Harnessing the Technology for Banking Industry
Blockchain Essentials - Harnessing the Technology for Banking Industry
Goutama Bachtiar
 
Security in the blockchain
Security in the blockchainSecurity in the blockchain
Security in the blockchain
Bellaj Badr
 
Blockchain and Smart Contracts (Series: Blockchain Basics)
Blockchain and Smart Contracts (Series: Blockchain Basics)Blockchain and Smart Contracts (Series: Blockchain Basics)
Blockchain and Smart Contracts (Series: Blockchain Basics)
Financial Poise
 

What's hot (20)

Blockchain workshop 101
Blockchain workshop 101Blockchain workshop 101
Blockchain workshop 101
 
Blockchain: The New Technology of Trust
Blockchain: The New Technology of TrustBlockchain: The New Technology of Trust
Blockchain: The New Technology of Trust
 
Use case of block chain unit 4 AKTU
Use case of block chain unit 4 AKTUUse case of block chain unit 4 AKTU
Use case of block chain unit 4 AKTU
 
Blockchain tutorial
Blockchain tutorial Blockchain tutorial
Blockchain tutorial
 
Blockchain
BlockchainBlockchain
Blockchain
 
Blockchain: Bitcoin and Beyond
Blockchain: Bitcoin and BeyondBlockchain: Bitcoin and Beyond
Blockchain: Bitcoin and Beyond
 
Basic blockchain
Basic blockchainBasic blockchain
Basic blockchain
 
The Blockchain as a Software Connector
The Blockchain as a Software ConnectorThe Blockchain as a Software Connector
The Blockchain as a Software Connector
 
Blockchain notes b tech aktu by krazy kreation (kulbhushan)
Blockchain notes b tech aktu by krazy kreation (kulbhushan)Blockchain notes b tech aktu by krazy kreation (kulbhushan)
Blockchain notes b tech aktu by krazy kreation (kulbhushan)
 
Blockchain Application Design and Development, and the Case of Programmable M...
Blockchain Application Design and Development, and the Case of Programmable M...Blockchain Application Design and Development, and the Case of Programmable M...
Blockchain Application Design and Development, and the Case of Programmable M...
 
Blockchain Essentials for Enterprise Architects
Blockchain Essentials for Enterprise ArchitectsBlockchain Essentials for Enterprise Architects
Blockchain Essentials for Enterprise Architects
 
Blockchain
BlockchainBlockchain
Blockchain
 
Deja vu Security - Blockchain Security Summit - Adam Cecchetti
Deja vu Security - Blockchain Security Summit - Adam CecchettiDeja vu Security - Blockchain Security Summit - Adam Cecchetti
Deja vu Security - Blockchain Security Summit - Adam Cecchetti
 
Blockchain
BlockchainBlockchain
Blockchain
 
Blockchain on Azure
Blockchain on AzureBlockchain on Azure
Blockchain on Azure
 
Security and privacy with blockchain
Security and privacy with blockchainSecurity and privacy with blockchain
Security and privacy with blockchain
 
Blockchain technology
Blockchain technologyBlockchain technology
Blockchain technology
 
Blockchain Essentials - Harnessing the Technology for Banking Industry
Blockchain Essentials - Harnessing the Technology for Banking IndustryBlockchain Essentials - Harnessing the Technology for Banking Industry
Blockchain Essentials - Harnessing the Technology for Banking Industry
 
Security in the blockchain
Security in the blockchainSecurity in the blockchain
Security in the blockchain
 
Blockchain and Smart Contracts (Series: Blockchain Basics)
Blockchain and Smart Contracts (Series: Blockchain Basics)Blockchain and Smart Contracts (Series: Blockchain Basics)
Blockchain and Smart Contracts (Series: Blockchain Basics)
 

Similar to Blockchain Technologies

Introduction to blockchains
Introduction to blockchainsIntroduction to blockchains
Introduction to blockchains
Adri Jovin
 
Blockchain Security and Demonstration
Blockchain Security and DemonstrationBlockchain Security and Demonstration
Blockchain Security and Demonstration
Yao Yao
 
Blockchain architected
Blockchain architectedBlockchain architected
Blockchain architected
IBM Sverige
 
IRJET- Secure Online Voting Systems using Block of Chunks
IRJET-  	  Secure Online Voting Systems using Block of ChunksIRJET-  	  Secure Online Voting Systems using Block of Chunks
IRJET- Secure Online Voting Systems using Block of Chunks
IRJET Journal
 
CST 20363 Session 7 - Blockchain
CST 20363 Session 7 - BlockchainCST 20363 Session 7 - Blockchain
CST 20363 Session 7 - Blockchain
oudesign
 
Scaling up Banking Operations: Harnessing the power of block chain Technology
Scaling up Banking Operations: Harnessing the power of block chain TechnologyScaling up Banking Operations: Harnessing the power of block chain Technology
Scaling up Banking Operations: Harnessing the power of block chain Technology
IRJET Journal
 
Blockchain - Primer for City CIOs v05 01 22.pdf
Blockchain - Primer for City CIOs v05 01 22.pdfBlockchain - Primer for City CIOs v05 01 22.pdf
Blockchain - Primer for City CIOs v05 01 22.pdf
ssusera441c2
 
Blockchain Technology Sharing Dang - Minh Tam
Blockchain Technology Sharing Dang - Minh TamBlockchain Technology Sharing Dang - Minh Tam
Blockchain Technology Sharing Dang - Minh Tam
Nguyễn Quang Huy
 
Blockchain in Banking, Business and Beyond
Blockchain in Banking, Business and BeyondBlockchain in Banking, Business and Beyond
Blockchain in Banking, Business and Beyond
Michael Novak
 
Nov 2 security for blockchain and analytics ulf mattsson 2020 nov 2b
Nov 2 security for blockchain and analytics   ulf mattsson 2020 nov 2bNov 2 security for blockchain and analytics   ulf mattsson 2020 nov 2b
Nov 2 security for blockchain and analytics ulf mattsson 2020 nov 2b
Ulf Mattsson
 
STREAKK - 3rd Generation Blockchain
STREAKK - 3rd Generation BlockchainSTREAKK - 3rd Generation Blockchain
STREAKK - 3rd Generation Blockchain
Earn.World
 
Blockchain technology
Blockchain technologyBlockchain technology
Blockchain technology
Dr. Mohamed Torky
 
Blockchain 101 by imran bashir
Blockchain 101  by imran bashirBlockchain 101  by imran bashir
Blockchain 101 by imran bashir
Imran Bashir
 
Blockchain
BlockchainBlockchain
On Engineering Economic Systems
On Engineering Economic SystemsOn Engineering Economic Systems
On Engineering Economic Systems
Michael Zargham
 
Blockchain Technology Overview
Blockchain Technology OverviewBlockchain Technology Overview
Blockchain Technology Overview
IRJET Journal
 
IoT and Blockchain Challenges and Risks
IoT and Blockchain Challenges and RisksIoT and Blockchain Challenges and Risks
IoT and Blockchain Challenges and Risks
Ahmed Banafa
 
Blockchain for Accounting & Assurance
Blockchain for Accounting & AssuranceBlockchain for Accounting & Assurance
Blockchain for Accounting & Assurance
Eryk Budi Pratama
 
Introduction to Blockchain and Smart Contracts
Introduction to Blockchain and Smart ContractsIntroduction to Blockchain and Smart Contracts
Introduction to Blockchain and Smart Contracts
Saad Zaher
 
Block chain fundamentals and hyperledger
Block chain fundamentals and hyperledgerBlock chain fundamentals and hyperledger
Block chain fundamentals and hyperledger
sendhilkumarks
 

Similar to Blockchain Technologies (20)

Introduction to blockchains
Introduction to blockchainsIntroduction to blockchains
Introduction to blockchains
 
Blockchain Security and Demonstration
Blockchain Security and DemonstrationBlockchain Security and Demonstration
Blockchain Security and Demonstration
 
Blockchain architected
Blockchain architectedBlockchain architected
Blockchain architected
 
IRJET- Secure Online Voting Systems using Block of Chunks
IRJET-  	  Secure Online Voting Systems using Block of ChunksIRJET-  	  Secure Online Voting Systems using Block of Chunks
IRJET- Secure Online Voting Systems using Block of Chunks
 
CST 20363 Session 7 - Blockchain
CST 20363 Session 7 - BlockchainCST 20363 Session 7 - Blockchain
CST 20363 Session 7 - Blockchain
 
Scaling up Banking Operations: Harnessing the power of block chain Technology
Scaling up Banking Operations: Harnessing the power of block chain TechnologyScaling up Banking Operations: Harnessing the power of block chain Technology
Scaling up Banking Operations: Harnessing the power of block chain Technology
 
Blockchain - Primer for City CIOs v05 01 22.pdf
Blockchain - Primer for City CIOs v05 01 22.pdfBlockchain - Primer for City CIOs v05 01 22.pdf
Blockchain - Primer for City CIOs v05 01 22.pdf
 
Blockchain Technology Sharing Dang - Minh Tam
Blockchain Technology Sharing Dang - Minh TamBlockchain Technology Sharing Dang - Minh Tam
Blockchain Technology Sharing Dang - Minh Tam
 
Blockchain in Banking, Business and Beyond
Blockchain in Banking, Business and BeyondBlockchain in Banking, Business and Beyond
Blockchain in Banking, Business and Beyond
 
Nov 2 security for blockchain and analytics ulf mattsson 2020 nov 2b
Nov 2 security for blockchain and analytics   ulf mattsson 2020 nov 2bNov 2 security for blockchain and analytics   ulf mattsson 2020 nov 2b
Nov 2 security for blockchain and analytics ulf mattsson 2020 nov 2b
 
STREAKK - 3rd Generation Blockchain
STREAKK - 3rd Generation BlockchainSTREAKK - 3rd Generation Blockchain
STREAKK - 3rd Generation Blockchain
 
Blockchain technology
Blockchain technologyBlockchain technology
Blockchain technology
 
Blockchain 101 by imran bashir
Blockchain 101  by imran bashirBlockchain 101  by imran bashir
Blockchain 101 by imran bashir
 
Blockchain
BlockchainBlockchain
Blockchain
 
On Engineering Economic Systems
On Engineering Economic SystemsOn Engineering Economic Systems
On Engineering Economic Systems
 
Blockchain Technology Overview
Blockchain Technology OverviewBlockchain Technology Overview
Blockchain Technology Overview
 
IoT and Blockchain Challenges and Risks
IoT and Blockchain Challenges and RisksIoT and Blockchain Challenges and Risks
IoT and Blockchain Challenges and Risks
 
Blockchain for Accounting & Assurance
Blockchain for Accounting & AssuranceBlockchain for Accounting & Assurance
Blockchain for Accounting & Assurance
 
Introduction to Blockchain and Smart Contracts
Introduction to Blockchain and Smart ContractsIntroduction to Blockchain and Smart Contracts
Introduction to Blockchain and Smart Contracts
 
Block chain fundamentals and hyperledger
Block chain fundamentals and hyperledgerBlock chain fundamentals and hyperledger
Block chain fundamentals and hyperledger
 

More from Adri Jovin

Adri Jovin J J - CV
Adri Jovin J J - CVAdri Jovin J J - CV
Adri Jovin J J - CV
Adri Jovin
 
Introduction to Relational Database Management Systems
Introduction to Relational Database Management SystemsIntroduction to Relational Database Management Systems
Introduction to Relational Database Management Systems
Adri Jovin
 
Introduction to ER Diagrams
Introduction to ER DiagramsIntroduction to ER Diagrams
Introduction to ER Diagrams
Adri Jovin
 
Introduction to Database Management Systems
Introduction to Database Management SystemsIntroduction to Database Management Systems
Introduction to Database Management Systems
Adri Jovin
 
Neural Networks
Neural NetworksNeural Networks
Neural Networks
Adri Jovin
 
Introduction to Genetic Algorithm
Introduction to Genetic AlgorithmIntroduction to Genetic Algorithm
Introduction to Genetic Algorithm
Adri Jovin
 
Introduction to Fuzzy logic
Introduction to Fuzzy logicIntroduction to Fuzzy logic
Introduction to Fuzzy logic
Adri Jovin
 
Introduction to Artificial Neural Networks
Introduction to Artificial Neural NetworksIntroduction to Artificial Neural Networks
Introduction to Artificial Neural Networks
Adri Jovin
 
Introductory Session on Soft Computing
Introductory Session on Soft ComputingIntroductory Session on Soft Computing
Introductory Session on Soft Computing
Adri Jovin
 
Creative Commons
Creative CommonsCreative Commons
Creative Commons
Adri Jovin
 
Image based security
Image based securityImage based security
Image based security
Adri Jovin
 
Introduction to Cybersecurity
Introduction to CybersecurityIntroduction to Cybersecurity
Introduction to Cybersecurity
Adri Jovin
 
Advanced Encryption System & Block Cipher Modes of Operations
Advanced Encryption System & Block Cipher Modes of OperationsAdvanced Encryption System & Block Cipher Modes of Operations
Advanced Encryption System & Block Cipher Modes of Operations
Adri Jovin
 
Heartbleed Bug: A case study
Heartbleed Bug: A case studyHeartbleed Bug: A case study
Heartbleed Bug: A case study
Adri Jovin
 
Zoom: Privacy and Security - A case study
Zoom: Privacy and Security - A case studyZoom: Privacy and Security - A case study
Zoom: Privacy and Security - A case study
Adri Jovin
 
Elliptic Curve Cryptography
Elliptic Curve CryptographyElliptic Curve Cryptography
Elliptic Curve Cryptography
Adri Jovin
 
El Gamal Cryptosystem
El Gamal CryptosystemEl Gamal Cryptosystem
El Gamal Cryptosystem
Adri Jovin
 
Data Encryption Standard
Data Encryption StandardData Encryption Standard
Data Encryption Standard
Adri Jovin
 
Classical cryptographic techniques, Feistel cipher structure
Classical cryptographic techniques, Feistel cipher structureClassical cryptographic techniques, Feistel cipher structure
Classical cryptographic techniques, Feistel cipher structure
Adri Jovin
 
Mathematical Foundations of Cryptography
Mathematical Foundations of CryptographyMathematical Foundations of Cryptography
Mathematical Foundations of Cryptography
Adri Jovin
 

More from Adri Jovin (20)

Adri Jovin J J - CV
Adri Jovin J J - CVAdri Jovin J J - CV
Adri Jovin J J - CV
 
Introduction to Relational Database Management Systems
Introduction to Relational Database Management SystemsIntroduction to Relational Database Management Systems
Introduction to Relational Database Management Systems
 
Introduction to ER Diagrams
Introduction to ER DiagramsIntroduction to ER Diagrams
Introduction to ER Diagrams
 
Introduction to Database Management Systems
Introduction to Database Management SystemsIntroduction to Database Management Systems
Introduction to Database Management Systems
 
Neural Networks
Neural NetworksNeural Networks
Neural Networks
 
Introduction to Genetic Algorithm
Introduction to Genetic AlgorithmIntroduction to Genetic Algorithm
Introduction to Genetic Algorithm
 
Introduction to Fuzzy logic
Introduction to Fuzzy logicIntroduction to Fuzzy logic
Introduction to Fuzzy logic
 
Introduction to Artificial Neural Networks
Introduction to Artificial Neural NetworksIntroduction to Artificial Neural Networks
Introduction to Artificial Neural Networks
 
Introductory Session on Soft Computing
Introductory Session on Soft ComputingIntroductory Session on Soft Computing
Introductory Session on Soft Computing
 
Creative Commons
Creative CommonsCreative Commons
Creative Commons
 
Image based security
Image based securityImage based security
Image based security
 
Introduction to Cybersecurity
Introduction to CybersecurityIntroduction to Cybersecurity
Introduction to Cybersecurity
 
Advanced Encryption System & Block Cipher Modes of Operations
Advanced Encryption System & Block Cipher Modes of OperationsAdvanced Encryption System & Block Cipher Modes of Operations
Advanced Encryption System & Block Cipher Modes of Operations
 
Heartbleed Bug: A case study
Heartbleed Bug: A case studyHeartbleed Bug: A case study
Heartbleed Bug: A case study
 
Zoom: Privacy and Security - A case study
Zoom: Privacy and Security - A case studyZoom: Privacy and Security - A case study
Zoom: Privacy and Security - A case study
 
Elliptic Curve Cryptography
Elliptic Curve CryptographyElliptic Curve Cryptography
Elliptic Curve Cryptography
 
El Gamal Cryptosystem
El Gamal CryptosystemEl Gamal Cryptosystem
El Gamal Cryptosystem
 
Data Encryption Standard
Data Encryption StandardData Encryption Standard
Data Encryption Standard
 
Classical cryptographic techniques, Feistel cipher structure
Classical cryptographic techniques, Feistel cipher structureClassical cryptographic techniques, Feistel cipher structure
Classical cryptographic techniques, Feistel cipher structure
 
Mathematical Foundations of Cryptography
Mathematical Foundations of CryptographyMathematical Foundations of Cryptography
Mathematical Foundations of Cryptography
 

Recently uploaded

ethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.pptethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.ppt
Jayaprasanna4
 
HYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generationHYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generation
Robbie Edward Sayers
 
DESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docxDESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docx
FluxPrime1
 
The role of big data in decision making.
The role of big data in decision making.The role of big data in decision making.
The role of big data in decision making.
ankuprajapati0525
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Sreedhar Chowdam
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
obonagu
 
ML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptxML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptx
Vijay Dialani, PhD
 
ASME IX(9) 2007 Full Version .pdf
ASME IX(9)  2007 Full Version       .pdfASME IX(9)  2007 Full Version       .pdf
ASME IX(9) 2007 Full Version .pdf
AhmedHussein950959
 
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
thanhdowork
 
Standard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - NeometrixStandard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - Neometrix
Neometrix_Engineering_Pvt_Ltd
 
Cosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdfCosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdf
Kamal Acharya
 
MCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdfMCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdf
Osamah Alsalih
 
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
zwunae
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
JoytuBarua2
 
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
ydteq
 
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation & Control
 
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang,  ICLR 2024, MLILAB, KAIST AI.pdfJ.Yang,  ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
MLILAB
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
Kamal Acharya
 
space technology lecture notes on satellite
space technology lecture notes on satellitespace technology lecture notes on satellite
space technology lecture notes on satellite
ongomchris
 
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Dr.Costas Sachpazis
 

Recently uploaded (20)

ethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.pptethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.ppt
 
HYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generationHYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generation
 
DESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docxDESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docx
 
The role of big data in decision making.
The role of big data in decision making.The role of big data in decision making.
The role of big data in decision making.
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
 
ML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptxML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptx
 
ASME IX(9) 2007 Full Version .pdf
ASME IX(9)  2007 Full Version       .pdfASME IX(9)  2007 Full Version       .pdf
ASME IX(9) 2007 Full Version .pdf
 
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
 
Standard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - NeometrixStandard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - Neometrix
 
Cosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdfCosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdf
 
MCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdfMCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdf
 
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
 
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
 
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
 
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang,  ICLR 2024, MLILAB, KAIST AI.pdfJ.Yang,  ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
 
space technology lecture notes on satellite
space technology lecture notes on satellitespace technology lecture notes on satellite
space technology lecture notes on satellite
 
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
 

Blockchain Technologies

  • 1. Blockchain Technologies Adri Jovin J J, M.Tech., Ph.D., B.G.L., Assistant Professor (Sl. Gr.), Department of Information Technology Sri Ramakrishna Institute of Technology
  • 2. This presentation is intended… • For beginners • To understand the characteristics and uses of blockchain • To discuss about the roles and users in a blockchain • To discuss about public and private blockchains • To get enlightened about consensus and the need for consensus in a blockchain 26-05-2021 Blockchain Technologies 2
  • 3. Agent-based Intelligent Systems • Code Mobility using Mobile Agents • Decentralization, Distribution of authority • Comprises of 3 components • Code • State • Data 26-05-2021 Blockchain Technologies 3
  • 4. Distributed Ledger Technologies (DLT) “The arc of the internet is now bending towards decentralization.” — Naval Ravikant • Decentralization – a major transformation • Giving the rights to the user • Crypto-economy • Computer security engineer, applied cryptographer, and distributed systems engineer 26-05-2021 Blockchain Technologies 4
  • 5. DLT (Contd…) Distributed Ledger – a type of data structure Includes blockchains and smart contracts 3 basic components • Data Model – maintains the current state of the ledger • Language of transactions – changes the state of the ledger • Protocol – used to build consensus among participants 26-05-2021 Blockchain Technologies 5
  • 6. What is blockchain? Peer-to-peer distributed ledger Forged by consensus Combined with a system Used to build transactional applications that establish • Trust • Accountability • Transparency 26-05-2021 Blockchain Technologies 6
  • 7. Application Domains • Goods Transfer (e.g. Supply Chain) • Digital Media Transfer (e.g. Sale of Art) • Remote Services Delivery (e.g. Travel and Tourism) • Decentralized Business Logic (e.g. Moving Computing to Data Sources) • Distributed Intelligence (e.g. Education Credentialing) • Distributed Resources (e.g. Power Generation and Distribution) • Crowd Funding (e.g. Startup Fund Raising) • Crowd Operations (e.g. Electronic Voting) • Identity Management (e.g. One ID for all life functions) • Government Public Records (e.g. Open Governing) 26-05-2021 Blockchain Technologies 7
  • 8. Definition of blockchain According to Hyperledger A blockchain is a peer-to-peer distributed ledger forged by consensus, combined with a system for "smart contracts" and other assistive technologies. Smart contracts are computer programs that execute predefined actions when certain conditions within the system are met. Consensus refers to a system of ensuring that parties agree to a certain state of the system as the true state. 26-05-2021 Blockchain Technologies 8
  • 9. Bitcoin vs Blockchain • Bitcoin made blockchain popular • Bitcoin - Major innovation of blockchain • Bitcoin is a use case for blockchain • Transacted over an open, public, anonymous blockchain network • Continuously working digital currency 26-05-2021 Blockchain Technologies 9
  • 10. Blockchain – a little deeper perspective Subset of DLT Block - set of transactions that are bundled together and added to the chain at the same time Block contains 4 pieces of metadata • Reference of the previous block • Proof of work, also known as nonce • Timestamp • Merkle tree root for the transactions included in this block 26-05-2021 Blockchain Technologies 10
  • 11. Blockchain is Immutable • If the data is tampered with anywhere in the chain, the links will break • This provides immutability and security. 26-05-2021 Blockchain Technologies 11
  • 12. Transactions • Record of an event, cryptographically secured with a digital signature, that is verified, ordered, and bundled together into blocks • Cryptography has a key role to play both in the security, as well as in the immutability of the transactions recorded on blockchains. 26-05-2021 Blockchain Technologies 12
  • 13. Databases vs Blockchains Blockchains Databases Write-only data structure Data can be easily modified and deleted Decentralized applications Centralized applications 26-05-2021 Blockchain Technologies 13
  • 14. Structure of Blockchain 26-05-2021 Blockchain Technologies 14 Transactions Blocks Blockchain Consensus and Verify
  • 15. Components of Blockchain Ledger: A distributed, immutable historical record Peer Network: Stores, updates, and maintains the ledger Membership Services: User authentication, authorization, and identity management Smart Contract: Program that runs on the blockchain Wallet: Stores users' credentials Events: Notifications of updates and actions on the blockchain Systems Management: Component creation, modification, and monitoring Systems Integration: Integration of blockchain with external systems. 26-05-2021 Blockchain Technologies 15
  • 16. Bitcoin- Basic block Unspent Transaction Output (UTXO) 26-05-2021 Blockchain Technologies 16 Reference Number Input Output UTXO1 UTXO1 UTXO2 UTXO2 UTXO3 UTXO3 UTXOn UTXOm
  • 17. UTXO • Unique identifier of the transaction that created the UTXO • Index of the UTXO in the transaction’s output list • Value • Optional: Conditions under which output can be spent 26-05-2021 Blockchain Technologies 17
  • 18. Transaction • Reference number of the current transaction • References to one or more input UTXOs • References to one or more output UTXOs newly generated by the current transaction • Total input and output amount 26-05-2021 Blockchain Technologies 18
  • 19. Sample Transaction 26-05-2021 Blockchain Technologies 19 Input UTXO Output UTXO Total amount spent
  • 20. Sample Transaction (Contd…) 26-05-2021 Blockchain Technologies 20
  • 21. Sample Transaction (Contd…) 26-05-2021 Blockchain Technologies 21
  • 23. Sample Block (Contd…) 26-05-2021 Blockchain Technologies 23
  • 24. Roles of Participants 26-05-2021 Blockchain Technologies 24 • Transfer of values by creating transactions • Verify transactions • Broadcast transactions • Compete to create a block • Reach consensus by validating block • Broadcasting new block • Confirm transactions USER MINER
  • 25. Creating a block 26-05-2021 Blockchain Technologies 25 Transaction added Rejected Transaction Valid Transaction Pool of Unconfirmed Transaction Select set of Transactions to create block Miners compete by solving puzzle Solved block broadcast Verify new block New block added to chain and confirmed
  • 26. Types of blockchains (Application based) Blockchains (based on application) Type 1: Only Cryptocurrency Type 2: Currency + Business Logic Type 3: Only Business Logic 26-05-2021 Blockchain Technologies 26
  • 27. Types of blockchains (Access based) Blockchains Public Private Permissioned 26-05-2021 Blockchain Technologies 27
  • 28. Bitcoin vs Ethereum Wallet/ Exchange Applications Bitcoin Blockchain Protocol/ Operations Peer to peer Network and Operating Systems Hardware Verticals: End User Applications Application Frameworks: Smart Contracts Ethereum Blockchain and Ethereum Virtual Machine Peer-to-peer Network and Operating Systems Hardware 26-05-2021 Blockchain Technologies 28
  • 29. Smart Contracts • Data • Functions or Methods with modifiers • Get/ Set functions Solidity is a programming language specifically designed to execute Smart Contracts 26-05-2021 Blockchain Technologies 29
  • 30. Security in Ethereum and Bitcoin • Both the blockchains use Elliptic-Curve Cryptography rather than using RSA • 256 bits ECC key pair ≅3072 bits RSA key pair • Hashing for integrity (SHA-3, SHA-256, Keccak) • Hashing is used to generate  Account Addresses  Digital Signature  Transaction Hash  Receipt Hash  Block Header Hash 26-05-2021 Blockchain Technologies 30
  • 31. Address of accounts 1. 256 – bit random number = private key 2. ECC algorithm is applied to private key to generate public key 3. Hashing applied to public key = account address (20 bytes) Transaction for transferring assets should be • Authorized • Non-repudiable • Unmodifiable 26-05-2021 Blockchain Technologies 31
  • 32. Complete transaction Verification • Timestamp • Nonce • Account Balances • Sufficiency of Fees 26-05-2021 Blockchain Technologies 32
  • 33. Integrity of a block • Block header contents are not tampered • Transactions are not tampered • State Transitions are computed, hashed and verified 26-05-2021 Blockchain Technologies 33
  • 34. Merkle Tree 60 41 10 31 10 4 6 21 19 26-05-2021 Blockchain Technologies 34
  • 35. Establishing Trust in a Blockchain • Secure chain using protocols • Validate blocks and transactions • Verifying the availability of resources • Executing and confirming transactions 26-05-2021 Blockchain Technologies 35
  • 36. Consensus Algorithm • Ensures that the data on the ledger is the same for all the nodes in the network • Prevents malicious actors from manipulating the data • Varies with different implementations 26-05-2021 Blockchain Technologies 36
  • 37. Types • Proof of Work • Proof of Stake • Proof of Elapsed Time • Proof of Authority 26-05-2021 Blockchain Technologies 37
  • 38. Proof of Work • Involves solving a computational challenging puzzle in order to create new blocks • Requires a huge amount of energy to be expended, given the computationally heavy algorithm • Has a high latency of transaction validation • Concentration of mining power is located in countries where electricity is cheap Proof-of-work (PoW) is the outcome of a successful mining process and, although the proof is hard to create, [it] is easy to verify. - 2016 Kudelski Security report 26-05-2021 Blockchain Technologies 38
  • 39. PoW in Bitcoin and Ethereum 26-05-2021 Blockchain Technologies 39 Block Header Element (BHash) Nonce H=Hash(Bhash, Nonce) H<F(Difficulty) Change Variable Nonce Solved winner adds block to the blockchain Broadcasts Block
  • 40. Proof of Stake (PoS) • Generalization of the Proof of Work • Nodes are known as the 'validators‘ that validate the transactions to earn a transaction fee • Nodes are randomly selected to validate blocks • PoS algorithm saves expensive computational resources that are spent in mining under a PoW consensus 26-05-2021 Blockchain Technologies 40
  • 41. Proof of Elapsed Time (PoET) • Developed by Intel • Hybrid of a random lottery and first-come-first-serve basis • Each validator is given a random wait time • The validator with the shortest wait time for a particular transaction block is elected the leader. • This "leader" gets to create the next block on the chain 26-05-2021 Blockchain Technologies 41
  • 42. Proof of Authority • Used for permissioned ledgers • Uses a set of 'authorities', which are designated nodes that are allowed to create new blocks and secure the ledger • Require sign-off by a majority of authorities in order for a block to be created 26-05-2021 Blockchain Technologies 42
  • 43. Key takeaways Decentralization Distributed Immutable Ledger UTXO Smart Contract EVM Merkle Tree Proof of Work 26-05-2021 Blockchain Technologies 43

Editor's Notes

  1. A Merkle root is the hash of all the hashes of all the transactions that are part of a block in a blockchain network. According to Andreas M. Antonopoulos, in the Bitcoin protocol, "Merkle trees are used to summarize all the transactions in a block, producing an overall digital fingerprint of the entire set of transactions, providing a very efficient process to verify whether a transaction is included in a block."