Introduction to cryptography primitives and fundamental data structures. Discuss the process of achieving distributed consensus, proof-of-work and potential attacks on network.
This talk was presented by Miguel Duarte (http://miguelduarte.pt) at Codebits (VII) (http://codebits.eu).
A video of the talk is available here: http://youtu.be/PgETyozr2cM
There original abstract was as follows:
You've probably heard of Bitcoin, right? Bitcoin is original cryptocurrency which exploded in value in the last few months and paved the way for alt-coins such as Litecoin, Quark or Dogecoin. Currently, 1 bitcoin is worth nearly $1000, which left some of the original investors and miners, with thousands upon thousands of bitcoins, quite rich. Recently, even the Dogecoin community helped fund Jamaica's bobsled team to help go to the Sochi Winter Olympics by donating 30 million dogecoins, or roughly $30,000! What the hell is that all about? This talk aims to explain what cryptocurrencies are, how they work, and how they create value.
Here are some of the topics I intend on covering:
-the advantages of cryptocurrencies;
-the basics of the blockchain;
-how new blocks are mined using proof-of-work algorithms;
-how to mine using CPU, GPU or even ASIC miners;
-differences between Bitcoin's algorithm and scrypt-based alt-coins;
-security considerations;
-an overview of how cryptocurrencies are currently being used in society;
-how cryptocurrencies can change the world's economic landscape.
This talk was presented by Miguel Duarte (http://miguelduarte.pt) at Codebits (VII) (http://codebits.eu).
A video of the talk is available here: http://youtu.be/PgETyozr2cM
There original abstract was as follows:
You've probably heard of Bitcoin, right? Bitcoin is original cryptocurrency which exploded in value in the last few months and paved the way for alt-coins such as Litecoin, Quark or Dogecoin. Currently, 1 bitcoin is worth nearly $1000, which left some of the original investors and miners, with thousands upon thousands of bitcoins, quite rich. Recently, even the Dogecoin community helped fund Jamaica's bobsled team to help go to the Sochi Winter Olympics by donating 30 million dogecoins, or roughly $30,000! What the hell is that all about? This talk aims to explain what cryptocurrencies are, how they work, and how they create value.
Here are some of the topics I intend on covering:
-the advantages of cryptocurrencies;
-the basics of the blockchain;
-how new blocks are mined using proof-of-work algorithms;
-how to mine using CPU, GPU or even ASIC miners;
-differences between Bitcoin's algorithm and scrypt-based alt-coins;
-security considerations;
-an overview of how cryptocurrencies are currently being used in society;
-how cryptocurrencies can change the world's economic landscape.
The Bitcoin fever is spreading much faster than it was anticipated. It has grabbed the attention of speculators, investors, bankers and regulators around the world.
This reminds us of a popular quote ‘The more things are forbidden, the more popular they become’- Mark Twain.
In this lesson, we make an attempt to demystify the term ‘Bitcoin’.
Investment Strategies in Bitcoin. Slide deck on Investing and Trading Bitcoin. Introduction on Trading Bitcoin, recommendations on tools and sites as well as descriptions on fundamental and technical analysis.
Crypto Think Tank Presentation on Alternative Cryptocurrency Feb 16, 2014 at ...cryptothinktank
This presentation discusses the landscape of alternative cryptocurrency. It was given by Eric and Xin from Crypto Think Tank at the Vancouver Coinfest 2014, a multi-day weekend festival that gathered cryptocurrency enthusiast to share and learn more about this growing community.
Please visit: www.cryptothinktank.com to learn more about us.
Cryptocurrency is a digital currency in which cryptography techniques are used to regulate the generation of units of currency and verify the transfer of funds.
- Cryptocurrency operates independent of any central authority or individual.
- The supply of money is regulated by software and the agreement of users of the system.
- Trust based on peer to peer consensus.
- Transactions are irreversible.
Overview-
1. What is cryptocurrency?
2. The Difference
The tabular comparison between Fiat or conventional currency and Cryptocurrency on parameters like durability, portability, type, security etc.
3. Why use cryptocurrency?
Fast and cheap.
Easy to use.
Free to transfer and hold.
Decentralized control- users are the only owner of cryptocurrency.
Central government can’t take it away and there are no chargebacks.
Privacy and Security – Anonymous payments
Due to no intermediary (such as Bank or Credit Card Company) users have freedom to transact.
Transparency is maintained through public ledger system.
Reduced Fraud – eliminates cases of credit card frauds.
4. Evolution of cryptocurrency
Evolution of cryptocurrency from 2009 to 2015. Major Cryptocurrencies include are Bitcoin, Namecoin, Litecoin, Peercoin, Monero and Capricoin.
5. Categories of cryptocurrency
Cryptocurrencies are divide into various categories based on what type of algorithm used, type of community, investor involved, according to usage and on speed of transaction.
6. Major Cryptocurrencies
List of major Cryptocurrencies Bitcoin, Litecoin, Ripple, Peercoin, Mastercoin, NXT, Namecoin, Quarkcoin, Worldcoin and Megacoin
7. Bitcoin
First popular Cryptocurrency Bitcoin founded by Satoshi comprehensive details.
8. Technology
Bitcoin utilizes the following technologies which are Distributed ledger technology, Mining, Mining hardware, Mining Software, Blockchain and Bitcoin wallets.
9. Transaction Process
A typical transaction process of a Cryptocurrency namely Bitcoin involving concepts like wallet, block, transaction block-chain and proof-of-work algorithm. It gives step by step procedure on how the transaction is carried out in the case of Bitcoin.
10. Benefits
Fast, Safe and cheap
Ease of use and highly portable
Untraceable (pseudo-anonymous transactions)
Transparent and neutral
Decentralized nature
Active involvement of users
Fewer risks for merchants
Freedom to transact
Low inflation and collapse risk
11. Risks
- Problems in implementation- Hardware restrictions (Computational inefficiency), Instability, Deflation, Lack of Replicability and Growing centrality.
- Risk and failure in policy- Money Laundering, Purchase of illegal goods
- Supporting criminal activity- BTC Theft, Malware, Scams
- Risk for consumers- Fewer Protections, Cost, Lack of awareness and understanding and Still Developing.
This is an academic presentation by Sameer Satyam.
Quick Understanding of Bitcoin/Cryptocurrency.Satish Mudaliar
This slide briefs you about the BItcoin/Cryptocurrency knowledge and facts. This slide is made for diffrent purpose but sharing here to help someone getting a quick knowledge of Bitcoins.
Blockchain overview, use cases, implementations and challengesSébastien Tandel
Most know about Bitcoin, the well-known crypto-currency. Less know the details about the underlying and enabling technology, Blockchain.
Hopefully, this presentation provides enough insights to understand blockchain concepts and why it's perceived to potentially disrupt many market segments, from retail to governments, from finance to health care. At last, I hope to brush fairly the many challenges of this rather new technology.
Metadata in the Blockchain: The OP_RETURN ExplosionCoin Sciences Ltd
With the addition of OP_RETURN outputs in version 0.9, it became possible to attach arbitrary pieces of information to bitcoin transactions. This turns bitcoin into a low-level communications protocol, just like TCP/IP, on which many new applications can be built.
Despite its powerful features, bitcoin is also limited, costly and inefficient compared to TCP/IP. After discussing which sorts of applications make this trade-off worthwhile, we talk about CoinSpark, a new open source protocol for enhancing bitcoin transactions, which makes extensive use of OP_RETURNs.
I am sending you 1π! Pi is a new digital currency developed by Stanford PhDs, with over 9 million members worldwide. To claim your Pi, follow this link https://minepi.com/krishvikram and use my username (krishvikram) as your invitation code.
Step 1. Install the Pi app with above link
Step 2 verify the profile
Step 3 tap on earnings and share your link and increase your earnings
Step 4 verification type the referral code which is mandatory.
Referral code is : krishvikram
Virtual or digital currencies, with Bitcoin chief amongst them, have been gaining momentum and investment over the last couple of years. Offering an almost costless means of making payments around the globe, virtual currencies have the potential to bring significant disruption to the banking industry. This potential is not lost on either Bitcoin startups or banks themselves. But how does Bitcoin actually work? A peer-to-peer network maintains the “blockchain”, an innovative cryptographic protocol which securely mediates payments between parties without mutual trust. This session will step through the structure of the blockchain, showing how it solves the “double spend” problem and allows decentralised processing of financial transactions. Whether Bitcoin will become the currency of the internet or it’s a bubble that is doomed to burst sooner or later, the blockchain itself will change the face of transactional banking and perhaps other industries along the way.
Presentation to the Sydney Financial Mathematics Workshop (11 March 2015)
http://www.qgroup.org.au/content/bitcoin-banking-and-blockchain
Talk for CodeMash 2018. Page to end for resources. Some more links (click to expand):
Bitcoin's Insane Energy Consumption Explained: https://arstechnica.com/tech-policy/2017/12/bitcoins-insane-energy-consumption-explained/
The Ethereum-blockchain size will not exceed 1TB anytime soon.
https://dev.to/5chdn/the-ethereum-blockchain-size-will-not-exceed-1tb-anytime-soon-58a
For use rights, please see license agreement below.
14 Jan17- Nullmeets -Blockchain concept decoded by Ninad SarangNinad Sarang
Introduction to Blockchain and Bitcoin technologies
Things we will cover,
* What is TRANSACTION ?
* BlockChain !!!……Never heard what is that??
* The BTC Aka BitCoins
* Who discovered?
* How it works?
* Advantages & Disadvantages
* Applications
The Bitcoin fever is spreading much faster than it was anticipated. It has grabbed the attention of speculators, investors, bankers and regulators around the world.
This reminds us of a popular quote ‘The more things are forbidden, the more popular they become’- Mark Twain.
In this lesson, we make an attempt to demystify the term ‘Bitcoin’.
Investment Strategies in Bitcoin. Slide deck on Investing and Trading Bitcoin. Introduction on Trading Bitcoin, recommendations on tools and sites as well as descriptions on fundamental and technical analysis.
Crypto Think Tank Presentation on Alternative Cryptocurrency Feb 16, 2014 at ...cryptothinktank
This presentation discusses the landscape of alternative cryptocurrency. It was given by Eric and Xin from Crypto Think Tank at the Vancouver Coinfest 2014, a multi-day weekend festival that gathered cryptocurrency enthusiast to share and learn more about this growing community.
Please visit: www.cryptothinktank.com to learn more about us.
Cryptocurrency is a digital currency in which cryptography techniques are used to regulate the generation of units of currency and verify the transfer of funds.
- Cryptocurrency operates independent of any central authority or individual.
- The supply of money is regulated by software and the agreement of users of the system.
- Trust based on peer to peer consensus.
- Transactions are irreversible.
Overview-
1. What is cryptocurrency?
2. The Difference
The tabular comparison between Fiat or conventional currency and Cryptocurrency on parameters like durability, portability, type, security etc.
3. Why use cryptocurrency?
Fast and cheap.
Easy to use.
Free to transfer and hold.
Decentralized control- users are the only owner of cryptocurrency.
Central government can’t take it away and there are no chargebacks.
Privacy and Security – Anonymous payments
Due to no intermediary (such as Bank or Credit Card Company) users have freedom to transact.
Transparency is maintained through public ledger system.
Reduced Fraud – eliminates cases of credit card frauds.
4. Evolution of cryptocurrency
Evolution of cryptocurrency from 2009 to 2015. Major Cryptocurrencies include are Bitcoin, Namecoin, Litecoin, Peercoin, Monero and Capricoin.
5. Categories of cryptocurrency
Cryptocurrencies are divide into various categories based on what type of algorithm used, type of community, investor involved, according to usage and on speed of transaction.
6. Major Cryptocurrencies
List of major Cryptocurrencies Bitcoin, Litecoin, Ripple, Peercoin, Mastercoin, NXT, Namecoin, Quarkcoin, Worldcoin and Megacoin
7. Bitcoin
First popular Cryptocurrency Bitcoin founded by Satoshi comprehensive details.
8. Technology
Bitcoin utilizes the following technologies which are Distributed ledger technology, Mining, Mining hardware, Mining Software, Blockchain and Bitcoin wallets.
9. Transaction Process
A typical transaction process of a Cryptocurrency namely Bitcoin involving concepts like wallet, block, transaction block-chain and proof-of-work algorithm. It gives step by step procedure on how the transaction is carried out in the case of Bitcoin.
10. Benefits
Fast, Safe and cheap
Ease of use and highly portable
Untraceable (pseudo-anonymous transactions)
Transparent and neutral
Decentralized nature
Active involvement of users
Fewer risks for merchants
Freedom to transact
Low inflation and collapse risk
11. Risks
- Problems in implementation- Hardware restrictions (Computational inefficiency), Instability, Deflation, Lack of Replicability and Growing centrality.
- Risk and failure in policy- Money Laundering, Purchase of illegal goods
- Supporting criminal activity- BTC Theft, Malware, Scams
- Risk for consumers- Fewer Protections, Cost, Lack of awareness and understanding and Still Developing.
This is an academic presentation by Sameer Satyam.
Quick Understanding of Bitcoin/Cryptocurrency.Satish Mudaliar
This slide briefs you about the BItcoin/Cryptocurrency knowledge and facts. This slide is made for diffrent purpose but sharing here to help someone getting a quick knowledge of Bitcoins.
Blockchain overview, use cases, implementations and challengesSébastien Tandel
Most know about Bitcoin, the well-known crypto-currency. Less know the details about the underlying and enabling technology, Blockchain.
Hopefully, this presentation provides enough insights to understand blockchain concepts and why it's perceived to potentially disrupt many market segments, from retail to governments, from finance to health care. At last, I hope to brush fairly the many challenges of this rather new technology.
Metadata in the Blockchain: The OP_RETURN ExplosionCoin Sciences Ltd
With the addition of OP_RETURN outputs in version 0.9, it became possible to attach arbitrary pieces of information to bitcoin transactions. This turns bitcoin into a low-level communications protocol, just like TCP/IP, on which many new applications can be built.
Despite its powerful features, bitcoin is also limited, costly and inefficient compared to TCP/IP. After discussing which sorts of applications make this trade-off worthwhile, we talk about CoinSpark, a new open source protocol for enhancing bitcoin transactions, which makes extensive use of OP_RETURNs.
I am sending you 1π! Pi is a new digital currency developed by Stanford PhDs, with over 9 million members worldwide. To claim your Pi, follow this link https://minepi.com/krishvikram and use my username (krishvikram) as your invitation code.
Step 1. Install the Pi app with above link
Step 2 verify the profile
Step 3 tap on earnings and share your link and increase your earnings
Step 4 verification type the referral code which is mandatory.
Referral code is : krishvikram
Virtual or digital currencies, with Bitcoin chief amongst them, have been gaining momentum and investment over the last couple of years. Offering an almost costless means of making payments around the globe, virtual currencies have the potential to bring significant disruption to the banking industry. This potential is not lost on either Bitcoin startups or banks themselves. But how does Bitcoin actually work? A peer-to-peer network maintains the “blockchain”, an innovative cryptographic protocol which securely mediates payments between parties without mutual trust. This session will step through the structure of the blockchain, showing how it solves the “double spend” problem and allows decentralised processing of financial transactions. Whether Bitcoin will become the currency of the internet or it’s a bubble that is doomed to burst sooner or later, the blockchain itself will change the face of transactional banking and perhaps other industries along the way.
Presentation to the Sydney Financial Mathematics Workshop (11 March 2015)
http://www.qgroup.org.au/content/bitcoin-banking-and-blockchain
Talk for CodeMash 2018. Page to end for resources. Some more links (click to expand):
Bitcoin's Insane Energy Consumption Explained: https://arstechnica.com/tech-policy/2017/12/bitcoins-insane-energy-consumption-explained/
The Ethereum-blockchain size will not exceed 1TB anytime soon.
https://dev.to/5chdn/the-ethereum-blockchain-size-will-not-exceed-1tb-anytime-soon-58a
For use rights, please see license agreement below.
14 Jan17- Nullmeets -Blockchain concept decoded by Ninad SarangNinad Sarang
Introduction to Blockchain and Bitcoin technologies
Things we will cover,
* What is TRANSACTION ?
* BlockChain !!!……Never heard what is that??
* The BTC Aka BitCoins
* Who discovered?
* How it works?
* Advantages & Disadvantages
* Applications
Cryptocurrencies for Everyone (Dmytro Pershyn Technology Stream)IT Arena
Lviv IT Arena is a conference specially designed for programmers, designers, developers, top managers, inverstors, entrepreneur and startuppers. Annually it takes place on 2-4 of October in Lviv at the Arena Lviv stadium. In 2015 conference gathered more than 1400 participants and over 100 speakers from companies like Facebook. FitBit, Mail.ru, HP, Epson and IBM. More details about conference at itarene.lviv.ua.
Blockchain Ecosystem and Cryptocurrency RegulationsAmir Rafati
A blockchain is a general digital ledger of transactions that are executed on the network, e.g. using Bitcoin to buy a cup of coffee is a transaction.
All users of the network, ‘Nodes’, have a copy of the transaction records and can access them freely, a role previously played by centralized institutions. Therefore, the blockchain network is ‘decentralized’.
Blockchain technology is currently taking over the world with its amazing features. This presentation covers all you need to know about the basics of blockchain technology with beautiful animations
Similar to Introduction to blockchain and cryptocurrency technologies (20)
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
In this presentation, we examine the challenges and limitations of relying too heavily on PHP frameworks in web development. We discuss the history of PHP and its frameworks to understand how this dependence has evolved. The focus will be on providing concrete tips and strategies to reduce reliance on these frameworks, based on real-world examples and practical considerations. The goal is to equip developers with the skills and knowledge to create more flexible and future-proof web applications. We'll explore the importance of maintaining autonomy in a rapidly changing tech landscape and how to make informed decisions in PHP development.
This talk is aimed at encouraging a more independent approach to using PHP frameworks, moving towards a more flexible and future-proof approach to PHP development.
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
8. Cryptographic primitives: cryptographic hash function
A hash function H is collision resistant
if it is infeasible to find two values, x and y,
such that x ≠ y, yet H(x) = H(y).
9. Cryptographic primitives: cryptographic hash function
Example of not collision resistant hash function:
H(x) = x mod 2256
It’s easy to find that:
H(x) = H(x + 2256)
10. Cryptographic primitives: cryptographic hash function
A hash function H is hiding if:
when a secret value r is chosen from
a probability distribution that has high min-entropy,
then given H(r || x) it is infeasible to find x.
13. Cryptographic primitives: cryptographic hash function
A hash function H is said to be puzzle-friendly if for every possible
n-bit output y, if k is chosen from a distribution with high min-entropy,
then it is infeasible to find x such that H(k || x) = y in time significantly
less then 2n.
14. Cryptographic primitives: cryptographic hash function
Application: search puzzle
Given:
• a hash function H
• a value v, chosen from high min-entropy distribution
• a target set Y
Find value x — solution to this puzzle — such that
H(v || x) ∈ Y
15. Cryptographic primitives: digital signature
Analogy to handwritten signature
• only you can make your signature
• anyone who sees it can verify it’s valid
• it’s tied to a particular document
17. Cryptographic primitives: digital signature
We require that digital signature scheme holds following two properties:
• valid signature must verify
• signatures are unforgeable
18. Cryptographic primitives: digital signature
Unforgeability of digital signature
• it’s computationally infeasible to forge signature
• an adversary, who knows your public key and gets to see your
signatures on some other messages can’t forge your signatures on
some message for which he has not seen your signature
19. Cryptographic primitives: digital signature
Practical concerns:
• many signature algorithms are randomized and therefore we need
good source randomness
• there's a limit on the message size that you’re able to sign, in
practice you can sign the hash of the message
20. Cryptographic primitives: digital signature
Public key as an identity
• if we see message that verifies correctly under public key pubKey, then
we can think of this as pubKey is saying the message
• in order for someone to speak for the identity pubKey, they must know
the corresponding secret key
• these identities are called addresses — commonly represented with the
hash of pubKey
• you can have as many identities as you want
24. Building blocks: hash pointer
A hash pointer is
• a pointer to where data is stored
• together with cryptographic hash of the value of that data at some
fixed point in time
25. Building blocks: hash pointer
We can use hash pointers to build almost all data structures that we
could build using regular pointers.
The exceptions are data structures containing cycles.
35. Building blocks: Merkle tree
• Sorted Merkle tree — data blocks are ordered
• Proof of non-membership — it is possible to verify non-membership
in a logarithmic time and space
41. Making cryptocurrency: central authority
• Let Alice be a central authority that accepts transactions and
appends them to the block chain.
• Alice will create new block with transaction when decide that
transaction is valid.
45. Making cryptocurrency: decentralized network
• When central authority is compromised or is not operant, the whole
system is affected. It’s single point of failure.
• Central authority may not treat all users equally. Some transactions
may be significantly delayed or rejected at all.
47. Making cryptocurrency: decentralized network
In such network we have to remember that:
• network is imperfect,
• some nodes may act maliciously.
48. Making cryptocurrency: reaching consensus
Nodes must agree on:
• exactly which transactions were broadcasted,
• the order in which these transactions happened.
49. Making cryptocurrency: reaching consensus
The result is a single, global ledger consisting of a sequence of blocks,
each block containing a list of transactions, that the’ve reached
consensus on.
50. Making cryptocurrency: reaching consensus
• New transactions are broadcasted to all nodes.
• Each node verifies and collects new transactions into a block.
• In each round a random node gets to broadcast its block.
• Other nodes accept the block only if all transactions in it are valid.
• Nodes express their acceptance of the block by including its hash in
the next block they create.
62. Making cryptocurrency: reaching consensus
The key idea behind proof of work is that we approximate the
selection of random node by instead selecting nodes in proportion to a
resource that we hope that nobody can monopolize.
63. Making cryptocurrency: reaching consensus
H ( nonce | block data ) < target
• Difficult to compute.
• Parametrizable cost.
• Trivial to verify.
67. Making cryptocurrency: economy
• We can assume that we have viable cryptocurrency when we trust in
security of blockchain protocol.
• It is secure when the nodes ecosystem is healthy — majority of the
hash power is in hand of following the protocol nodes.
• The nodes are going to act honestly only when the value of the
reward for solving puzzle is high.
• And the value is high and stable only when there is a trust in the
security of the blockchain.
79. Under the hood
• The script says: that coins can be redeemed by person owns a public
identity and proves it.
• Script is a stack based language.
• Escrow transaction using multisig.
80. Under the hood
• Smart contracts.
• Solidity — Turing complete language working on EVM (Ethereum).