SlideShare a Scribd company logo
1 of 31
Download to read offline
Introduction to Blockchain Technologies
Massimiliano Masi
massimiliano.masi@tiani-spirit.com
http://www.tiani-spirit.com
February 21, 2018
Outline
1 A bit of cryptography
2 History of Blockchain
3 The blockchain of Bitcoin
4 Ethereum blockchain
5 ERC-20
Massimiliano Masi: Intro to blockchain ©None February 21, 2018 2/31
Confidentiality (or Secrecy)
Confidentiality (or Secrecy)
Guarantees that the useful information contained in messages is
accessible only to authorized parties. In other words, confidentiality
guarantees that (parts of) information is not disclosed to
unauthorized peers. It can be achieved by cryptography and access
control
Massimiliano Masi: Intro to blockchain ©None February 21, 2018 3/31
Integrity
Integrity
Guarantees that a message is transmitted and it arrives to the
latest recipient without any modifications made by unauthorized
third parties, or, at least, such modifications, if made, are known
to the recipient. It can be achieved by digital signatures and hash
functions
Massimiliano Masi: Intro to blockchain ©None February 21, 2018 4/31
Authentication
Authentication
Ensures that the origin of a message is correctly identified, and
that has not been altered
Data Origin Authentication: guarantees that the message is
sent by the declared sender (e.g., S/MIME, PGP)
Peer Entity Authentication: in a multiparty connection,
guarantees that the identity of a party is the one declared
(e.g., the claiming identity has not been impersonated)
It can be achieved by channel authentication, IA&A, digital
signature, tokens, etc...
Massimiliano Masi: Intro to blockchain ©None February 21, 2018 5/31
Non-Repudiation
Non-Repudiation
Guarantees that the sender of the message will not have the
possibility to deny to have sent the message itself. In other words,
the operation “send message” can be proven in front of other
parties. It can be achieved by means of digital signatures,
timestamps
Massimiliano Masi: Intro to blockchain ©None February 21, 2018 6/31
Encryption
Two types of encryption:
Symmetric: Alice and Bob shares a secret, K
DK [EK [M]] = M
∀M,M′
, if M ≠ M′
, EK [M] ≠ EK [M′
]
Asymmetric: Alice and Bob have their own respective secrets
K−
A , and a public part K+
A
DK−
A
[EK+
A
[M]] = M
Massimiliano Masi: Intro to blockchain ©None February 21, 2018 7/31
Elliptic Curve Factorization
It is a type of public key cryptography
secp256k1 is used by bitcoin
y2
= (x3
+ 7) over (FP) where FP is a
finite field of prime order p
Example: K = k ∗ G, where k is a
random number and G is a point in
the curve. k is the private, and K is
the public. K = (x,y), thus a bitcoin
address is:
0x00 +
Base58(RIPEMD160(SHA256(K)))
Massimiliano Masi: Intro to blockchain ©None February 21, 2018 8/31
Hash Function
One Way Hash Function
A function H that maps an arbitrary length message M to a fixed
length message digest MD is a one-way hash function if
1 It is a one-way function
2 Given M and H(M), it is hard to find a message M′
≠ M such
that H(M′
) = H(M)
Example of such functions are MD5, or the SHA family (including
Keccak).
Massimiliano Masi: Intro to blockchain ©None February 21, 2018 9/31
Digital Signature
The digital signature permits to the receiver
To verify the authentication of the message
To verify the integrity of the message
To verify non-repudiation
A → B M EK−
A
[SHA(M)]
B verifies the signature as:
hash = SHA(M)
hash′
= DK+
A
[EK−
A
[SHA(M)]]
if (hash == hash′
) then OK else CALL MALLORY!
Massimiliano Masi: Intro to blockchain ©None February 21, 2018 10/31
Trie
A retrieval is a data structure (a tree) used in indexing strings1
.
Key Concept
A trie is a tree structure where every path from the root to a leaf
defines a string. Two or more strings that have the same prefix
share the path from the root up to the end of the common prefix.
1
A. Bhattacharya, Fundamentals of Database Indexing and Searching, CRC
Press, 2015
Massimiliano Masi: Intro to blockchain ©None February 21, 2018 11/31
Merkle tree
A Merkle tree is a data structure (a tree) in which each leaf node
is a hash of a block of data, end each non-leaf node is a hash of its
children2
.
2
https://medium.com/@evankozliner/merkle-tree-introduction-4c44250e2da7 and
https://www.codeproject.com/Articles/1176140/Understanding-Merkle-Trees-Why-use-them-who-uses-t
Massimiliano Masi: Intro to blockchain ©None February 21, 2018 12/31
Where Satoshi finds his roots
The first concept of blockchain was introduced by Haber et
al.3
, the digital safety deposit box
Schneier et al4
introduced the concept of Secure Logs
(avoiding attackers to gain knowledge by accessing logs)
Vishnamurty et al5
where a token was used to keep p2p file
trading in check, ensuring consumers be able to make micro
payments to suppliers for their services.
Szabo 6
, is also a reference on the topic
⇒ Bitcoin’s technology completed the puzzle!
3
S. Haber, and W.S. Stornetta, How to timestamp a digital document
4
B. Schneier, J. Kelsey, Cryptographic support for Secure Logs on Untrusted Machines, in Proceedings of the
7th USENIX
5
V. Vishnamurty et al., Karma: A secure economic framework for peer-to-peer resource sharing, 2003
6
N. Szabo, Formalizing and securing relationships on public networks, 1997
Massimiliano Masi: Intro to blockchain ©None February 21, 2018 13/31
The Satoshi paper
In 2008, Satoshi Nakamoto7
made public the Bitcoin Paper.
It aimed at defining a decentralized model avoiding a central
timestamping authority, and a distributed ledger where
transactions from/to addresses are stored
He proposed a solution to achieve consensus in hostile
environments by adopting the Proof-of-Work, initially from
Dwork et al.8
and from hashcash.org
7
Conspiration theory: SAmsung, TOSHIba, NAKAmichi, MOTOrola
8
C. Dwork, and M. Naor, Pricing via Processing or Combatting Junk Mail, Crypto 92
Massimiliano Masi: Intro to blockchain ©None February 21, 2018 14/31
What is a blockchain
The blockchain data structure is an ordered, back-linked list of
blocks of transactions9
9
A. Antonoupoulus, Mastering Bitcoin, O’Reilly
Massimiliano Masi: Intro to blockchain ©None February 21, 2018 15/31
The problem of consensus
In the blockchain, since we transfer value, everyone is encouraged
to cheat!
Several consensus model
Consensus in trusted environments
Consensus in hostile environments (byzantine)
Clearly, if the consensus style changes, also the deployment of the
blockchain changes.
Permissioned (Hyperledger, Sawtooth, Coco framework)
Public (Bitcoin, Ethereum, EOS, Rai)
Massimiliano Masi: Intro to blockchain ©None February 21, 2018 16/31
The problem of consensus
Achieving consensus is complex.
The CAP theorem
It is impossible for a distributed system to simultaneously provide
Consistency, Availability, and Partition Tolerance. A distributed
system can satisfy any two of these, but not all three
The Proof-of-Work achieves consensus in hostile environments by
solving the following equation
Fd (c,x) → SHA256(SHA256(c x)) <
2224
d
where d is increasing constantly. Miners pool use specialized
hardware (ASICs) to perform the PoW
Massimiliano Masi: Intro to blockchain ©None February 21, 2018 17/31
The block
Block definition
A block is a data structure used to communicate incremental
changes to the local state of a node. A block consists of a list of
transactions, a reference to a previous block and a nonce. A block
lists some transactions the block creator (the ”miner”) has
accepted to its memory-pool since the previous block. A node finds
and broadcasts a block when it finds a valid nonce for its PoW
function. When a miner ”closes” the block it has a reward (12,5
bitcoins now)
Blockchain
The longest path from the genesis block, i.e., the root of the tree,
to a leaf is called the blockchain. The blockchain acts as a
consistent transaction history on which all nodes eventually agreea
a
R. Wattenhofer, The Science of the Blockchain
Massimiliano Masi: Intro to blockchain ©None February 21, 2018 18/31
Wallets
Transactions are made on addresses. Each address is owned by a
software, named wallet. A wallet
Maintains a state of the addresses’ balances (or pointers to
balances)
Manages and protect keys
Generate addresses on demand (to avoid kidnapping)
Hardware, Paper, Software, Online, Multisig
Listens for events on the blockchain, avoiding to download the
WHOLE blockchain (around 350 GB)
Massimiliano Masi: Intro to blockchain ©None February 21, 2018 19/31
Wallets
If a wallet is lost, or stolen, funds are lost forever.
Should not use a online wallet (like Coinbase). They own your
keys
See the Mt. Gox, and Bitgrail (Francesco)
Massimiliano Masi: Intro to blockchain ©None February 21, 2018 20/31
Wallets
What you can do with Bitcoin?
a limited amount of coins available (21 millions)
very inefficient (the blockchain of bitcoin processes 7
transactions per second)
Exchange
Exchange to FIAT or other currencies in Crypto Exchanges
(Coinbase, Bitfinex)
Pay
You can pay services using the Simple Payment Verification, or the
Lightning / Raiden network. Note that a transaction is verified if
there are at least 6-14 confirmations.
Massimiliano Masi: Intro to blockchain ©None February 21, 2018 21/31
After bitcoin: Ethereum
In 2013, Vitalik Buterin proposed Ethereum, a blockchain who is
to solve some bitcoin’s curses
The ASICs: since mining new blocks comes with a reward, the
PoW secures confidence that the blockchain will remain
canonical, and ensures the wealth of the mechanism. However
it should be open to as many people as possible, and it should
not be possible to make a linear profit out of it, especially not
with a high initial barrier
The scripting. The ”smart contract” (a contract in a
electronic form) has been introduced in the 50s. Since the
blockchain can be a distributed notary service, adding such
functionality would be a benefit
Massimiliano Masi: Intro to blockchain ©None February 21, 2018 22/31
Massimiliano Masi: Intro to blockchain ©None February 21, 2018 23/31
Ethereum
Ethereum has a different execution model.
It provides a quasi-Turing language in the EVM, Ethereum
Virtual Machine
Languages can be built on top of the EVM, such as Solidity,
Serpent, and LLL
In order to avoid to consume miner’s resources, and to avoid
DDoS, each execution of a EVM instruction costs gas
https://ethgasstation.info.
Massimiliano Masi: Intro to blockchain ©None February 21, 2018 24/31
Attacks to Ethereum
The kitten
The DAO
Parity’s suicide
But is blockchain a good programming paradigm?
Massimiliano Masi: Intro to blockchain ©None February 21, 2018 25/31
We’re at the beginning
Solidity is a strongly typed programming language: avoids a
zoology of mistakes
Using Token Standards (ERC-20) helps a lot
But still, a bug is forever!
Massimiliano Masi: Intro to blockchain ©None February 21, 2018 26/31
Off-chain
For this reason (and for the cost of gas) many operations are made
off-chain.
Massimiliano Masi: Intro to blockchain ©None February 21, 2018 27/31
A erc-20 token
ERC-20 is a standard which defines how tokens can be created in
Ethereum that comply with all the ERC-20 wallets.
Major functions:
transfer(to, value);
uint initialSupply;
contract Owner paradigm.
Security vs Utility
If a token is known to have in advance an increase of price is a
security (thus illegal in most of the countries), however if it is used
to exchange value, it is a utility
Massimiliano Masi: Intro to blockchain ©None February 21, 2018 28/31
How many tokens we create?
A token is either generated at every block (bitcoin, ethereum), or
all in advance (Token Generating Event, TGE). TGEs are usually
created in ICO, Initial Coin Offering.
How to check if an ICO is a scam? Good question. Check the
team, due diligence the cost plan
How to set a price of a token?
S
$/B
t =
TB∗
t
(MB
t − ZB
t )V B∗
t
The exhange rate:
Increases concurrently with the volume of transactions paid
with tokens TB∗
t
Decreases concurrently with the velocity of the tokens V B∗
t
and the total quantity MB
t
Increases inversely with the quantity of tokens held in the
speculative position ZB
t , as this effectively reduces the
quantity of virtual currency available
Massimiliano Masi: Intro to blockchain ©None February 21, 2018 29/31
Input from Attendees / Discussion
Massimiliano Masi: Intro to blockchain ©None February 21, 2018 30/31
Thank You
Massimiliano Masi: Intro to blockchain ©None February 21, 2018 31/31

More Related Content

What's hot

An Introduction to Blockchain Technology
An Introduction to Blockchain Technology An Introduction to Blockchain Technology
An Introduction to Blockchain Technology Niuversity
 
BLOCKCHAIN & THE HOLLYWOOD SUPPLY CHAIN
BLOCKCHAIN & THE HOLLYWOOD SUPPLY CHAINBLOCKCHAIN & THE HOLLYWOOD SUPPLY CHAIN
BLOCKCHAIN & THE HOLLYWOOD SUPPLY CHAINETCenter
 
IRJET- Security Threats on Blockchain and its Countermeasures
IRJET- Security Threats on Blockchain and its CountermeasuresIRJET- Security Threats on Blockchain and its Countermeasures
IRJET- Security Threats on Blockchain and its CountermeasuresIRJET Journal
 
Blockchain and Smart Contracts
Blockchain and Smart ContractsBlockchain and Smart Contracts
Blockchain and Smart ContractsGiovanni Ciatto
 
Overview of blockchain technology and architecture
Overview of blockchain technology and   architectureOverview of blockchain technology and   architecture
Overview of blockchain technology and architectureEY
 
Bitcoin-full-report-STVM
Bitcoin-full-report-STVMBitcoin-full-report-STVM
Bitcoin-full-report-STVMKai Bennink
 
Blockchain Computing: Prospects and Challenges for Digital Transformation  Pr...
Blockchain Computing: Prospects and Challenges for Digital Transformation  Pr...Blockchain Computing: Prospects and Challenges for Digital Transformation  Pr...
Blockchain Computing: Prospects and Challenges for Digital Transformation  Pr...eraser Juan José Calderón
 
IRJET- Blockchain Technology
IRJET- Blockchain TechnologyIRJET- Blockchain Technology
IRJET- Blockchain TechnologyIRJET Journal
 
Karya yang Mendasari Bitcoin
Karya yang Mendasari BitcoinKarya yang Mendasari Bitcoin
Karya yang Mendasari BitcoinRein Mahatma
 
Agora: general-purpose blockchain platform
Agora: general-purpose blockchain platformAgora: general-purpose blockchain platform
Agora: general-purpose blockchain platformpizyumi
 
Blockchain, smart contracts and use cases for the Legal Hackers
Blockchain, smart contracts and use cases for the Legal HackersBlockchain, smart contracts and use cases for the Legal Hackers
Blockchain, smart contracts and use cases for the Legal HackersKoen Vingerhoets
 
Blockchain disruptive technology 2018
Blockchain disruptive technology 2018Blockchain disruptive technology 2018
Blockchain disruptive technology 2018Ziyad Abualrob
 
bitcoin technology report
bitcoin technology reportbitcoin technology report
bitcoin technology reportShivani Darshan
 
An Introduction to Blockchain
An Introduction to BlockchainAn Introduction to Blockchain
An Introduction to BlockchainThomvest Ventures
 
The curious case of Blockchain Technology
The curious case of Blockchain TechnologyThe curious case of Blockchain Technology
The curious case of Blockchain TechnologyRitesh Mehrotra
 
Future scenarious of DeFi
Future scenarious of DeFiFuture scenarious of DeFi
Future scenarious of DeFiSandrisMurins
 
A SYSTEMATIC MAPPING STUDY ON CURRENT RESEARCH TOPICS IN SMART CONTRACTS
A SYSTEMATIC MAPPING STUDY ON CURRENT RESEARCH TOPICS IN SMART CONTRACTSA SYSTEMATIC MAPPING STUDY ON CURRENT RESEARCH TOPICS IN SMART CONTRACTS
A SYSTEMATIC MAPPING STUDY ON CURRENT RESEARCH TOPICS IN SMART CONTRACTSijcsit
 

What's hot (19)

An Introduction to Blockchain Technology
An Introduction to Blockchain Technology An Introduction to Blockchain Technology
An Introduction to Blockchain Technology
 
BLOCKCHAIN & THE HOLLYWOOD SUPPLY CHAIN
BLOCKCHAIN & THE HOLLYWOOD SUPPLY CHAINBLOCKCHAIN & THE HOLLYWOOD SUPPLY CHAIN
BLOCKCHAIN & THE HOLLYWOOD SUPPLY CHAIN
 
Blockchain
BlockchainBlockchain
Blockchain
 
IRJET- Security Threats on Blockchain and its Countermeasures
IRJET- Security Threats on Blockchain and its CountermeasuresIRJET- Security Threats on Blockchain and its Countermeasures
IRJET- Security Threats on Blockchain and its Countermeasures
 
Blockchain and Smart Contracts
Blockchain and Smart ContractsBlockchain and Smart Contracts
Blockchain and Smart Contracts
 
Overview of blockchain technology and architecture
Overview of blockchain technology and   architectureOverview of blockchain technology and   architecture
Overview of blockchain technology and architecture
 
Bitcoin-full-report-STVM
Bitcoin-full-report-STVMBitcoin-full-report-STVM
Bitcoin-full-report-STVM
 
Blockchain Computing: Prospects and Challenges for Digital Transformation  Pr...
Blockchain Computing: Prospects and Challenges for Digital Transformation  Pr...Blockchain Computing: Prospects and Challenges for Digital Transformation  Pr...
Blockchain Computing: Prospects and Challenges for Digital Transformation  Pr...
 
IRJET- Blockchain Technology
IRJET- Blockchain TechnologyIRJET- Blockchain Technology
IRJET- Blockchain Technology
 
Karya yang Mendasari Bitcoin
Karya yang Mendasari BitcoinKarya yang Mendasari Bitcoin
Karya yang Mendasari Bitcoin
 
Agora: general-purpose blockchain platform
Agora: general-purpose blockchain platformAgora: general-purpose blockchain platform
Agora: general-purpose blockchain platform
 
Blockchain, smart contracts and use cases for the Legal Hackers
Blockchain, smart contracts and use cases for the Legal HackersBlockchain, smart contracts and use cases for the Legal Hackers
Blockchain, smart contracts and use cases for the Legal Hackers
 
Blockchain disruptive technology 2018
Blockchain disruptive technology 2018Blockchain disruptive technology 2018
Blockchain disruptive technology 2018
 
bitcoin technology report
bitcoin technology reportbitcoin technology report
bitcoin technology report
 
Blockchains 101
Blockchains 101Blockchains 101
Blockchains 101
 
An Introduction to Blockchain
An Introduction to BlockchainAn Introduction to Blockchain
An Introduction to Blockchain
 
The curious case of Blockchain Technology
The curious case of Blockchain TechnologyThe curious case of Blockchain Technology
The curious case of Blockchain Technology
 
Future scenarious of DeFi
Future scenarious of DeFiFuture scenarious of DeFi
Future scenarious of DeFi
 
A SYSTEMATIC MAPPING STUDY ON CURRENT RESEARCH TOPICS IN SMART CONTRACTS
A SYSTEMATIC MAPPING STUDY ON CURRENT RESEARCH TOPICS IN SMART CONTRACTSA SYSTEMATIC MAPPING STUDY ON CURRENT RESEARCH TOPICS IN SMART CONTRACTS
A SYSTEMATIC MAPPING STUDY ON CURRENT RESEARCH TOPICS IN SMART CONTRACTS
 

Similar to Introduction to Blockchain Technologies

Blockchain: The New Technology of Trust
Blockchain: The New Technology of TrustBlockchain: The New Technology of Trust
Blockchain: The New Technology of TrustMarco Segato
 
Bitcoin Transparency Using Blockchain.pptx
Bitcoin Transparency Using Blockchain.pptxBitcoin Transparency Using Blockchain.pptx
Bitcoin Transparency Using Blockchain.pptxMuhammadHamza579668
 
Blockchain technology in (life) sciences
Blockchain technology in (life) sciencesBlockchain technology in (life) sciences
Blockchain technology in (life) sciencesBarbera van Schaik
 
With a transaction fee market and without a block size limit in Bitcoin netwo...
With a transaction fee market and without a block size limit in Bitcoin netwo...With a transaction fee market and without a block size limit in Bitcoin netwo...
With a transaction fee market and without a block size limit in Bitcoin netwo...ijgttjournal
 
The Basic Theories of Blockchain
The Basic Theories of BlockchainThe Basic Theories of Blockchain
The Basic Theories of BlockchainSota Watanabe
 
Tutorial blockchain technical overview-ss
Tutorial blockchain technical overview-ssTutorial blockchain technical overview-ss
Tutorial blockchain technical overview-ssHoward Anglin
 
Blockchain an introduction_n_li
Blockchain an introduction_n_liBlockchain an introduction_n_li
Blockchain an introduction_n_linikinew1
 
Blockchain based Banking System
Blockchain based Banking SystemBlockchain based Banking System
Blockchain based Banking SystemGaurav Singh
 
GLOSSARY. Blockchain : practices and perspectives. 17 Mayo. Paris
GLOSSARY. Blockchain : practices and perspectives. 17 Mayo. ParisGLOSSARY. Blockchain : practices and perspectives. 17 Mayo. Paris
GLOSSARY. Blockchain : practices and perspectives. 17 Mayo. Pariseraser Juan José Calderón
 
Webinar on BITCOIN FORENSICS : BRIGHTTALK
Webinar on BITCOIN FORENSICS : BRIGHTTALKWebinar on BITCOIN FORENSICS : BRIGHTTALK
Webinar on BITCOIN FORENSICS : BRIGHTTALKanupriti
 
State of Blockchain 2017: Smartnetworks and the Blockchain Economy
State of Blockchain 2017:  Smartnetworks and the Blockchain EconomyState of Blockchain 2017:  Smartnetworks and the Blockchain Economy
State of Blockchain 2017: Smartnetworks and the Blockchain EconomyMelanie Swan
 
Report on Bitcoin- The cryptocurrency (November 2017)
Report on Bitcoin- The cryptocurrency (November 2017)Report on Bitcoin- The cryptocurrency (November 2017)
Report on Bitcoin- The cryptocurrency (November 2017)AJSH & Co LLP
 
UL Conference - An Introduction To Bitcoin And The Blockchain
UL Conference - An Introduction To Bitcoin And The BlockchainUL Conference - An Introduction To Bitcoin And The Blockchain
UL Conference - An Introduction To Bitcoin And The BlockchainBrian Driscoll
 
blockchain and insurance.pdf
blockchain and insurance.pdfblockchain and insurance.pdf
blockchain and insurance.pdfakshay pateriya
 
Blockchain Network Theory
Blockchain Network TheoryBlockchain Network Theory
Blockchain Network TheoryMelanie Swan
 

Similar to Introduction to Blockchain Technologies (20)

Blockchain: The New Technology of Trust
Blockchain: The New Technology of TrustBlockchain: The New Technology of Trust
Blockchain: The New Technology of Trust
 
Blockchain
BlockchainBlockchain
Blockchain
 
Bitcoin Transparency Using Blockchain.pptx
Bitcoin Transparency Using Blockchain.pptxBitcoin Transparency Using Blockchain.pptx
Bitcoin Transparency Using Blockchain.pptx
 
Blockchain technology in (life) sciences
Blockchain technology in (life) sciencesBlockchain technology in (life) sciences
Blockchain technology in (life) sciences
 
With a transaction fee market and without a block size limit in Bitcoin netwo...
With a transaction fee market and without a block size limit in Bitcoin netwo...With a transaction fee market and without a block size limit in Bitcoin netwo...
With a transaction fee market and without a block size limit in Bitcoin netwo...
 
The Basic Theories of Blockchain
The Basic Theories of BlockchainThe Basic Theories of Blockchain
The Basic Theories of Blockchain
 
Tutorial blockchain technical overview-ss
Tutorial blockchain technical overview-ssTutorial blockchain technical overview-ss
Tutorial blockchain technical overview-ss
 
Blockchain an introduction_n_li
Blockchain an introduction_n_liBlockchain an introduction_n_li
Blockchain an introduction_n_li
 
Blockchain based Banking System
Blockchain based Banking SystemBlockchain based Banking System
Blockchain based Banking System
 
GLOSSARY. Blockchain : practices and perspectives. 17 Mayo. Paris
GLOSSARY. Blockchain : practices and perspectives. 17 Mayo. ParisGLOSSARY. Blockchain : practices and perspectives. 17 Mayo. Paris
GLOSSARY. Blockchain : practices and perspectives. 17 Mayo. Paris
 
Blockchain introduction
Blockchain introductionBlockchain introduction
Blockchain introduction
 
Btcp whitepaper
Btcp whitepaperBtcp whitepaper
Btcp whitepaper
 
Webinar on BITCOIN FORENSICS : BRIGHTTALK
Webinar on BITCOIN FORENSICS : BRIGHTTALKWebinar on BITCOIN FORENSICS : BRIGHTTALK
Webinar on BITCOIN FORENSICS : BRIGHTTALK
 
State of Blockchain 2017: Smartnetworks and the Blockchain Economy
State of Blockchain 2017:  Smartnetworks and the Blockchain EconomyState of Blockchain 2017:  Smartnetworks and the Blockchain Economy
State of Blockchain 2017: Smartnetworks and the Blockchain Economy
 
Report on Bitcoin- The cryptocurrency (November 2017)
Report on Bitcoin- The cryptocurrency (November 2017)Report on Bitcoin- The cryptocurrency (November 2017)
Report on Bitcoin- The cryptocurrency (November 2017)
 
Bitcoin
BitcoinBitcoin
Bitcoin
 
UL Conference - An Introduction To Bitcoin And The Blockchain
UL Conference - An Introduction To Bitcoin And The BlockchainUL Conference - An Introduction To Bitcoin And The Blockchain
UL Conference - An Introduction To Bitcoin And The Blockchain
 
CIKMTutorial.pdf
CIKMTutorial.pdfCIKMTutorial.pdf
CIKMTutorial.pdf
 
blockchain and insurance.pdf
blockchain and insurance.pdfblockchain and insurance.pdf
blockchain and insurance.pdf
 
Blockchain Network Theory
Blockchain Network TheoryBlockchain Network Theory
Blockchain Network Theory
 

More from Massimiliano Masi

Cybersecurity Task Force at ASECAP Days 2023
Cybersecurity Task Force at ASECAP Days 2023Cybersecurity Task Force at ASECAP Days 2023
Cybersecurity Task Force at ASECAP Days 2023Massimiliano Masi
 
Securing Critical Infrastructures with a cybersecurity digital twin
Securing Critical Infrastructures with a cybersecurity digital twin Securing Critical Infrastructures with a cybersecurity digital twin
Securing Critical Infrastructures with a cybersecurity digital twin Massimiliano Masi
 
A Cybersecurity Digital Twin for Critical Infrastructure Protection
A Cybersecurity Digital Twin for Critical Infrastructure ProtectionA Cybersecurity Digital Twin for Critical Infrastructure Protection
A Cybersecurity Digital Twin for Critical Infrastructure ProtectionMassimiliano Masi
 
Enabling a Zero Trust Architecture in Smart Grids through a Digital Twin
Enabling a Zero Trust Architecture in Smart Grids through a Digital TwinEnabling a Zero Trust Architecture in Smart Grids through a Digital Twin
Enabling a Zero Trust Architecture in Smart Grids through a Digital TwinMassimiliano Masi
 
Security and Safety by Design in the Internet of Actors an Architectural Appr...
Security and Safety by Design in the Internet of Actors an Architectural Appr...Security and Safety by Design in the Internet of Actors an Architectural Appr...
Security and Safety by Design in the Internet of Actors an Architectural Appr...Massimiliano Masi
 
Achieving Interoperability Through IHE
Achieving Interoperability Through IHEAchieving Interoperability Through IHE
Achieving Interoperability Through IHEMassimiliano Masi
 
Securing Mobile e-Health Environments by Design: A Holistic Architectural App...
Securing Mobile e-Health Environments by Design: A Holistic Architectural App...Securing Mobile e-Health Environments by Design: A Holistic Architectural App...
Securing Mobile e-Health Environments by Design: A Holistic Architectural App...Massimiliano Masi
 
Enabling Security-by-design in Smart Grids: An architecture-based approach
Enabling Security-by-design in Smart Grids: An architecture-based approachEnabling Security-by-design in Smart Grids: An architecture-based approach
Enabling Security-by-design in Smart Grids: An architecture-based approachMassimiliano Masi
 
Corso IFTS CyberSecurity Expert - Attacco di Armando e Operazione Black Tulip
Corso IFTS CyberSecurity Expert - Attacco di Armando e Operazione Black TulipCorso IFTS CyberSecurity Expert - Attacco di Armando e Operazione Black Tulip
Corso IFTS CyberSecurity Expert - Attacco di Armando e Operazione Black TulipMassimiliano Masi
 
Corso IFTS CyberSecurity Expert - Creazione di una CA con OpenSSL
Corso IFTS CyberSecurity Expert - Creazione di una CA con OpenSSLCorso IFTS CyberSecurity Expert - Creazione di una CA con OpenSSL
Corso IFTS CyberSecurity Expert - Creazione di una CA con OpenSSLMassimiliano Masi
 
Corso IFTS CyberSecurity Expert - Cifrai Asimmetrici
Corso IFTS CyberSecurity Expert - Cifrai AsimmetriciCorso IFTS CyberSecurity Expert - Cifrai Asimmetrici
Corso IFTS CyberSecurity Expert - Cifrai AsimmetriciMassimiliano Masi
 
Corso IFTS CyberSecurity Expert
Corso IFTS CyberSecurity ExpertCorso IFTS CyberSecurity Expert
Corso IFTS CyberSecurity ExpertMassimiliano Masi
 
The need for interoperability in blockchain-based initiatives to facilitate c...
The need for interoperability in blockchain-based initiatives to facilitate c...The need for interoperability in blockchain-based initiatives to facilitate c...
The need for interoperability in blockchain-based initiatives to facilitate c...Massimiliano Masi
 
Blockchain Technology - Common Use-Cases
Blockchain Technology - Common Use-CasesBlockchain Technology - Common Use-Cases
Blockchain Technology - Common Use-CasesMassimiliano Masi
 
Automating Smart Grid Solution Architecture Design
Automating Smart Grid Solution Architecture DesignAutomating Smart Grid Solution Architecture Design
Automating Smart Grid Solution Architecture DesignMassimiliano Masi
 
eHealth 2018 http://www.ehealth20xx.at/program-blockchain/
eHealth 2018 http://www.ehealth20xx.at/program-blockchain/eHealth 2018 http://www.ehealth20xx.at/program-blockchain/
eHealth 2018 http://www.ehealth20xx.at/program-blockchain/Massimiliano Masi
 
A governance model for ubiquitous medical devices accessing eHealth data: the...
A governance model for ubiquitous medical devices accessing eHealth data: the...A governance model for ubiquitous medical devices accessing eHealth data: the...
A governance model for ubiquitous medical devices accessing eHealth data: the...Massimiliano Masi
 
Addressing Security and Provide through IHE Profiles
Addressing Security and Provide through IHE Profiles Addressing Security and Provide through IHE Profiles
Addressing Security and Provide through IHE Profiles Massimiliano Masi
 

More from Massimiliano Masi (18)

Cybersecurity Task Force at ASECAP Days 2023
Cybersecurity Task Force at ASECAP Days 2023Cybersecurity Task Force at ASECAP Days 2023
Cybersecurity Task Force at ASECAP Days 2023
 
Securing Critical Infrastructures with a cybersecurity digital twin
Securing Critical Infrastructures with a cybersecurity digital twin Securing Critical Infrastructures with a cybersecurity digital twin
Securing Critical Infrastructures with a cybersecurity digital twin
 
A Cybersecurity Digital Twin for Critical Infrastructure Protection
A Cybersecurity Digital Twin for Critical Infrastructure ProtectionA Cybersecurity Digital Twin for Critical Infrastructure Protection
A Cybersecurity Digital Twin for Critical Infrastructure Protection
 
Enabling a Zero Trust Architecture in Smart Grids through a Digital Twin
Enabling a Zero Trust Architecture in Smart Grids through a Digital TwinEnabling a Zero Trust Architecture in Smart Grids through a Digital Twin
Enabling a Zero Trust Architecture in Smart Grids through a Digital Twin
 
Security and Safety by Design in the Internet of Actors an Architectural Appr...
Security and Safety by Design in the Internet of Actors an Architectural Appr...Security and Safety by Design in the Internet of Actors an Architectural Appr...
Security and Safety by Design in the Internet of Actors an Architectural Appr...
 
Achieving Interoperability Through IHE
Achieving Interoperability Through IHEAchieving Interoperability Through IHE
Achieving Interoperability Through IHE
 
Securing Mobile e-Health Environments by Design: A Holistic Architectural App...
Securing Mobile e-Health Environments by Design: A Holistic Architectural App...Securing Mobile e-Health Environments by Design: A Holistic Architectural App...
Securing Mobile e-Health Environments by Design: A Holistic Architectural App...
 
Enabling Security-by-design in Smart Grids: An architecture-based approach
Enabling Security-by-design in Smart Grids: An architecture-based approachEnabling Security-by-design in Smart Grids: An architecture-based approach
Enabling Security-by-design in Smart Grids: An architecture-based approach
 
Corso IFTS CyberSecurity Expert - Attacco di Armando e Operazione Black Tulip
Corso IFTS CyberSecurity Expert - Attacco di Armando e Operazione Black TulipCorso IFTS CyberSecurity Expert - Attacco di Armando e Operazione Black Tulip
Corso IFTS CyberSecurity Expert - Attacco di Armando e Operazione Black Tulip
 
Corso IFTS CyberSecurity Expert - Creazione di una CA con OpenSSL
Corso IFTS CyberSecurity Expert - Creazione di una CA con OpenSSLCorso IFTS CyberSecurity Expert - Creazione di una CA con OpenSSL
Corso IFTS CyberSecurity Expert - Creazione di una CA con OpenSSL
 
Corso IFTS CyberSecurity Expert - Cifrai Asimmetrici
Corso IFTS CyberSecurity Expert - Cifrai AsimmetriciCorso IFTS CyberSecurity Expert - Cifrai Asimmetrici
Corso IFTS CyberSecurity Expert - Cifrai Asimmetrici
 
Corso IFTS CyberSecurity Expert
Corso IFTS CyberSecurity ExpertCorso IFTS CyberSecurity Expert
Corso IFTS CyberSecurity Expert
 
The need for interoperability in blockchain-based initiatives to facilitate c...
The need for interoperability in blockchain-based initiatives to facilitate c...The need for interoperability in blockchain-based initiatives to facilitate c...
The need for interoperability in blockchain-based initiatives to facilitate c...
 
Blockchain Technology - Common Use-Cases
Blockchain Technology - Common Use-CasesBlockchain Technology - Common Use-Cases
Blockchain Technology - Common Use-Cases
 
Automating Smart Grid Solution Architecture Design
Automating Smart Grid Solution Architecture DesignAutomating Smart Grid Solution Architecture Design
Automating Smart Grid Solution Architecture Design
 
eHealth 2018 http://www.ehealth20xx.at/program-blockchain/
eHealth 2018 http://www.ehealth20xx.at/program-blockchain/eHealth 2018 http://www.ehealth20xx.at/program-blockchain/
eHealth 2018 http://www.ehealth20xx.at/program-blockchain/
 
A governance model for ubiquitous medical devices accessing eHealth data: the...
A governance model for ubiquitous medical devices accessing eHealth data: the...A governance model for ubiquitous medical devices accessing eHealth data: the...
A governance model for ubiquitous medical devices accessing eHealth data: the...
 
Addressing Security and Provide through IHE Profiles
Addressing Security and Provide through IHE Profiles Addressing Security and Provide through IHE Profiles
Addressing Security and Provide through IHE Profiles
 

Recently uploaded

Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfjimielynbastida
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfngoud9212
 

Recently uploaded (20)

Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdf
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdf
 

Introduction to Blockchain Technologies

  • 1. Introduction to Blockchain Technologies Massimiliano Masi massimiliano.masi@tiani-spirit.com http://www.tiani-spirit.com February 21, 2018
  • 2. Outline 1 A bit of cryptography 2 History of Blockchain 3 The blockchain of Bitcoin 4 Ethereum blockchain 5 ERC-20 Massimiliano Masi: Intro to blockchain ©None February 21, 2018 2/31
  • 3. Confidentiality (or Secrecy) Confidentiality (or Secrecy) Guarantees that the useful information contained in messages is accessible only to authorized parties. In other words, confidentiality guarantees that (parts of) information is not disclosed to unauthorized peers. It can be achieved by cryptography and access control Massimiliano Masi: Intro to blockchain ©None February 21, 2018 3/31
  • 4. Integrity Integrity Guarantees that a message is transmitted and it arrives to the latest recipient without any modifications made by unauthorized third parties, or, at least, such modifications, if made, are known to the recipient. It can be achieved by digital signatures and hash functions Massimiliano Masi: Intro to blockchain ©None February 21, 2018 4/31
  • 5. Authentication Authentication Ensures that the origin of a message is correctly identified, and that has not been altered Data Origin Authentication: guarantees that the message is sent by the declared sender (e.g., S/MIME, PGP) Peer Entity Authentication: in a multiparty connection, guarantees that the identity of a party is the one declared (e.g., the claiming identity has not been impersonated) It can be achieved by channel authentication, IA&A, digital signature, tokens, etc... Massimiliano Masi: Intro to blockchain ©None February 21, 2018 5/31
  • 6. Non-Repudiation Non-Repudiation Guarantees that the sender of the message will not have the possibility to deny to have sent the message itself. In other words, the operation “send message” can be proven in front of other parties. It can be achieved by means of digital signatures, timestamps Massimiliano Masi: Intro to blockchain ©None February 21, 2018 6/31
  • 7. Encryption Two types of encryption: Symmetric: Alice and Bob shares a secret, K DK [EK [M]] = M ∀M,M′ , if M ≠ M′ , EK [M] ≠ EK [M′ ] Asymmetric: Alice and Bob have their own respective secrets K− A , and a public part K+ A DK− A [EK+ A [M]] = M Massimiliano Masi: Intro to blockchain ©None February 21, 2018 7/31
  • 8. Elliptic Curve Factorization It is a type of public key cryptography secp256k1 is used by bitcoin y2 = (x3 + 7) over (FP) where FP is a finite field of prime order p Example: K = k ∗ G, where k is a random number and G is a point in the curve. k is the private, and K is the public. K = (x,y), thus a bitcoin address is: 0x00 + Base58(RIPEMD160(SHA256(K))) Massimiliano Masi: Intro to blockchain ©None February 21, 2018 8/31
  • 9. Hash Function One Way Hash Function A function H that maps an arbitrary length message M to a fixed length message digest MD is a one-way hash function if 1 It is a one-way function 2 Given M and H(M), it is hard to find a message M′ ≠ M such that H(M′ ) = H(M) Example of such functions are MD5, or the SHA family (including Keccak). Massimiliano Masi: Intro to blockchain ©None February 21, 2018 9/31
  • 10. Digital Signature The digital signature permits to the receiver To verify the authentication of the message To verify the integrity of the message To verify non-repudiation A → B M EK− A [SHA(M)] B verifies the signature as: hash = SHA(M) hash′ = DK+ A [EK− A [SHA(M)]] if (hash == hash′ ) then OK else CALL MALLORY! Massimiliano Masi: Intro to blockchain ©None February 21, 2018 10/31
  • 11. Trie A retrieval is a data structure (a tree) used in indexing strings1 . Key Concept A trie is a tree structure where every path from the root to a leaf defines a string. Two or more strings that have the same prefix share the path from the root up to the end of the common prefix. 1 A. Bhattacharya, Fundamentals of Database Indexing and Searching, CRC Press, 2015 Massimiliano Masi: Intro to blockchain ©None February 21, 2018 11/31
  • 12. Merkle tree A Merkle tree is a data structure (a tree) in which each leaf node is a hash of a block of data, end each non-leaf node is a hash of its children2 . 2 https://medium.com/@evankozliner/merkle-tree-introduction-4c44250e2da7 and https://www.codeproject.com/Articles/1176140/Understanding-Merkle-Trees-Why-use-them-who-uses-t Massimiliano Masi: Intro to blockchain ©None February 21, 2018 12/31
  • 13. Where Satoshi finds his roots The first concept of blockchain was introduced by Haber et al.3 , the digital safety deposit box Schneier et al4 introduced the concept of Secure Logs (avoiding attackers to gain knowledge by accessing logs) Vishnamurty et al5 where a token was used to keep p2p file trading in check, ensuring consumers be able to make micro payments to suppliers for their services. Szabo 6 , is also a reference on the topic ⇒ Bitcoin’s technology completed the puzzle! 3 S. Haber, and W.S. Stornetta, How to timestamp a digital document 4 B. Schneier, J. Kelsey, Cryptographic support for Secure Logs on Untrusted Machines, in Proceedings of the 7th USENIX 5 V. Vishnamurty et al., Karma: A secure economic framework for peer-to-peer resource sharing, 2003 6 N. Szabo, Formalizing and securing relationships on public networks, 1997 Massimiliano Masi: Intro to blockchain ©None February 21, 2018 13/31
  • 14. The Satoshi paper In 2008, Satoshi Nakamoto7 made public the Bitcoin Paper. It aimed at defining a decentralized model avoiding a central timestamping authority, and a distributed ledger where transactions from/to addresses are stored He proposed a solution to achieve consensus in hostile environments by adopting the Proof-of-Work, initially from Dwork et al.8 and from hashcash.org 7 Conspiration theory: SAmsung, TOSHIba, NAKAmichi, MOTOrola 8 C. Dwork, and M. Naor, Pricing via Processing or Combatting Junk Mail, Crypto 92 Massimiliano Masi: Intro to blockchain ©None February 21, 2018 14/31
  • 15. What is a blockchain The blockchain data structure is an ordered, back-linked list of blocks of transactions9 9 A. Antonoupoulus, Mastering Bitcoin, O’Reilly Massimiliano Masi: Intro to blockchain ©None February 21, 2018 15/31
  • 16. The problem of consensus In the blockchain, since we transfer value, everyone is encouraged to cheat! Several consensus model Consensus in trusted environments Consensus in hostile environments (byzantine) Clearly, if the consensus style changes, also the deployment of the blockchain changes. Permissioned (Hyperledger, Sawtooth, Coco framework) Public (Bitcoin, Ethereum, EOS, Rai) Massimiliano Masi: Intro to blockchain ©None February 21, 2018 16/31
  • 17. The problem of consensus Achieving consensus is complex. The CAP theorem It is impossible for a distributed system to simultaneously provide Consistency, Availability, and Partition Tolerance. A distributed system can satisfy any two of these, but not all three The Proof-of-Work achieves consensus in hostile environments by solving the following equation Fd (c,x) → SHA256(SHA256(c x)) < 2224 d where d is increasing constantly. Miners pool use specialized hardware (ASICs) to perform the PoW Massimiliano Masi: Intro to blockchain ©None February 21, 2018 17/31
  • 18. The block Block definition A block is a data structure used to communicate incremental changes to the local state of a node. A block consists of a list of transactions, a reference to a previous block and a nonce. A block lists some transactions the block creator (the ”miner”) has accepted to its memory-pool since the previous block. A node finds and broadcasts a block when it finds a valid nonce for its PoW function. When a miner ”closes” the block it has a reward (12,5 bitcoins now) Blockchain The longest path from the genesis block, i.e., the root of the tree, to a leaf is called the blockchain. The blockchain acts as a consistent transaction history on which all nodes eventually agreea a R. Wattenhofer, The Science of the Blockchain Massimiliano Masi: Intro to blockchain ©None February 21, 2018 18/31
  • 19. Wallets Transactions are made on addresses. Each address is owned by a software, named wallet. A wallet Maintains a state of the addresses’ balances (or pointers to balances) Manages and protect keys Generate addresses on demand (to avoid kidnapping) Hardware, Paper, Software, Online, Multisig Listens for events on the blockchain, avoiding to download the WHOLE blockchain (around 350 GB) Massimiliano Masi: Intro to blockchain ©None February 21, 2018 19/31
  • 20. Wallets If a wallet is lost, or stolen, funds are lost forever. Should not use a online wallet (like Coinbase). They own your keys See the Mt. Gox, and Bitgrail (Francesco) Massimiliano Masi: Intro to blockchain ©None February 21, 2018 20/31
  • 21. Wallets What you can do with Bitcoin? a limited amount of coins available (21 millions) very inefficient (the blockchain of bitcoin processes 7 transactions per second) Exchange Exchange to FIAT or other currencies in Crypto Exchanges (Coinbase, Bitfinex) Pay You can pay services using the Simple Payment Verification, or the Lightning / Raiden network. Note that a transaction is verified if there are at least 6-14 confirmations. Massimiliano Masi: Intro to blockchain ©None February 21, 2018 21/31
  • 22. After bitcoin: Ethereum In 2013, Vitalik Buterin proposed Ethereum, a blockchain who is to solve some bitcoin’s curses The ASICs: since mining new blocks comes with a reward, the PoW secures confidence that the blockchain will remain canonical, and ensures the wealth of the mechanism. However it should be open to as many people as possible, and it should not be possible to make a linear profit out of it, especially not with a high initial barrier The scripting. The ”smart contract” (a contract in a electronic form) has been introduced in the 50s. Since the blockchain can be a distributed notary service, adding such functionality would be a benefit Massimiliano Masi: Intro to blockchain ©None February 21, 2018 22/31
  • 23. Massimiliano Masi: Intro to blockchain ©None February 21, 2018 23/31
  • 24. Ethereum Ethereum has a different execution model. It provides a quasi-Turing language in the EVM, Ethereum Virtual Machine Languages can be built on top of the EVM, such as Solidity, Serpent, and LLL In order to avoid to consume miner’s resources, and to avoid DDoS, each execution of a EVM instruction costs gas https://ethgasstation.info. Massimiliano Masi: Intro to blockchain ©None February 21, 2018 24/31
  • 25. Attacks to Ethereum The kitten The DAO Parity’s suicide But is blockchain a good programming paradigm? Massimiliano Masi: Intro to blockchain ©None February 21, 2018 25/31
  • 26. We’re at the beginning Solidity is a strongly typed programming language: avoids a zoology of mistakes Using Token Standards (ERC-20) helps a lot But still, a bug is forever! Massimiliano Masi: Intro to blockchain ©None February 21, 2018 26/31
  • 27. Off-chain For this reason (and for the cost of gas) many operations are made off-chain. Massimiliano Masi: Intro to blockchain ©None February 21, 2018 27/31
  • 28. A erc-20 token ERC-20 is a standard which defines how tokens can be created in Ethereum that comply with all the ERC-20 wallets. Major functions: transfer(to, value); uint initialSupply; contract Owner paradigm. Security vs Utility If a token is known to have in advance an increase of price is a security (thus illegal in most of the countries), however if it is used to exchange value, it is a utility Massimiliano Masi: Intro to blockchain ©None February 21, 2018 28/31
  • 29. How many tokens we create? A token is either generated at every block (bitcoin, ethereum), or all in advance (Token Generating Event, TGE). TGEs are usually created in ICO, Initial Coin Offering. How to check if an ICO is a scam? Good question. Check the team, due diligence the cost plan How to set a price of a token? S $/B t = TB∗ t (MB t − ZB t )V B∗ t The exhange rate: Increases concurrently with the volume of transactions paid with tokens TB∗ t Decreases concurrently with the velocity of the tokens V B∗ t and the total quantity MB t Increases inversely with the quantity of tokens held in the speculative position ZB t , as this effectively reduces the quantity of virtual currency available Massimiliano Masi: Intro to blockchain ©None February 21, 2018 29/31
  • 30. Input from Attendees / Discussion Massimiliano Masi: Intro to blockchain ©None February 21, 2018 30/31
  • 31. Thank You Massimiliano Masi: Intro to blockchain ©None February 21, 2018 31/31