SlideShare a Scribd company logo
1 of 41
Download to read offline
Paranoid’s view of Token
Engineering
Anish Mohammed,Oct 25th, 2018
Technology Hype Curve and Tokens
Technology & Value Evolution
@ Simon Wardley
Value
discovery
Cryptoeconomics
A formal discipline that studies protocols that govern
production distribution and consumption of goods and
services in decentralised digital economy.
Vlad Zamfir
General consensus is its derived from Cryptography and
Economics
Economics
Economics is "a social science concerned chiefly with
description and analysis of the production, distribution,
and consumption of goods and services". Economics
focuses on the behaviour and interactions of economic
agents and how economies work
Wikipedia
Cryptography
A Cryptography (from Greek κρυπτός kryptós, "hidden,
secret"; and γράφειν graphein, "writing", or -λογία -logia,
"study", respectively) is the practice and study of
techniques for secure communication in the presence of
third parties called adversaries
Wikipedia
Security Engineering
Security engineering is a specialized field of engineering
that focuses on the security aspects in the design of
systems that need to be able to deal robustly with
possible sources of disruption, ranging from natural
disasters to malicious acts. It is similar to other systems
engineering activities in that its primary motivation is to
support the delivery of engineering solutions that satisfy
pre-defined functional and user requirements, but it has
the added dimension of preventing misuse and malicious
behavior. Those constraints and restrictions are often
asserted as a security policy.
Wikipedia
Cryptographic Engineering
Cryptographic Engineering is the discipline of using
cryptography to solve human problems. Cryptography is
typically applied when trying to ensure data
confidentiality, to authenticate people or devices, or to
verify data integrity in risky environments.
Wikipedia
Provable Security
Provable security refers to any type or level of security
that can be proved.Uses mathematical proofs, which are
common in cryptography.
The capabilities of the attacker are defined by an
adversarial model.The aim of the proof is to show that the
attacker must solve the underlying hard problem in order
to break the security of the modelled system.
Wikipedia
Provable Security - Contentions
Koblitz and Menezes have claimed that provable security results
for important cryptographic protocols frequently have fallacies in
the proofs; are often interpreted in a misleading manner, giving
false assurances; typically rely upon strong assumptions that may
turn out to be false; are based on unrealistic models of security;
and serve to distract researchers' attention from the need for
"old-fashioned" (non-mathematical) testing and analysis.
Complexity Classes
In computational complexity theory, a complexity class is
a set of problems of related resource-based complexity. A
typical complexity class has a definition of the form: the
set of problems that can be solved by an abstract machine
M using O(f(n)) of resource R, where n is the size of the
input.
Wikipedia
Adversary
An adversary (rarely opponent, enemy) is a malicious
entity whose aim is to prevent the users of the
cryptosystem from achieving their goal (primarily privacy,
integrity, and availability of data).
Wikipedia
Adversary - Nation State Actors
Tokens - Economic view
• Exonumia, items of currency other than coins and paper
money
• Token money, money that is of limited legal tender
• Token coin, a small, flat, round piece of metal or
plastic that can sometimes be used instead of money
• Voucher or gift card, redeemable for items of value
Wikipedia
Tokens - Computer Science view
Token, an object (in software or in hardware) which represents
the right to perform some operation:
• Tokenization (data security), the process of substituting a
sensitive data element
• Token, an object used in Petri net theory
• Access token, a system object representing the subject of
access control operations
• Session token, a unique identifier of an interaction session
• Security token or hardware token, authentication token or
cryptographic token, a physical device for computer
authentication
Wikipedia
Tokens An Alternate view - AWS Credits
AWS Credits Pricing- Historical view
Hash functions
A hash function is any function that can be used to map
data of arbitrary size to data of a fixed size. The values
returned by a hash function are called hash values, hash
codes, digests, or simply hashes.
Wikipedia
Hash functions testing - Diehard
The diehard tests are a battery of statistical tests for
measuring the quality of a random number generator.
They were developed by George Marsaglia over several
years and first published in 1995 on a CD-ROM of random
numbers
Wikipedia
MD5 - Attacks
• 1991 - Rivest Created MD5 as MD4 was broken
• 1993 - Den Boer and Bosselaers limited Pseudo collisions
• 1996 - Dobbertin a collision of the compression function of MD5
• 2004 - MD5CRK - launched in March
• 2004 - August - Xiaoyun Wang, Dengguo Feng, Xuejia Lai, and
Hongbo Yu announce full break
DES - Cautionary Tale
• 1975 - DES published
• 1991 - Biham and Shamir rediscover differential cryptanalysis
• 1992 - Biham and Shamir full rounds - differential cryptanalysis
faster than brute force 2^47
• 1994 - Matsui - Linear Cryptanalysis
• 1998 - EFF's DES cracker (Deep Crack) breaks a DES key in 56
hours.
Tools At Our Disposal
• Proof of Work
• Staking
• Curation & Prediction Markets
• Curve Bonding
• Radical Markets
• Non Fungible Tokens
• Dispute Resolution
Bonding Curves
• Bonding curves - a
mechanism that allows
the continual liquidity of
a token, with the price
changing depending on
how much ‘activity’ is
conducted.

Multi dimensional bonding surfaces
• Can tokens have multi dimensional existence ?
• Possibility of dimensional arbitrage
Thoughts
• Don’t reinvent the wheel when you don’t have to
• Hierarchy of strength of proofs exist
• Simulation is not Verification
• Verification has a broad spectrum
• Formal Verifications might be useful tool
• Acknowledge Existence of Side Channels
Anish Mohammed
@anishmohammed
CTO - Ontici
anish@ontici.com
u Identity - General approach has been to support pseudonyms
u Privacy – Blockchain as a paradigm expects all data to be available
u Trust – Question of trust in a decentralised system
u Cryptography – choice of algorithms and parameters not necessarily considered
traditional. Also the question of QC resistance brought up by some vendors
key security challenges
Post Quantum Cryptography
u Shor’s algorithm
u Grover’s algorithm
u Current crop of QC resistant algorithms
u Challenges to Public key crypto and symmetric primitives
Post Quantum Cryptography (contd)
u Some attacks have been found on lattice based crypto systems, e.g. NTRU
u Newer variants have entered the fray, e.g. LWE
Direct Anonymous Attestation
Intel – SGX
Homomorphic Encryption
u Homomorphic Encryption – the challenge of processing without knowing what
is being asked
Function

f
x
search

query Google search
Search results
x
f(x)
Homomorphic Encryption
u Homomorphic Encryption – Oct 2008 Craig Gentry came up with solution
Function

f
x
Enc(x)
Enc(f(x))
search

query Search results
Google search
Zero Knowledge Proofs
Zero Knowledge Protocols - properties
Completeness
-If prover is telling the truth, then they will eventually convince the verifier.
Soundness
-Prover can only convince verifier if they're actually telling the truth.
Zero-knowledgeness
-Verifier doesn't learn anything else about prover's solution
According to Goldwasser,
Micali and Rackoff
Zero Knowledge and SNARK
SNARK – Succinct Non-interactive Argument of Knowledge
Clearinghouses and Scalability
Privacy – Half Life of Data and permissions
As the volume of data grows exponentially,
organizations need to change their view of data
from a data centric model, to a user centric model.
Data is a moving object and at every point in time
there is new data being created and collected. That
data has a higher initial value that decreases over
time.
When Hype meets S-curve
STARK
u Scalable
u Post Quantum Resistant

More Related Content

Similar to Paranoid's View of Token Engineering

Blockchain_ver0.5_MIT_security_and Privacy_am_final_upload
Blockchain_ver0.5_MIT_security_and Privacy_am_final_uploadBlockchain_ver0.5_MIT_security_and Privacy_am_final_upload
Blockchain_ver0.5_MIT_security_and Privacy_am_final_uploadAnish Mohammed
 
Post quantum cryptography
Post quantum cryptographyPost quantum cryptography
Post quantum cryptographyMartins Okoi
 
Chaos Based Direct Public Verifiable Signcryption Scheme
Chaos Based Direct Public Verifiable Signcryption SchemeChaos Based Direct Public Verifiable Signcryption Scheme
Chaos Based Direct Public Verifiable Signcryption SchemeIOSR Journals
 
Ofer rivlin BGU - department seminar
Ofer rivlin   BGU - department seminarOfer rivlin   BGU - department seminar
Ofer rivlin BGU - department seminarOfer Rivlin, CISSP
 
Techniques of lattice based
Techniques of lattice basedTechniques of lattice based
Techniques of lattice basedijcsa
 
Security Training: #1 What Actually a Security Is?
Security Training: #1 What Actually a Security Is?Security Training: #1 What Actually a Security Is?
Security Training: #1 What Actually a Security Is?Yulian Slobodyan
 
us-15-Zadeh-From-False-Positives-To-Actionable-Analysis-Behavioral-Intrusion-...
us-15-Zadeh-From-False-Positives-To-Actionable-Analysis-Behavioral-Intrusion-...us-15-Zadeh-From-False-Positives-To-Actionable-Analysis-Behavioral-Intrusion-...
us-15-Zadeh-From-False-Positives-To-Actionable-Analysis-Behavioral-Intrusion-...jzadeh
 
Three Party Authenticated Key Distribution using Quantum Cryptography
Three Party Authenticated Key Distribution using Quantum CryptographyThree Party Authenticated Key Distribution using Quantum Cryptography
Three Party Authenticated Key Distribution using Quantum CryptographyIJMER
 
Birds of a Feather 2017: 邀請分享 Place of Attribution in Threat Intelligence - F...
Birds of a Feather 2017: 邀請分享 Place of Attribution in Threat Intelligence - F...Birds of a Feather 2017: 邀請分享 Place of Attribution in Threat Intelligence - F...
Birds of a Feather 2017: 邀請分享 Place of Attribution in Threat Intelligence - F...HITCON GIRLS
 
DOCS ON NETWORK SECURITY
DOCS ON NETWORK SECURITYDOCS ON NETWORK SECURITY
DOCS ON NETWORK SECURITYTuhin_Das
 
Artificial Intelligence and Quantum Cryptography
Artificial Intelligence and Quantum CryptographyArtificial Intelligence and Quantum Cryptography
Artificial Intelligence and Quantum CryptographyPetar Radanliev
 
Quantum computer in cryptography
Quantum computer in cryptographyQuantum computer in cryptography
Quantum computer in cryptographyAkshay Shelake
 
Study and implementation of DES on FPGA
Study and implementation of DES on FPGAStudy and implementation of DES on FPGA
Study and implementation of DES on FPGAVenkata Kishore
 
Application of Genetic Algorithm in Cryptanalysis of Mono-alphabetic Substitu...
Application of Genetic Algorithm in Cryptanalysis of Mono-alphabetic Substitu...Application of Genetic Algorithm in Cryptanalysis of Mono-alphabetic Substitu...
Application of Genetic Algorithm in Cryptanalysis of Mono-alphabetic Substitu...ijtsrd
 
Improving privacy in blockchain using homomorphic encryption
Improving privacy in blockchain using homomorphic encryption Improving privacy in blockchain using homomorphic encryption
Improving privacy in blockchain using homomorphic encryption Razi Rais
 

Similar to Paranoid's View of Token Engineering (20)

Blockchain_ver0.5_MIT_security_and Privacy_am_final_upload
Blockchain_ver0.5_MIT_security_and Privacy_am_final_uploadBlockchain_ver0.5_MIT_security_and Privacy_am_final_upload
Blockchain_ver0.5_MIT_security_and Privacy_am_final_upload
 
H42063743
H42063743H42063743
H42063743
 
Post quantum cryptography
Post quantum cryptographyPost quantum cryptography
Post quantum cryptography
 
Chaos Based Direct Public Verifiable Signcryption Scheme
Chaos Based Direct Public Verifiable Signcryption SchemeChaos Based Direct Public Verifiable Signcryption Scheme
Chaos Based Direct Public Verifiable Signcryption Scheme
 
Ofer rivlin BGU - department seminar
Ofer rivlin   BGU - department seminarOfer rivlin   BGU - department seminar
Ofer rivlin BGU - department seminar
 
Techniques of lattice based
Techniques of lattice basedTechniques of lattice based
Techniques of lattice based
 
Quantum Safety in Certified Cryptographic Modules
Quantum Safety in Certified Cryptographic ModulesQuantum Safety in Certified Cryptographic Modules
Quantum Safety in Certified Cryptographic Modules
 
Security Training: #1 What Actually a Security Is?
Security Training: #1 What Actually a Security Is?Security Training: #1 What Actually a Security Is?
Security Training: #1 What Actually a Security Is?
 
us-15-Zadeh-From-False-Positives-To-Actionable-Analysis-Behavioral-Intrusion-...
us-15-Zadeh-From-False-Positives-To-Actionable-Analysis-Behavioral-Intrusion-...us-15-Zadeh-From-False-Positives-To-Actionable-Analysis-Behavioral-Intrusion-...
us-15-Zadeh-From-False-Positives-To-Actionable-Analysis-Behavioral-Intrusion-...
 
Three Party Authenticated Key Distribution using Quantum Cryptography
Three Party Authenticated Key Distribution using Quantum CryptographyThree Party Authenticated Key Distribution using Quantum Cryptography
Three Party Authenticated Key Distribution using Quantum Cryptography
 
Birds of a Feather 2017: 邀請分享 Place of Attribution in Threat Intelligence - F...
Birds of a Feather 2017: 邀請分享 Place of Attribution in Threat Intelligence - F...Birds of a Feather 2017: 邀請分享 Place of Attribution in Threat Intelligence - F...
Birds of a Feather 2017: 邀請分享 Place of Attribution in Threat Intelligence - F...
 
Ccc brochure
Ccc brochureCcc brochure
Ccc brochure
 
DOCS ON NETWORK SECURITY
DOCS ON NETWORK SECURITYDOCS ON NETWORK SECURITY
DOCS ON NETWORK SECURITY
 
Artificial Intelligence and Quantum Cryptography
Artificial Intelligence and Quantum CryptographyArtificial Intelligence and Quantum Cryptography
Artificial Intelligence and Quantum Cryptography
 
Quantum computer in cryptography
Quantum computer in cryptographyQuantum computer in cryptography
Quantum computer in cryptography
 
Study and implementation of DES on FPGA
Study and implementation of DES on FPGAStudy and implementation of DES on FPGA
Study and implementation of DES on FPGA
 
Az24339344
Az24339344Az24339344
Az24339344
 
MITx_Cyber security_Syllabus
MITx_Cyber security_SyllabusMITx_Cyber security_Syllabus
MITx_Cyber security_Syllabus
 
Application of Genetic Algorithm in Cryptanalysis of Mono-alphabetic Substitu...
Application of Genetic Algorithm in Cryptanalysis of Mono-alphabetic Substitu...Application of Genetic Algorithm in Cryptanalysis of Mono-alphabetic Substitu...
Application of Genetic Algorithm in Cryptanalysis of Mono-alphabetic Substitu...
 
Improving privacy in blockchain using homomorphic encryption
Improving privacy in blockchain using homomorphic encryption Improving privacy in blockchain using homomorphic encryption
Improving privacy in blockchain using homomorphic encryption
 

Recently uploaded

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Hyundai Motor Group
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetEnjoy Anytime
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 

Recently uploaded (20)

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 

Paranoid's View of Token Engineering

  • 1. Paranoid’s view of Token Engineering Anish Mohammed,Oct 25th, 2018
  • 3. Technology & Value Evolution @ Simon Wardley Value discovery
  • 4. Cryptoeconomics A formal discipline that studies protocols that govern production distribution and consumption of goods and services in decentralised digital economy. Vlad Zamfir General consensus is its derived from Cryptography and Economics
  • 5. Economics Economics is "a social science concerned chiefly with description and analysis of the production, distribution, and consumption of goods and services". Economics focuses on the behaviour and interactions of economic agents and how economies work Wikipedia
  • 6. Cryptography A Cryptography (from Greek κρυπτός kryptós, "hidden, secret"; and γράφειν graphein, "writing", or -λογία -logia, "study", respectively) is the practice and study of techniques for secure communication in the presence of third parties called adversaries Wikipedia
  • 7. Security Engineering Security engineering is a specialized field of engineering that focuses on the security aspects in the design of systems that need to be able to deal robustly with possible sources of disruption, ranging from natural disasters to malicious acts. It is similar to other systems engineering activities in that its primary motivation is to support the delivery of engineering solutions that satisfy pre-defined functional and user requirements, but it has the added dimension of preventing misuse and malicious behavior. Those constraints and restrictions are often asserted as a security policy. Wikipedia
  • 8. Cryptographic Engineering Cryptographic Engineering is the discipline of using cryptography to solve human problems. Cryptography is typically applied when trying to ensure data confidentiality, to authenticate people or devices, or to verify data integrity in risky environments. Wikipedia
  • 9. Provable Security Provable security refers to any type or level of security that can be proved.Uses mathematical proofs, which are common in cryptography. The capabilities of the attacker are defined by an adversarial model.The aim of the proof is to show that the attacker must solve the underlying hard problem in order to break the security of the modelled system. Wikipedia
  • 10. Provable Security - Contentions Koblitz and Menezes have claimed that provable security results for important cryptographic protocols frequently have fallacies in the proofs; are often interpreted in a misleading manner, giving false assurances; typically rely upon strong assumptions that may turn out to be false; are based on unrealistic models of security; and serve to distract researchers' attention from the need for "old-fashioned" (non-mathematical) testing and analysis.
  • 11. Complexity Classes In computational complexity theory, a complexity class is a set of problems of related resource-based complexity. A typical complexity class has a definition of the form: the set of problems that can be solved by an abstract machine M using O(f(n)) of resource R, where n is the size of the input. Wikipedia
  • 12. Adversary An adversary (rarely opponent, enemy) is a malicious entity whose aim is to prevent the users of the cryptosystem from achieving their goal (primarily privacy, integrity, and availability of data). Wikipedia
  • 13. Adversary - Nation State Actors
  • 14. Tokens - Economic view • Exonumia, items of currency other than coins and paper money • Token money, money that is of limited legal tender • Token coin, a small, flat, round piece of metal or plastic that can sometimes be used instead of money • Voucher or gift card, redeemable for items of value Wikipedia
  • 15. Tokens - Computer Science view Token, an object (in software or in hardware) which represents the right to perform some operation: • Tokenization (data security), the process of substituting a sensitive data element • Token, an object used in Petri net theory • Access token, a system object representing the subject of access control operations • Session token, a unique identifier of an interaction session • Security token or hardware token, authentication token or cryptographic token, a physical device for computer authentication Wikipedia
  • 16. Tokens An Alternate view - AWS Credits
  • 17. AWS Credits Pricing- Historical view
  • 18. Hash functions A hash function is any function that can be used to map data of arbitrary size to data of a fixed size. The values returned by a hash function are called hash values, hash codes, digests, or simply hashes. Wikipedia
  • 19. Hash functions testing - Diehard The diehard tests are a battery of statistical tests for measuring the quality of a random number generator. They were developed by George Marsaglia over several years and first published in 1995 on a CD-ROM of random numbers Wikipedia
  • 20. MD5 - Attacks • 1991 - Rivest Created MD5 as MD4 was broken • 1993 - Den Boer and Bosselaers limited Pseudo collisions • 1996 - Dobbertin a collision of the compression function of MD5 • 2004 - MD5CRK - launched in March • 2004 - August - Xiaoyun Wang, Dengguo Feng, Xuejia Lai, and Hongbo Yu announce full break
  • 21. DES - Cautionary Tale • 1975 - DES published • 1991 - Biham and Shamir rediscover differential cryptanalysis • 1992 - Biham and Shamir full rounds - differential cryptanalysis faster than brute force 2^47 • 1994 - Matsui - Linear Cryptanalysis • 1998 - EFF's DES cracker (Deep Crack) breaks a DES key in 56 hours.
  • 22. Tools At Our Disposal • Proof of Work • Staking • Curation & Prediction Markets • Curve Bonding • Radical Markets • Non Fungible Tokens • Dispute Resolution
  • 23. Bonding Curves • Bonding curves - a mechanism that allows the continual liquidity of a token, with the price changing depending on how much ‘activity’ is conducted.

  • 24. Multi dimensional bonding surfaces • Can tokens have multi dimensional existence ? • Possibility of dimensional arbitrage
  • 25. Thoughts • Don’t reinvent the wheel when you don’t have to • Hierarchy of strength of proofs exist • Simulation is not Verification • Verification has a broad spectrum • Formal Verifications might be useful tool • Acknowledge Existence of Side Channels
  • 26.
  • 27. Anish Mohammed @anishmohammed CTO - Ontici anish@ontici.com
  • 28. u Identity - General approach has been to support pseudonyms u Privacy – Blockchain as a paradigm expects all data to be available u Trust – Question of trust in a decentralised system u Cryptography – choice of algorithms and parameters not necessarily considered traditional. Also the question of QC resistance brought up by some vendors key security challenges
  • 29. Post Quantum Cryptography u Shor’s algorithm u Grover’s algorithm u Current crop of QC resistant algorithms u Challenges to Public key crypto and symmetric primitives
  • 30. Post Quantum Cryptography (contd) u Some attacks have been found on lattice based crypto systems, e.g. NTRU u Newer variants have entered the fray, e.g. LWE
  • 33. Homomorphic Encryption u Homomorphic Encryption – the challenge of processing without knowing what is being asked Function
 f x search
 query Google search Search results x f(x)
  • 34. Homomorphic Encryption u Homomorphic Encryption – Oct 2008 Craig Gentry came up with solution Function
 f x Enc(x) Enc(f(x)) search
 query Search results Google search
  • 36. Zero Knowledge Protocols - properties Completeness -If prover is telling the truth, then they will eventually convince the verifier. Soundness -Prover can only convince verifier if they're actually telling the truth. Zero-knowledgeness -Verifier doesn't learn anything else about prover's solution According to Goldwasser, Micali and Rackoff
  • 37. Zero Knowledge and SNARK SNARK – Succinct Non-interactive Argument of Knowledge
  • 39. Privacy – Half Life of Data and permissions As the volume of data grows exponentially, organizations need to change their view of data from a data centric model, to a user centric model. Data is a moving object and at every point in time there is new data being created and collected. That data has a higher initial value that decreases over time.
  • 40. When Hype meets S-curve
  • 41. STARK u Scalable u Post Quantum Resistant