Bitcoin/Namecoin/*coin: On Bitcoin like protocols and their relation to other IT-Security issues

Size: px
Start display at page:

Download "Bitcoin/Namecoin/*coin: On Bitcoin like protocols and their relation to other IT-Security issues"

Transcription

1 : On Bitcoin like protocols and their relation to other IT-Security issues Aljosha Judmayer

2 SBA Research Area 1 (GRC): Governance, Risk and Compliance P1.1: Risk Management and Analysis P1.2: Secure BP Modeling, Simulation and Verification P1.3: Computer Security Incident Response Team P1.4: Awareness and E-Learning Area 2 (DSP): Data Security and Privacy P2.1: Privacy Enhancing Technologies P2.2: Enterprise Rights Management P2.3: Digital Preservation Area 3 (SCA): Secure Coding and Code Analysis P3.1: Malware Detection and Botnet Economics P3.2: Systems and Software Security P3.3: Digital Forensics Area 4 (HNS): Hardware and Network Security P4.1: Hardware Security and Differential Fault Analysis P4.2: Pervasive Computing P4.3: Network Security of the Future Internet

3 Agenda History of Cryptocurrencies Bitcoin The security concept Bitcoin Generalizing the concept of Bitcoin Namecoin Technical concept of Bitcoin 3

4 History of Cryptocurrencies 4

5 History of Cryptocurrencies Cryptocurrency medium for the exchange of currency units that relies on cryptography to control the decentralized creation and management of such units [1] Concept ecash invented by David Chaum 1983 Blind signatures [2] Mix networks (=> onion routing Tor) [3] [1] [2] Chaum, D. (1983). "Blind signatures for untraceable payments". Advances in Cryptology Proceedings 82 (3) [3] Chaum, D. (1981). "Untraceable electronic mail, return addresses, and digital pseudonyms". Communications of the ACM 24 (2) 5

6 History of Cryptocurrencies Chaum, D. Security without Identification: Transaction Systems to Make Big Brother Obsolete (1985) roots of the Cypherpunk movement achieve privacy and security through proactive use of cryptography [1] named after mailinglist (1993) US crypto (export) law, cryptowars Auxiliary Military Technology [1] 6

7 History of Cryptocurrencies some Cypherpunks... [*] 7

8 History of Cryptocurrencies some Cypherpunks... [*] 8

9 History of Cryptocurrencies some Cypherpunks... [*] 9

10 History of Cryptocurrencies some Cypherpunks... [*] 10

11 History of Cryptocurrencies some Cypherpunks... [*] 11

12 History of Cryptocurrencies... Adam Back, RSA 3 lines of Perl, non-exportable T-shirt #!/bin/perl sp0777i<x+d*lmla^*ln%0]dsxx++lmln/dsm0<j]dsj $/=unpack('h*',$_);$_=`echo 16dio\U$k"SK$/SM$n\EsN0p[lN*1 lk[d2%sa2/d0$^ixp" dc`;s/\w//g;$_=pack('h*',/((..)*)$/) hashcash (1997) proof-of-work (PoW) Hal Finney, PGP reusable PoW (24) 12

13 Bitcoin 13

14 29 by Satoshi Nakamoto (pseudonym) Bitcoin: A Peer-to-Peer Electronic Cash System [1] +source code first user, created genesis block $ strings -n 20.bitcoin/blocks/blk0.dat EThe Times 03/Jan/29 Chancellor on brink of second bailout for banks [1] 14

15 Currency shortcut BTC 1 BTC =~ $347 USD 1 BTC = $ USD (all-time high) Market Capitalization $4,682,667,529 USD [1] 15

16 [1] 16

17 [1] 17

18 How do bitcoins look like? 18

19 How do bitcoins look like? hex dump of genesis block A0 B0 C0 D0 E0 F B A 6C 73 6F 2A F3 8A 76 1E F C 8F 5E 45 6E F1 E A 54 2F 20 6F 62 A6 EA E5 2B 3B 7F F 6E F 1E 6B A3 C8 AB E 64 6E C1 F1 ED 1B 5F FF B 41 B7 DE 12 1D FD C3 49 FF B6 DE 5F 7A 88 FF FF FF 67 5C 49 5C AC 7B 8A FF FF 6D FF 8A D6 F D E 6C FF FD A8 BC 4D B2 32 1D B 6F FF B0 28 3F F7 7A 3A 1D FF 20 6E FE E0 4C BA C7 9F AC FF F EF 0B 2C B8 2B F D 3E AA 7C 1D 2F 6C A6 C ; íýz{.²zç,> gv.a.è.㈚q2:ÿ ª K.^J)«_Iÿÿ ÿÿÿÿm.ÿÿ....ethe Times 03/ Jan/29 Chancel lor on brink of second bailout f or banksÿÿÿÿ..ò. *...CA.gŠý þuh'.gñ q0.\ö (à9. ybàê.aþ Iö¼?Lï8Ä óu.å.á.þ\8m º..W ŠLp+kñ._... 19

20 Security concept of Bitcoin 20

21 {crypto,recap} Cryptographic hash function A hash function takes a message of arbitrary but finite size and outputs a fixed size hash (a.k.a. digest) four properties (1) easy to compute the hash of any given message 21

22 {crypto,recap} Cryptographic hash function (2) infeasible* to generate a message that has a given hash (a.k.a one-way or hard to invert) Pre-image resistance: (Hashcash/Bitcoin rely on this) [*] Not in polynomial time. Not in reach of adversary as long as the security of the message is important 22

23 {crypto,recap} Cryptographic hash function (3) infeasible to modify a message without changing the resulting hash Second pre-image resistance: (Hashcash/Bitcoin rely on this) 23

24 {crypto,recap} Cryptographic hash function (4) infeasible to find two different messages with the same hash Collision resistance: 24

25 Proof-of-work 512 bits input = 2^ bit hash = 2^256 Worst case to invert a hash function, perform attack on pre-image property: 26

26 Proof-of-work 512 bits input 256 bit hash 224 bits 256 bit hash 32 bits 0xFF...FF - 0x 2^224 solutions 27

27 Proof-of-work Partial pre-image attack connect proof-of-work to purpose service string, random value, nonce, is incremented for brute force search to start at random point Hashcash: $ echo -n "1:52:380119:calvin@comics.net:::9B7605E92F0DAE" sha1sum 0756af69e2ffbdb cd71 [1] 30

28 Proof-of-work Partial pre-image attack connect proof-of-work to purpose service string, random value, nonce, is incremented for brute force search to start at random point service string nonce Hashcash: $ echo -n "1:52:380119:calvin@comics.net:::9B7605E92F0DAE" sha1sum 0756af69e2ffbdb cd71 [1] hash 31

29 {crypto,recap} Asymmetric Cryptography every participant has a keypair Bob Alice 32

30 {crypto,recap} Asymmetric Cryptography every participant has a keypair Bob Alice 33

31 {crypto,recap} Asymmetric Cryptography send encrypted message Bob Alice 34

32 {crypto,recap} Asymmetric Cryptography send encrypted message Bob Alice 35

33 {crypto,recap} Asymmetric Cryptography send signed message Bob Alice 36

34 {crypto,recap} Asymmetric Cryptography send signed message Bob Alice 37

35 Bitcoin distinguishes Transactions (tx) transfer currency units can be created by everyone who owns currency units Blocks (b) contain inputs outputs contains number of transactions are created by miners chained together to form a time line synchronize the network 38

36 Block Block header version 39

37 Block Block header version time 40

38 Block Block header version time target nonce 41

39 Block Block header version time target hashtx nonce tx 1 hashtx tx 2 tx 3 42

40 Block chain Block n - 1 Block header hashtx version hashprev version hashprev time target time target hashtx nonce hashtx nonce tx 1 tx 1 tx 2 tx 2 tx 3 Block n + 1 Block n 43

41 Block n - 1 Block header hashtx Mining & Block chain version hashprev version hashprev time target time target hashtx nonce hashtx nonce tx 1 (coinbase) tx 1 (coinbase) tx 2 tx 2 tx 3 Block n + 1 Block n 44

42 Block n - 1 Block header hashtx Mining & Block chain version hashprev version hashprev time target time target hashtx nonce hashtx nonce tx 1 (coinbase) tx 1 (coinbase) tx 2 tx 2 tx 3 Block n + 1 version in_count Block n 25 BTC input 1 out_count output 1 H(pk_A) 45

43 Tansaction, Alice => Bob tx version in_count input 1 out_count output 1 46

44 Tansaction, Alice => Bob Block header version hashprev time target hashtx nonce tx 1 hashtx tx 2 tx tx 3 version in_count input 1 out_count output 1 47

45 Tansaction, Alice => Bob Block header version hashprev time target hashtx nonce tx 1 hashtx tx 2 tx tx 3 version in_count version in_count input 1 H(pk_A) input 1 out_count output 1 input 2 out_count output 1 output 2 48

46 Tansaction, Alice => Bob Block header version hashprev time target hashtx nonce tx 1 hashtx tx 2 tx tx 3 version in_count version in_count input 1 H(pk_A) out_count input 1 input 2 out_count output 1 output 2 output 1 sig(sk_a,tx) pk_a H(pk_B) 49

47 Tansaction, Alice => Bob Block header version hashprev version hashprev time target time target hashtx nonce hashtx nonce hashtx tx 1 tx 1 tx 2 tx 2 tx 3 version in_count version in_count input 1 H(pk_A) out_count input 1 input 2 out_count output 1 output 2 output 1 sig(sk_a,tx) pk_a H(pk_B) 50

48 Mining & Block chain There is no hard limit of 21 Million bitcoins! Only a software limit half all blocks (~all 4 years) Era 1: 50 BTC Era 2: 50/2 = 25 BTC Era 3: 25/2 = 12.5 BTC... Era 33: 0.01 Satoshi Theoretical max int64_t (2^64) ~80 times more 51

49 Mining & Block chain It is possible that a confirmed transaction in a valid block gets reverted! There are block chain forks 52

50 Mining & Block chain It is possible that a confirmed transaction in a valid block gets reverted! There are block chain forks genesis 53

51 Mining & Block chain It is possible that a confirmed transaction in a valid block gets reverted! There are block chain forks genesis 54

52 Mining & Block chain It is possible that a confirmed transaction in a valid block gets reverted! There are block chain forks genesis 55

53 Mining & Block chain It is possible that a confirmed transaction in a valid block gets reverted! There are block chain forks genesis 56

54 Mining & Block chain It is possible that a confirmed transaction in a valid block gets reverted! There are block chain forks genesis 57

55 Mining & Block chain It is possible that a confirmed transaction in a valid block gets reverted! There are block chain forks genesis 58

56 Mining & Block chain It is possible that a confirmed transaction in a valid block gets reverted! There are block chain forks genesis 59

57 Double spending Successful double spending attack Attacker Block 60

58 Double spending Successful double spending attack Attacker Block 61

59 Double spending Successful double spending attack Attacker Block 62

60 Double spending Successful double spending attack Attacker Block 63

61 Double spending Successful double spending attack Attacker Block 64

62 Attack success probability 65

63 Attack success probability 66

64 Attack success probability 67

65 Hashrate distribution 27% [1] 68

66 Cryptocurrency based on... Proof-of-Work (SHA256 hash function) Asymmetric Cryptography (ECDSA) block chain Can we reuse the concept of a block chain in other contexts? 69

67 Generalizing the concept of Bitcoin 70

68 Block chain registration process register a id-value pair in a block chain Hello by Alice 71

69 Block chain registration process register a id-value pair in a block chain what is the problem here? Hello by Alice 72

70 Block chain registration process register a id-value pair in a block chain Attacker Block Hello by Hello by Alice 73

71 Block chain registration process register a id-value pair in a block chain Attacker Block Hello by Hello by Alice 74

72 Block chain registration process register a id-value pair in a block chain e7fa8 by Alice... 75

73 Block chain registration process register a id-value pair in a block chain e7fa8 by Alice... Hello by Alice 76

74 Block chain registration process register a id-value pair in a block chain e7fa8 by Alice... Hello by Alice... 77

75 Block chain registration process register a id-value pair in a block chain Hello by e7fa8 by Alice Hello by Alice 78

76 Namecoin 79

77 Currency shortcut NMC 1 NMC =~ $ 0.91 USD Market capitalization $9,207,844 USD 80

78 [1] 81

79 Register a domain $./namecoind name_new d/coinan [ "fe5d...466", "7df9..."] $./namecoind name_firstupdate d/coinan 7df9... fe5d '{"ip":" ", "map": {"*": {"ip":" "}}}' 82

80 Conclusion Decentralized id-value store DNS HTTPS certs, GPG keys,... Authenticated Twitter Fingerprinting service... Block chain size? ASIC mining? Power consumption? 85

81 EOF Aljosha Judmayer Researcher SBA Research ggmbh Favoritenstraße 16, 1040 Wien ajudmayer@sba-research.org

82 bitcoin101.png Bitcoin_Logo_Horizontal_Dark-48px.png spending-bitcoins.jpg Chaum.jpg cypher.gif pictures of cypherpunks uk-front2.jpg Proof_of_Work_challenge_response.svg Namecoin_Logo.png namecoin-vs-bitcoin.png bitcoin+mining.jpg Namecoin.png dogecoin.png dogecoin_money.png dogecoin_wow.png 87

Bitcoin (Part I) Ken Calvert Keeping Current Seminar 22 January Keeping Current 1

Bitcoin (Part I) Ken Calvert Keeping Current Seminar 22 January Keeping Current 1 Bitcoin (Part I) Ken Calvert Keeping Current Seminar 22 January 2014 2014.01.22 Keeping Current 1 Questions What problem is Bitcoin solving? Where did it come from? How does the system work? What makes

More information

University of Duisburg-Essen Bismarckstr Duisburg Germany HOW BITCOIN WORKS. Matthäus Wander. June 29, 2011

University of Duisburg-Essen Bismarckstr Duisburg Germany HOW BITCOIN WORKS. Matthäus Wander. June 29, 2011 University of Duisburg-Essen Bismarckstr. 90 47057 Duisburg Germany HOW BITCOIN WORKS June 29, 2011 Overview Electronic currency system Decentralized No trusted third party involved Unstructured peer-to-peer

More information

About cryptocurrencies and blockchains part 1. Jyväskylä 17th of April 2018 Henri Heinonen

About cryptocurrencies and blockchains part 1. Jyväskylä 17th of April 2018 Henri Heinonen About cryptocurrencies and blockchains part 1 Jyväskylä 17th of April 2018 Henri Heinonen (henri.t.heinonen@jyu.fi) What is a blockchain? BitTorrent is a famous example of a peer-to-peer network (P2P)

More information

Security Analysis of Bitcoin. Dibyojyoti Mukherjee Jaswant Katragadda Yashwant Gazula

Security Analysis of Bitcoin. Dibyojyoti Mukherjee Jaswant Katragadda Yashwant Gazula Security Analysis of Bitcoin Dibyojyoti Mukherjee Jaswant Katragadda Yashwant Gazula Security Analysis of Bitcoin Introduction How Bitcoin works? Similar peer-to-peer systems Vulnerabilities and solutions

More information

Bitcoin, a decentralized and trustless protocol

Bitcoin, a decentralized and trustless protocol Bitcoin, a decentralized and trustless protocol Thomas Sibut-Pinote Inria Saclay February 12, 2015 Thomas Sibut-Pinote Bitcoin, a decentralized and trustless protocol 1 / 42 Introduction Questions 1 Introduction

More information

ENEE 457: E-Cash and Bitcoin

ENEE 457: E-Cash and Bitcoin ENEE 457: E-Cash and Bitcoin Charalampos (Babis) Papamanthou cpap@umd.edu Money today Any problems? Cash is cumbersome and can be forged Credit card transactions require centralized online bank are not

More information

Introduction to Bitcoin I

Introduction to Bitcoin I Introduction to Bitcoin I P Peterlongo 1 A Tomasi 1 1 University of Trento Department of Mathematics June 10, 2013 Outline 1 Fiat and online payments Functions of Online payments and cost of clearing 2

More information

Smalltalk 3/30/15. The Mathematics of Bitcoin Brian Heinold

Smalltalk 3/30/15. The Mathematics of Bitcoin Brian Heinold Smalltalk 3/30/15 The Mathematics of Bitcoin Brian Heinold What is Bitcoin? Created by Satoshi Nakamoto in 2008 What is Bitcoin? Created by Satoshi Nakamoto in 2008 Digital currency (though not the first)

More information

Applied cryptography

Applied cryptography Applied cryptography Electronic Cash Andreas Hülsing 29 November 2016 1 / 61 Classical Cash - Life Cycle Mint produces money (coins / bank notes) Sent to bank User withdraws money (reduces account balance)

More information

Problem: Equivocation!

Problem: Equivocation! Bitcoin: 10,000 foot view Bitcoin and the Blockchain New bitcoins are created every ~10 min, owned by miner (more on this later) Thereafter, just keep record of transfers e.g., Alice pays Bob 1 BTC COS

More information

Blockchain. CS 240: Computing Systems and Concurrency Lecture 20. Marco Canini

Blockchain. CS 240: Computing Systems and Concurrency Lecture 20. Marco Canini Blockchain CS 240: Computing Systems and Concurrency Lecture 20 Marco Canini Credits: Michael Freedman and Kyle Jamieson developed much of the original material. Bitcoin: 10,000 foot view New bitcoins

More information

Biomedical and Healthcare Applications for Blockchain. Tiffany J. Callahan Computational Bioscience Program Hunter/Kahn Labs

Biomedical and Healthcare Applications for Blockchain. Tiffany J. Callahan Computational Bioscience Program Hunter/Kahn Labs Biomedical and Healthcare Applications for Blockchain Tiffany J. Callahan Computational Bioscience Program Hunter/Kahn Labs Network Analysis Working Group 01.25.2018 Outline Introduction to bitcoin + blockchain

More information

BLOCKCHAIN The foundation behind Bitcoin

BLOCKCHAIN The foundation behind Bitcoin BLOCKCHAIN The foundation behind Bitcoin Sourav Sen Gupta Indian Statistical Institute, Kolkata CRYPTOGRAPHY Backbone of Blockchain Technology Component 1 : Cryptographic Hash Functions HASH FUNCTIONS

More information

Let's build a blockchain!

Let's build a blockchain! I'm Haseeb. That's me. Let's build a blockchain! A mini-cryptocurrency in Ruby I'm Haseeb Qureshi. I'm a software engineer. I'm working at a blockchain company called 21.co. Unless something terrible has

More information

On the security of security extensions for IP-based KNX networks. Aljosha Judmayer

On the security of security extensions for IP-based KNX networks. Aljosha Judmayer On the security of security extensions for IP-based KNX networks Aljosha Judmayer ajudmayer@sba-research.org ajudmayer@auto.tuwien.ac.at 1 SBA Research Area 1 (GRC): Governance, Risk and Compliance P1.1:

More information

Biomedical Security. Cipher Block Chaining and Applications

Biomedical Security. Cipher Block Chaining and Applications 1 Biomedical Security Erwin M. Bakker 2 Cipher Block Chaining and Applications Slides and figures are adapted from: W. Stallings, Cryptography and Network Security 4 th Edition and 7 th Edition 1 3 Block

More information

ICS 421 & ICS 690. Bitcoin & Blockchain. Assoc. Prof. Lipyeow Lim Information & Computer Sciences Department University of Hawai`i at Mānoa

ICS 421 & ICS 690. Bitcoin & Blockchain. Assoc. Prof. Lipyeow Lim Information & Computer Sciences Department University of Hawai`i at Mānoa ICS 421 & ICS 690 Bitcoin & Blockchain Assoc. Prof. Lipyeow Lim Information & Computer Sciences Department University of Hawai`i at Mānoa Accepted by: Overstock.com Expedia.com Newegg.com Tigerdirect.com

More information

Lecture 9. Anonymity in Cryptocurrencies

Lecture 9. Anonymity in Cryptocurrencies Lecture 9 Anonymity in Cryptocurrencies Some say Bitcoin provides anonymity Bitcoin is a secure and anonymous digital currency WikiLeaks donations page Others say it doesn t Bitcoin won't hide you from

More information

Jan Møller Co-founder, CTO Chainalysis

Jan Møller Co-founder, CTO Chainalysis Jan Møller Co-founder, CTO Chainalysis How Does Bitcoin Actually Work? This talk is not about the poli:cal or economical impact of Bitcoin. This talk is not about how to buy, sell, spend, or secure your

More information

Blockchain for Enterprise: A Security & Privacy Perspective through Hyperledger/fabric

Blockchain for Enterprise: A Security & Privacy Perspective through Hyperledger/fabric Blockchain for Enterprise: A Security & Privacy Perspective through Hyperledger/fabric Elli Androulaki Staff member, IBM Research, Zurich Workshop on cryptocurrencies Athens, 06.03.2016 Blockchain systems

More information

CS 4770: Cryptography. CS 6750: Cryptography and Communication Security. Alina Oprea Associate Professor, CCIS Northeastern University

CS 4770: Cryptography. CS 6750: Cryptography and Communication Security. Alina Oprea Associate Professor, CCIS Northeastern University CS 4770: Cryptography CS 6750: Cryptography and Communication Security Alina Oprea Associate Professor, CCIS Northeastern University March 30 2017 Outline Digital currencies Advantages over paper cash

More information

Ensimag - 4MMSR Network Security Student Seminar. Bitcoin: A peer-to-peer Electronic Cash System Satoshi Nakamoto

Ensimag - 4MMSR Network Security Student Seminar. Bitcoin: A peer-to-peer Electronic Cash System Satoshi Nakamoto Ensimag - 4MMSR Network Security Student Seminar Bitcoin: A peer-to-peer Electronic Cash System Satoshi Nakamoto wafa.mbarek@ensimag.fr halima.myesser@ensimag.fr 1 Table of contents: I- Introduction: Classic

More information

Analyzing Bitcoin Security. Philippe Camacho

Analyzing Bitcoin Security. Philippe Camacho Analyzing Bitcoin Security Philippe Camacho philippe.camacho@dreamlab.net Universidad Católica, Santiago de Chile 15 of June 2016 Bitcoin matters Map Blockchain Design Known Attacks Security Models Double

More information

Proof-of-Work & Bitcoin

Proof-of-Work & Bitcoin CS 220: Introduction to Parallel Computing Proof-of-Work & Bitcoin Lecture 19 Bitcoin: Mining for Heat https://qz.com/1117836/bitcoin-mining-heatshomes-for-free-in-siberia/ 4/25/18 CS 220: Parallel Computing

More information

SKBI Cryptocurrency Technical Seminar Series Seminar 1: Basics: Cryptography and Transactions

SKBI Cryptocurrency Technical Seminar Series Seminar 1: Basics: Cryptography and Transactions SKBI Cryptocurrency Technical Seminar Series Seminar 1: Basics: Cryptography and Transactions Zhiguo Wan Sim Kee Boon Institute for Financial Economics Singapore Management University Schedule of bitcoin

More information

Introduc)on to Bitcoin

Introduc)on to Bitcoin Introduc)on to Bitcoin CONTENTS What is Bitcoin Who created it? Who prints it? How does Bitcoin work? The characteris5cs of Bitcoin WHAT IS BITCOIN Bitcoin is a form of digital currency, created and held

More information

Computer Security. 14. Blockchain & Bitcoin. Paul Krzyzanowski. Rutgers University. Spring 2019

Computer Security. 14. Blockchain & Bitcoin. Paul Krzyzanowski. Rutgers University. Spring 2019 Computer Security 14. Blockchain & Bitcoin Paul Krzyzanowski Rutgers University Spring 2019 April 15, 2019 CS 419 2019 Paul Krzyzanowski 1 Bitcoin & Blockchain Bitcoin cryptocurrency system Introduced

More information

Bitcoin and Blockchain

Bitcoin and Blockchain Bitcoin and Blockchain COS 418: Distributed Systems Lecture 18 Zhenyu Song [Credit: Selected content adapted from Michael Freedman. Slides refined by Chris Hodsdon and Theano Stavrinos] Why Bitcoin? All

More information

Biomedical Security. Some Security News 10/5/2018. Erwin M. Bakker

Biomedical Security. Some Security News 10/5/2018. Erwin M. Bakker Biomedical Security Erwin M. Bakker Some Security News October 03, 2018 - Hackers attacking healthcare through remote access systems and disrupting operations is the number one patient safety risk, according

More information

Digital Currencies: Algorithms and Protocols

Digital Currencies: Algorithms and Protocols Digital Currencies: Algorithms and Protocols Élise Alfieri , Emmanuel Fleury LaBRI, Université de Bordeaux, France March 7, 2017 Alfieri, Fleury

More information

Information Security. message M. fingerprint f = H(M) one-way hash. 4/19/2006 Information Security 1

Information Security. message M. fingerprint f = H(M) one-way hash. 4/19/2006 Information Security 1 Information Security message M one-way hash fingerprint f = H(M) 4/19/2006 Information Security 1 Outline and Reading Digital signatures Definition RSA signature and verification One-way hash functions

More information

Blockchains & Cryptocurrencies

Blockchains & Cryptocurrencies 1 Blockchains & Cryptocurrencies A Technical Introduction Lorenz Breidenbach ETH Zürich Cornell Tech The Initiative for CryptoCurrencies & Contracts (IC3) 2 Cryptocurrency Mania Market cap as of yesterday:

More information

Bitcoin. CS6450: Distributed Systems Lecture 20 Ryan Stutsman

Bitcoin. CS6450: Distributed Systems Lecture 20 Ryan Stutsman Bitcoin CS6450: Distributed Systems Lecture 20 Ryan Stutsman Material taken/derived from Princeton COS-418 materials created by Michael Freedman and Kyle Jamieson at Princeton University. Licensed for

More information

UNIT - IV Cryptographic Hash Function 31.1

UNIT - IV Cryptographic Hash Function 31.1 UNIT - IV Cryptographic Hash Function 31.1 31-11 SECURITY SERVICES Network security can provide five services. Four of these services are related to the message exchanged using the network. The fifth service

More information

SpaceMint Overcoming Bitcoin s waste of energy

SpaceMint Overcoming Bitcoin s waste of energy Bitcoin Overcoming Bitcoin s waste of energy Georg Fuchsbauer joint work with S Park, A Kwon, K Pietrzak, J Alwen and P Gaži Digital currency Decentralized (no bank issuing coins) Pseudonymous Controled

More information

BITCOIN PROTOCOL & CONSENSUS: A HIGH LEVEL OVERVIEW

BITCOIN PROTOCOL & CONSENSUS: A HIGH LEVEL OVERVIEW BITCOIN PROTOCOL & CONSENSUS: A HIGH LEVEL OVERVIEW Rustie Lin Wang Move the area1 over the image a little inside and then right click, replace image to change the background. (and delete this box while

More information

Software Security. Final Exam Preparation. Be aware, there is no guarantee for the correctness of the answers!

Software Security. Final Exam Preparation. Be aware, there is no guarantee for the correctness of the answers! Software Security Final Exam Preparation Note: This document contains the questions from the final exam on 09.06.2017. Additionally potential questions about Combinatorial Web Security Testing and Decentralized

More information

Anonymity and Privacy

Anonymity and Privacy Computer Security Spring 2008 Anonymity and Privacy Aggelos Kiayias University of Connecticut Anonymity in networks Anonymous Credentials Anonymous Payments Anonymous E-mail and Routing E-voting Group,

More information

A simple approach of Peer-to-Peer E-Cash system

A simple approach of Peer-to-Peer E-Cash system A simple approach of Peer-to-Peer E-Cash system Mr. Dharamvir, Mr. Rabinarayan Panda Asst. Professor, Dept. of MCA, The Oxford College of Engineering Bangalore, India. Abstract-With the popularization

More information

Key Security Issues for implementation of Digital Currency, including ITU-T SG17 activities

Key Security Issues for implementation of Digital Currency, including ITU-T SG17 activities ITU Workshop on FG DFC Workshop on Standards for Digital Fiat Currency (DFC) () Key Issues for implementation of Digital Currency, including ITU-T SG17 activities Heung Youl Youm, PhD. Chairman of ITU-T

More information

Bitcoin (and why it uses SO much energy)

Bitcoin (and why it uses SO much energy) Bitcoin (and why it uses SO much energy) David Malone Hamilton Institute / Dept Maths&Stats Maynooth University. 2018-11-08 Bitcoin Background Bitcoin is a cryptocurrency that started around 2008 2009.

More information

P2P BitCoin: Technical details

P2P BitCoin: Technical details ELT-53206 Peer-to-Peer Networks P2P BitCoin: Technical details Mathieu Devos Tampere University of Technology Department of Electronics & Communications Engineering mathieu.devos@tut.fi TG406 2 Outline

More information

The Design of an Anonymous and a Fair Novel E-cash System

The Design of an Anonymous and a Fair Novel E-cash System International Journal of Information & Computation Technology. ISSN 0974-2239 Volume 2, Number 2 (2012), pp. 103-109 International Research Publications House http://www. ripublication.com The Design of

More information

Hyperledger fabric: towards scalable blockchain for business

Hyperledger fabric: towards scalable blockchain for business Marko Vukolić, IBM Research - Zurich Hyperledger fabric: towards scalable blockchain for business Trust in Digital Life The Hague, Netherlands, June 17 2016 Blockchain shared, replicated, ledger Consensus

More information

Blockchain Bitcoin & Ethereum

Blockchain Bitcoin & Ethereum Blockchain Bitcoin & Ethereum Pascal.Urien@Telecom-ParisTech.fr Pascal Urien 1 "Bitcoin: A Peer-to-Peer Electronic Cash System." Satoshi Nakamoto In this paper, we propose a solution to the double-spending

More information

Bitcoin. Arni Par ov. December 17, 2013

Bitcoin. Arni Par ov. December 17, 2013 Bitcoin Arni Par ov December 17, 2013 Abstract Bitcoin is a distributed, peer-to-peer cryptocurrency that functions without any central authority and in recent years has gained large popularity. This paper

More information

Chapter 13. Digital Cash. Information Security/System Security p. 570/626

Chapter 13. Digital Cash. Information Security/System Security p. 570/626 Chapter 13 Digital Cash Information Security/System Security p. 570/626 Introduction While cash is used in illegal activities such as bribing money laundering tax evasion it also protects privacy: not

More information

Key concepts of blockchain

Key concepts of blockchain Advisory A brief history of blockchains 2008 The mysterious Satoshi Nakamoto publishes his Bitcoin white paper 2014 2017 Nov. 23 rd Ethereum crowd sale Number of crypto tokens: 1.172 BTC $8.216 The first

More information

EECS 498 Introduction to Distributed Systems

EECS 498 Introduction to Distributed Systems EECS 498 Introduction to Distributed Systems Fall 2017 Harsha V. Madhyastha Today Bitcoin: A peer-to-peer digital currency Spark: In-memory big data processing December 4, 2017 EECS 498 Lecture 21 2 December

More information

CS 4770: Cryptography. CS 6750: Cryptography and Communication Security. Alina Oprea Associate Professor, CCIS Northeastern University

CS 4770: Cryptography. CS 6750: Cryptography and Communication Security. Alina Oprea Associate Professor, CCIS Northeastern University CS 4770: Cryptography CS 6750: Cryptography and Communication Security Alina Oprea Associate Professor, CCIS Northeastern University April 9 2018 Schedule HW 4 Due on Thu 04/12 Programming project 3 Due

More information

SOME OF THE PROBLEMS IN BLOCKCHAIN TODAY

SOME OF THE PROBLEMS IN BLOCKCHAIN TODAY BLOCKCHAIN EVOLVED THE PROBLEM SOME OF THE PROBLEMS IN BLOCKCHAIN TODAY An overall lack of governance is one of the most challenging facets of current blockchain ecosystems Controversy regarding scalability

More information

DEV. Deviant Coin, Innovative Anonymity. A PoS/Masternode cr yptocurrency developed with POS proof of stake.

DEV. Deviant Coin, Innovative Anonymity. A PoS/Masternode cr yptocurrency developed with POS proof of stake. DEV Deviant Coin, Innovative Anonymity A PoS/Masternode cr yptocurrency developed with POS proof of stake. CONTENTS 03 Overview 06 Pre-mine phase 07 Privacy 08 Basic parameters 09 Proof-of-stake The benefits

More information

Bitcoin Mining. A high-level technical introduction. Konstantinos Karasavvas

Bitcoin Mining. A high-level technical introduction. Konstantinos Karasavvas Bitcoin Mining A high-level technical introduction Konstantinos Karasavvas Outline PoW / Hashcash Transaction propagation Block mining Block propagation Mining Profitability Proof of Work From wikipedia:

More information

Fruitchains: A Fair Blockchain?

Fruitchains: A Fair Blockchain? Fruitchains: A Fair Blockchain? Kyrylo Voronchenko Supervised by Michal Zajac June 4, 2018 Abstract This report is an overview of the paper [PS16] in which authors introduced a new protocol called FruitChain

More information

CONSENSUS PROTOCOLS & BLOCKCHAINS. Techruption Lecture March 16 th, 2017 Maarten Everts (TNO & University of Twente)

CONSENSUS PROTOCOLS & BLOCKCHAINS. Techruption Lecture March 16 th, 2017 Maarten Everts (TNO & University of Twente) CONSENSUS PROTOCOLS & BLOCKCHAINS Techruption Lecture March 16 th, 2017 Maarten Everts (TNO & University of Twente) 2 Consensus protocols & blockchain 3 Consensus protocols & blockchain 4 Consensus protocols

More information

DAVID ANDREWS, FOUNDER RYATTA BLOCKCHAIN FOUNDATIONS

DAVID ANDREWS, FOUNDER RYATTA BLOCKCHAIN FOUNDATIONS DAVID ANDREWS, FOUNDER RYATTA GROUP, CRYPTOGRAPHY IS THE STUDY OF TECHNIQUES FOR SECURE COMMUNICATION cryptography is defined as the practice and study of techniques for secure communication in the early

More information

A Review on Blockchain Application for Decentralized Decision of Ownership of IoT Devices

A Review on Blockchain Application for Decentralized Decision of Ownership of IoT Devices Advances in Computational Sciences and Technology ISSN 0973-6107 Volume 10, Number 8 (2017) pp. 2449-2456 Research India Publications http://www.ripublication.com A Review on Blockchain Application for

More information

0x1A Great Papers in Computer Security

0x1A Great Papers in Computer Security CS 380S 0x1A Great Papers in Computer Security Vitaly Shmatikov http://www.cs.utexas.edu/~shmat/courses/cs380s/ Privacy on Public Networks Internet is designed as a public network Wi-Fi access points,

More information

Security: Focus of Control

Security: Focus of Control Security: Focus of Control Three approaches for protection against security threats a) Protection against invalid operations b) Protection against unauthorized invocations c) Protection against unauthorized

More information

Darkcoin: Peer to Peer Crypto Currency with Anonymous Blockchain Transactions and an Improved Proof of Work System

Darkcoin: Peer to Peer Crypto Currency with Anonymous Blockchain Transactions and an Improved Proof of Work System Darkcoin: Peer to Peer Crypto Currency with Anonymous Blockchain Transactions and an Improved Proof of Work System Introduction Evan Duffield, Kyle Hagan (evan@darkcoin.io, kyle@darkcoin.io) 18 March 2014

More information

Consensus & Blockchain

Consensus & Blockchain Consensus & Blockchain S P Suresh Chennai Mathematical Institute Formal Methods Update Meeting IIT Mandi July 17, 2017 The Bitcoin revolution is upon us What is Bitcoin? Bitcoin: an exciting new currency

More information

ILCOIN White Paper. In ILCOIN We Trust ILCOIN

ILCOIN White Paper. In ILCOIN We Trust ILCOIN ILCOIN White Paper In ILCOIN We Trust ILCOIN ILCOIN Development Team September 2017 TABLE OF CONTENTS WHAT IS ILCOIN WE NEED THINGS THAT DRAW ON THE REVOLUTION OF BITCOIN, BUT BITCOIN ALONE IS NOT GOOD

More information

BYZANTINE CONSENSUS THROUGH BITCOIN S PROOF- OF-WORK

BYZANTINE CONSENSUS THROUGH BITCOIN S PROOF- OF-WORK Informatiemanagement: BYZANTINE CONSENSUS THROUGH BITCOIN S PROOF- OF-WORK The aim of this paper is to elucidate how Byzantine consensus is achieved through Bitcoin s novel proof-of-work system without

More information

Bitcoin, Security for Cloud & Big Data

Bitcoin, Security for Cloud & Big Data Bitcoin, Security for Cloud & Big Data CS 161: Computer Security Prof. David Wagner April 18, 2013 Bitcoin Public, distributed, peer-to-peer, hash-chained audit log of all transactions ( block chain ).

More information

Lecture 6. Mechanics of Bitcoin

Lecture 6. Mechanics of Bitcoin Lecture 6 Mechanics of Bitcoin Bitcoin transactions time An account-based ledger (not Bitcoin) Create 25 coins and credit to Alice ASSERTED BY MINERS SIMPLIFICATION: only one transaction per block time

More information

Ergo platform. Dmitry Meshkov

Ergo platform. Dmitry Meshkov Ergo platform Dmitry Meshkov Prehistory Motivation Theory Practice Provably secure 1000 currencies New features Ad-hoc solutions Impractical Security issues Motivation Theory Provably secure New features

More information

Exceptional Access Protocols. Alex Tong

Exceptional Access Protocols. Alex Tong Exceptional Access Protocols Alex Tong Motivation Crypto Wars FBI vs. Apple What is the job of engineers? Requirements Government Decryption without notice to the user Ubiquitous international capability

More information

Blockchain as cryptanalytic tool

Blockchain as cryptanalytic tool Blockchain as cryptanalytic tool Extended Abstract Manfred Lochter Bundesamt für Sicherheit in der Informationstechnik (BSI), Germany Abstract One approach for blockchain based applications to provide

More information

Introduction to Cryptoeconomics

Introduction to Cryptoeconomics Introduction to Cryptoeconomics What is cryptoeconomics? Cryptoeconomics is about... Building systems that have certain desired properties Use cryptography to prove properties about messages that happened

More information

EVALUATION OF PROOF OF WORK (POW) BLOCKCHAINS SECURITY NETWORK ON SELFISH MINING

EVALUATION OF PROOF OF WORK (POW) BLOCKCHAINS SECURITY NETWORK ON SELFISH MINING EVALUATION OF PROOF OF WORK (POW) BLOCKCHAINS SECURITY NETWORK ON SELFISH MINING I Gusti Ayu Kusdiah Gemeliarana Department of Electrical Engineering University of Indonesia Depok, Indonesia i.gusti79@ui.ac.id

More information

A Lightweight Blockchain Consensus Protocol

A Lightweight Blockchain Consensus Protocol A Lightweight Blockchain Consensus Protocol Keir Finlow-Bates keir@chainfrog.com Abstract A lightweight yet deterministic and objective consensus protocol would allow blockchain systems to be maintained

More information

Blockchain, Cryptocurrency, Smart Contracts and Initial Coin Offerings: A Technical Perspective

Blockchain, Cryptocurrency, Smart Contracts and Initial Coin Offerings: A Technical Perspective SESSION ID: LAB3-R09 Blockchain, Cryptocurrency, Smart Contracts and Initial Coin Offerings: A Technical Perspective Tom Plunkett Consulting Solutions Director Oracle Captain Brittany Snelgrove United

More information

Stealth Address. and Key Management Techniques in Blockchain Systems. Nicolas T. Courtois 1 and Rebekah Mercer 1,2. University College London, UK

Stealth Address. and Key Management Techniques in Blockchain Systems. Nicolas T. Courtois 1 and Rebekah Mercer 1,2. University College London, UK Stealth Address and Key Management Techniques in Blockchain Systems Nicolas T. Courtois 1 and Rebekah Mercer 1,2 1 University College London, UK 2 Clearmatics Ltd, London, UK Topics Bitcoin vs. Monero

More information

BITCOIN MECHANICS AND OPTIMIZATIONS. Max Fang Philip Hayes

BITCOIN MECHANICS AND OPTIMIZATIONS. Max Fang Philip Hayes 1 BITCOIN MECHNICS ND OPTIMIZTIONS Max Fang Philip Hayes 1 Cryptocurrency Mining: Proof-of-Work Consensus Nadir khtar LECTURE OUTLINE 2 1 Intro and Terminology 2 Bitcoin and Consensus 3 Bitcoin Concepts

More information

Public Key Infrastructures

Public Key Infrastructures Public Key Infrastructures Certcoin Cryptography and Computer Algebra Prof. Johannes Buchmann Dr. Johannes Braun Background Blockchain Distributed database, consisting of a list of blocks Decentralized

More information

ECC: Peer-to-Peer Electronic Cash with Trustless Network Services

ECC: Peer-to-Peer Electronic Cash with Trustless Network Services ECC: Peer-to-Peer Electronic Cash with Trustless Network Services Greg Griffith October 2017 (griffith@cryptounited.io) https://www.ecc.network ECC: Peer-to-Peer Electronic Cash with Trustless Network

More information

GRADUBIQUE: AN ACADEMIC TRANSCRIPT DATABASE USING BLOCKCHAIN ARCHITECTURE

GRADUBIQUE: AN ACADEMIC TRANSCRIPT DATABASE USING BLOCKCHAIN ARCHITECTURE San Jose State University SJSU ScholarWorks Master's Projects Master's Theses and Graduate Research Fall 12-14-2018 GRADUBIQUE: AN ACADEMIC TRANSCRIPT DATABASE USING BLOCKCHAIN ARCHITECTURE Thinh Nguyen

More information

International Journal of Computer Engineering and Applications, Volume XIII, Issue II, Feb. 19, ISSN

International Journal of Computer Engineering and Applications, Volume XIII, Issue II, Feb. 19,   ISSN BLOCK-CHAIN: SURVEY ON PRIVACY, SECURITY AND CHALLENGES Monalisha Sinha ABSTRACT: Department of computer science & engineering Birla institute of technology Ranchi, India Blockchain has gained wide attention

More information

Cryptography. some history. modern secret key cryptography. public key cryptography. cryptography in practice

Cryptography. some history. modern secret key cryptography. public key cryptography. cryptography in practice Cryptography some history Caesar cipher, rot13 substitution ciphers, etc. Enigma (Turing) modern secret key cryptography DES, AES public key cryptography RSA, digital signatures cryptography in practice

More information

Privacy Enhancing Technologies CSE 701 Fall 2017

Privacy Enhancing Technologies CSE 701 Fall 2017 Privacy Enhancing Technologies Lecture 2: Anonymity Applications Department of Computer Science and Engineering University at Buffalo 1 Lecture Outline Anonymous communication mixes, anonymizing proxies,

More information

Payment systems. Tuomas Aura CSE-C3400 Information security. Aalto University, autumn 2014

Payment systems. Tuomas Aura CSE-C3400 Information security. Aalto University, autumn 2014 Payment systems Tuomas Aura CSE-C3400 Information security Aalto University, autumn 2014 1. Card payments Outline 2. Anonymous payments and BitCoin 2 CARD PAYMENT 3 Bank cards Credit or debit card Card

More information

Using Cryptography CMSC 414. October 16, 2017

Using Cryptography CMSC 414. October 16, 2017 Using Cryptography CMSC 414 October 16, 2017 Digital Certificates Recall: K pub = (n, e) This is an RSA public key How do we know who this is for? Need to bind identity to a public key We can do this using

More information

Ethereum. Campbell R. Harvey* Duke University and NBER. Ashwin Ramachandran Duke University. Brent Xu ConsenSys. Innovation and Cryptoventures

Ethereum. Campbell R. Harvey* Duke University and NBER. Ashwin Ramachandran Duke University. Brent Xu ConsenSys. Innovation and Cryptoventures Innovation and Cryptoventures Ethereum Campbell R. Harvey* Duke University and NBER Ashwin Ramachandran Duke University Brent Xu ConsenSys February 12, 2018 1 2 Overview Ethereum Basics Under the hood

More information

Graph-based forensic investigation of Bitcoin transactions

Graph-based forensic investigation of Bitcoin transactions Graduate Theses and Dissertations Graduate College 2014 Graph-based forensic investigation of Bitcoin transactions Chen Zhao Iowa State University Follow this and additional works at: http://lib.dr.iastate.edu/etd

More information

Blockchain (a.k.a. the slowest, most fascinating database you ll ever see)

Blockchain (a.k.a. the slowest, most fascinating database you ll ever see) Blockchain (a.k.a. the slowest, most fascinating database you ll ever see) GOTO Amsterdam 13 June, 2017 Stefan Tilkov, @stilkov I don t know Blockchain and so can you 1. Bitcoin > Practical application

More information

CISC859: Topics in Advanced Networks & Distributed Computing: Network & Distributed System Security. A Brief Overview of Security & Privacy Issues

CISC859: Topics in Advanced Networks & Distributed Computing: Network & Distributed System Security. A Brief Overview of Security & Privacy Issues CISC859: Topics in Advanced Networks & Distributed Computing: Network & Distributed System Security A Brief Overview of Security & Privacy Issues 1 Topics to Be Covered Cloud computing RFID systems Bitcoin

More information

How Bitcoin achieves Decentralization. How Bitcoin achieves Decentralization

How Bitcoin achieves Decentralization. How Bitcoin achieves Decentralization Centralization vs. Decentralization Distributed Consensus Consensus without Identity, using a Block Chain Incentives and Proof of Work Putting it all together Centralization vs. Decentralization Distributed

More information

Introduction and Overview. Why CSCI 454/554?

Introduction and Overview. Why CSCI 454/554? Introduction and Overview CSCI 454/554 Why CSCI 454/554? Get Credits and Graduate Security is important More job opportunities More research funds 1 Workload Five homework assignments Two exams (open book

More information

CS 470 Spring Security. Mike Lam, Professor. a.k.a. Why on earth do Alice and Bob need to talk so much?!? Content taken from the following:

CS 470 Spring Security. Mike Lam, Professor. a.k.a. Why on earth do Alice and Bob need to talk so much?!? Content taken from the following: 50fb6be35f4c3105 9d4ed08fb86d8887 b746c452a9c9443b 15b22f450c76218e CS 470 Spring 2017 9df7031cdbff9d10 b700a92855f16328 5b757e66d2131841 62fedd7d9131e42e Mike Lam, Professor Security a.k.a. Why on earth

More information

Distributed Algorithms Bitcoin

Distributed Algorithms Bitcoin Distributed Algorithms Bitcoin Alberto Montresor Università di Trento 2018/12/18 Acknowledgment: Joseph Bonneau, Ed Felten, Arvind Narayanan This work is licensed under a Creative Commons Attribution-ShareAlike

More information

Cryptography and Cryptocurrencies. Intro to Cryptography and Cryptocurrencies

Cryptography and Cryptocurrencies. Intro to Cryptography and Cryptocurrencies Intro to Cryptographic Hash Functions Hash Pointers and Data Structures Block Chains Merkle Trees Digital Signatures Public Keys and Identities Let s design us some Digital Cash! Intro to Cryptographic

More information

Blockchain Based E-Voting Recording System Design

Blockchain Based E-Voting Recording System Design Blockchain Based E-Voting Recording System Design Rifa Hanifatunnisa (Author) School of Electrical Engineering and Informatics Bandung Institute of Technology Bandung, West Java, Indonesia rifahani@students.itb.ac.id

More information

TOPPERCASH TOPPERCASH WHITEPAPER REFORM THE BEST OF BLOCKCHAIN

TOPPERCASH TOPPERCASH WHITEPAPER REFORM THE BEST OF BLOCKCHAIN TOPPERCASH TOPPERCASH WHITEPAPER REFORM THE BEST OF BLOCKCHAIN ABSTRACT A PEER-TO-PEER CRYPTO-CURRENCY DESIGN DERIVED FROM SATOSHI NAKAMOTO S BITCOIN. PROOF- OF-STAKE REPLACES PROOF-OF- WORK TO PROVIDE

More information

Bruno Pujos. January 14, 2015

Bruno Pujos. January 14, 2015 calculator calculator January 14, 2015 Introduction calculator is a virtual crypto currency introduced in 2008-2009. Based on the bruteforce of a. For fast computation, use of /ASIC. : Field-Programmable

More information

Protocols for Anonymous Communication

Protocols for Anonymous Communication 18734: Foundations of Privacy Protocols for Anonymous Communication Anupam Datta CMU Fall 2016 Privacy on Public Networks } Internet is designed as a public network } Machines on your LAN may see your

More information

A world-wide network of interconnected objects uniquely addressable, based on standard communication protocols

A world-wide network of interconnected objects uniquely addressable, based on standard communication protocols Things having identities and virtual personalities operating in smart spaces using intelligent interfaces to connect and communicate within social, environmental, and user contexts A world-wide network

More information

Blockchain & Distributed Internet Infrastructure

Blockchain & Distributed Internet Infrastructure Blockchain & Distributed Internet Infrastructure Dirk Kutscher NEC Laboratories Europe 1 Purpose of this Meeting Discuss blockchain-based and Distributed Internet Infrastructure concepts, state of the

More information

Hacking Deterministic Bitcoin Addresses. Michael McKinnon

Hacking Deterministic Bitcoin Addresses. Michael McKinnon Hacking Deterministic Bitcoin Addresses Michael McKinnon - @bigmac This talk is ONLY about Bitcoin Bro, wanna buy some #sheepcoin? 2 I won t be outing Satoshi #whoissatoshi 3 I m not a Lawyer, This is

More information

REM: Resource Efficient Mining for Blockchains

REM: Resource Efficient Mining for Blockchains REM: Resource Efficient Mining for Blockchains Fan Zhang, Ittay Eyal, Robert Escriva, Ari Juels, Robbert van Renesse Vancouver, Canada 13 September 2017 USENIX Security 2017 1 The Cryptocurrency Vision

More information

A survey of the peer to peer based DNS system

A survey of the peer to peer based DNS system A survey of the peer to peer based DNS system Who am I? Data Analyst @ Dyn Keeper of dogs Lover of Internet Hater of Ne er do wells The Year of The Crypto Currency I swear I m not making this up Proof

More information