Bitcoin/Namecoin/*coin: On Bitcoin like protocols and their relation to other IT-Security issues
|
|
- Roy Young
- 5 years ago
- Views:
Transcription
1 : On Bitcoin like protocols and their relation to other IT-Security issues Aljosha Judmayer
2 SBA Research Area 1 (GRC): Governance, Risk and Compliance P1.1: Risk Management and Analysis P1.2: Secure BP Modeling, Simulation and Verification P1.3: Computer Security Incident Response Team P1.4: Awareness and E-Learning Area 2 (DSP): Data Security and Privacy P2.1: Privacy Enhancing Technologies P2.2: Enterprise Rights Management P2.3: Digital Preservation Area 3 (SCA): Secure Coding and Code Analysis P3.1: Malware Detection and Botnet Economics P3.2: Systems and Software Security P3.3: Digital Forensics Area 4 (HNS): Hardware and Network Security P4.1: Hardware Security and Differential Fault Analysis P4.2: Pervasive Computing P4.3: Network Security of the Future Internet
3 Agenda History of Cryptocurrencies Bitcoin The security concept Bitcoin Generalizing the concept of Bitcoin Namecoin Technical concept of Bitcoin 3
4 History of Cryptocurrencies 4
5 History of Cryptocurrencies Cryptocurrency medium for the exchange of currency units that relies on cryptography to control the decentralized creation and management of such units [1] Concept ecash invented by David Chaum 1983 Blind signatures [2] Mix networks (=> onion routing Tor) [3] [1] [2] Chaum, D. (1983). "Blind signatures for untraceable payments". Advances in Cryptology Proceedings 82 (3) [3] Chaum, D. (1981). "Untraceable electronic mail, return addresses, and digital pseudonyms". Communications of the ACM 24 (2) 5
6 History of Cryptocurrencies Chaum, D. Security without Identification: Transaction Systems to Make Big Brother Obsolete (1985) roots of the Cypherpunk movement achieve privacy and security through proactive use of cryptography [1] named after mailinglist (1993) US crypto (export) law, cryptowars Auxiliary Military Technology [1] 6
7 History of Cryptocurrencies some Cypherpunks... [*] 7
8 History of Cryptocurrencies some Cypherpunks... [*] 8
9 History of Cryptocurrencies some Cypherpunks... [*] 9
10 History of Cryptocurrencies some Cypherpunks... [*] 10
11 History of Cryptocurrencies some Cypherpunks... [*] 11
12 History of Cryptocurrencies... Adam Back, RSA 3 lines of Perl, non-exportable T-shirt #!/bin/perl sp0777i<x+d*lmla^*ln%0]dsxx++lmln/dsm0<j]dsj $/=unpack('h*',$_);$_=`echo 16dio\U$k"SK$/SM$n\EsN0p[lN*1 lk[d2%sa2/d0$^ixp" dc`;s/\w//g;$_=pack('h*',/((..)*)$/) hashcash (1997) proof-of-work (PoW) Hal Finney, PGP reusable PoW (24) 12
13 Bitcoin 13
14 29 by Satoshi Nakamoto (pseudonym) Bitcoin: A Peer-to-Peer Electronic Cash System [1] +source code first user, created genesis block $ strings -n 20.bitcoin/blocks/blk0.dat EThe Times 03/Jan/29 Chancellor on brink of second bailout for banks [1] 14
15 Currency shortcut BTC 1 BTC =~ $347 USD 1 BTC = $ USD (all-time high) Market Capitalization $4,682,667,529 USD [1] 15
16 [1] 16
17 [1] 17
18 How do bitcoins look like? 18
19 How do bitcoins look like? hex dump of genesis block A0 B0 C0 D0 E0 F B A 6C 73 6F 2A F3 8A 76 1E F C 8F 5E 45 6E F1 E A 54 2F 20 6F 62 A6 EA E5 2B 3B 7F F 6E F 1E 6B A3 C8 AB E 64 6E C1 F1 ED 1B 5F FF B 41 B7 DE 12 1D FD C3 49 FF B6 DE 5F 7A 88 FF FF FF 67 5C 49 5C AC 7B 8A FF FF 6D FF 8A D6 F D E 6C FF FD A8 BC 4D B2 32 1D B 6F FF B0 28 3F F7 7A 3A 1D FF 20 6E FE E0 4C BA C7 9F AC FF F EF 0B 2C B8 2B F D 3E AA 7C 1D 2F 6C A6 C ; íýz{.²zç,> gv.a.è.㈚q2:ÿ ª K.^J)«_Iÿÿ ÿÿÿÿm.ÿÿ....ethe Times 03/ Jan/29 Chancel lor on brink of second bailout f or banksÿÿÿÿ..ò. *...CA.gŠý þuh'.gñ q0.\ö (à9. ybàê.aþ Iö¼?Lï8Ä óu.å.á.þ\8m º..W ŠLp+kñ._... 19
20 Security concept of Bitcoin 20
21 {crypto,recap} Cryptographic hash function A hash function takes a message of arbitrary but finite size and outputs a fixed size hash (a.k.a. digest) four properties (1) easy to compute the hash of any given message 21
22 {crypto,recap} Cryptographic hash function (2) infeasible* to generate a message that has a given hash (a.k.a one-way or hard to invert) Pre-image resistance: (Hashcash/Bitcoin rely on this) [*] Not in polynomial time. Not in reach of adversary as long as the security of the message is important 22
23 {crypto,recap} Cryptographic hash function (3) infeasible to modify a message without changing the resulting hash Second pre-image resistance: (Hashcash/Bitcoin rely on this) 23
24 {crypto,recap} Cryptographic hash function (4) infeasible to find two different messages with the same hash Collision resistance: 24
25 Proof-of-work 512 bits input = 2^ bit hash = 2^256 Worst case to invert a hash function, perform attack on pre-image property: 26
26 Proof-of-work 512 bits input 256 bit hash 224 bits 256 bit hash 32 bits 0xFF...FF - 0x 2^224 solutions 27
27 Proof-of-work Partial pre-image attack connect proof-of-work to purpose service string, random value, nonce, is incremented for brute force search to start at random point Hashcash: $ echo -n "1:52:380119:calvin@comics.net:::9B7605E92F0DAE" sha1sum 0756af69e2ffbdb cd71 [1] 30
28 Proof-of-work Partial pre-image attack connect proof-of-work to purpose service string, random value, nonce, is incremented for brute force search to start at random point service string nonce Hashcash: $ echo -n "1:52:380119:calvin@comics.net:::9B7605E92F0DAE" sha1sum 0756af69e2ffbdb cd71 [1] hash 31
29 {crypto,recap} Asymmetric Cryptography every participant has a keypair Bob Alice 32
30 {crypto,recap} Asymmetric Cryptography every participant has a keypair Bob Alice 33
31 {crypto,recap} Asymmetric Cryptography send encrypted message Bob Alice 34
32 {crypto,recap} Asymmetric Cryptography send encrypted message Bob Alice 35
33 {crypto,recap} Asymmetric Cryptography send signed message Bob Alice 36
34 {crypto,recap} Asymmetric Cryptography send signed message Bob Alice 37
35 Bitcoin distinguishes Transactions (tx) transfer currency units can be created by everyone who owns currency units Blocks (b) contain inputs outputs contains number of transactions are created by miners chained together to form a time line synchronize the network 38
36 Block Block header version 39
37 Block Block header version time 40
38 Block Block header version time target nonce 41
39 Block Block header version time target hashtx nonce tx 1 hashtx tx 2 tx 3 42
40 Block chain Block n - 1 Block header hashtx version hashprev version hashprev time target time target hashtx nonce hashtx nonce tx 1 tx 1 tx 2 tx 2 tx 3 Block n + 1 Block n 43
41 Block n - 1 Block header hashtx Mining & Block chain version hashprev version hashprev time target time target hashtx nonce hashtx nonce tx 1 (coinbase) tx 1 (coinbase) tx 2 tx 2 tx 3 Block n + 1 Block n 44
42 Block n - 1 Block header hashtx Mining & Block chain version hashprev version hashprev time target time target hashtx nonce hashtx nonce tx 1 (coinbase) tx 1 (coinbase) tx 2 tx 2 tx 3 Block n + 1 version in_count Block n 25 BTC input 1 out_count output 1 H(pk_A) 45
43 Tansaction, Alice => Bob tx version in_count input 1 out_count output 1 46
44 Tansaction, Alice => Bob Block header version hashprev time target hashtx nonce tx 1 hashtx tx 2 tx tx 3 version in_count input 1 out_count output 1 47
45 Tansaction, Alice => Bob Block header version hashprev time target hashtx nonce tx 1 hashtx tx 2 tx tx 3 version in_count version in_count input 1 H(pk_A) input 1 out_count output 1 input 2 out_count output 1 output 2 48
46 Tansaction, Alice => Bob Block header version hashprev time target hashtx nonce tx 1 hashtx tx 2 tx tx 3 version in_count version in_count input 1 H(pk_A) out_count input 1 input 2 out_count output 1 output 2 output 1 sig(sk_a,tx) pk_a H(pk_B) 49
47 Tansaction, Alice => Bob Block header version hashprev version hashprev time target time target hashtx nonce hashtx nonce hashtx tx 1 tx 1 tx 2 tx 2 tx 3 version in_count version in_count input 1 H(pk_A) out_count input 1 input 2 out_count output 1 output 2 output 1 sig(sk_a,tx) pk_a H(pk_B) 50
48 Mining & Block chain There is no hard limit of 21 Million bitcoins! Only a software limit half all blocks (~all 4 years) Era 1: 50 BTC Era 2: 50/2 = 25 BTC Era 3: 25/2 = 12.5 BTC... Era 33: 0.01 Satoshi Theoretical max int64_t (2^64) ~80 times more 51
49 Mining & Block chain It is possible that a confirmed transaction in a valid block gets reverted! There are block chain forks 52
50 Mining & Block chain It is possible that a confirmed transaction in a valid block gets reverted! There are block chain forks genesis 53
51 Mining & Block chain It is possible that a confirmed transaction in a valid block gets reverted! There are block chain forks genesis 54
52 Mining & Block chain It is possible that a confirmed transaction in a valid block gets reverted! There are block chain forks genesis 55
53 Mining & Block chain It is possible that a confirmed transaction in a valid block gets reverted! There are block chain forks genesis 56
54 Mining & Block chain It is possible that a confirmed transaction in a valid block gets reverted! There are block chain forks genesis 57
55 Mining & Block chain It is possible that a confirmed transaction in a valid block gets reverted! There are block chain forks genesis 58
56 Mining & Block chain It is possible that a confirmed transaction in a valid block gets reverted! There are block chain forks genesis 59
57 Double spending Successful double spending attack Attacker Block 60
58 Double spending Successful double spending attack Attacker Block 61
59 Double spending Successful double spending attack Attacker Block 62
60 Double spending Successful double spending attack Attacker Block 63
61 Double spending Successful double spending attack Attacker Block 64
62 Attack success probability 65
63 Attack success probability 66
64 Attack success probability 67
65 Hashrate distribution 27% [1] 68
66 Cryptocurrency based on... Proof-of-Work (SHA256 hash function) Asymmetric Cryptography (ECDSA) block chain Can we reuse the concept of a block chain in other contexts? 69
67 Generalizing the concept of Bitcoin 70
68 Block chain registration process register a id-value pair in a block chain Hello by Alice 71
69 Block chain registration process register a id-value pair in a block chain what is the problem here? Hello by Alice 72
70 Block chain registration process register a id-value pair in a block chain Attacker Block Hello by Hello by Alice 73
71 Block chain registration process register a id-value pair in a block chain Attacker Block Hello by Hello by Alice 74
72 Block chain registration process register a id-value pair in a block chain e7fa8 by Alice... 75
73 Block chain registration process register a id-value pair in a block chain e7fa8 by Alice... Hello by Alice 76
74 Block chain registration process register a id-value pair in a block chain e7fa8 by Alice... Hello by Alice... 77
75 Block chain registration process register a id-value pair in a block chain Hello by e7fa8 by Alice Hello by Alice 78
76 Namecoin 79
77 Currency shortcut NMC 1 NMC =~ $ 0.91 USD Market capitalization $9,207,844 USD 80
78 [1] 81
79 Register a domain $./namecoind name_new d/coinan [ "fe5d...466", "7df9..."] $./namecoind name_firstupdate d/coinan 7df9... fe5d '{"ip":" ", "map": {"*": {"ip":" "}}}' 82
80 Conclusion Decentralized id-value store DNS HTTPS certs, GPG keys,... Authenticated Twitter Fingerprinting service... Block chain size? ASIC mining? Power consumption? 85
81 EOF Aljosha Judmayer Researcher SBA Research ggmbh Favoritenstraße 16, 1040 Wien ajudmayer@sba-research.org
82 bitcoin101.png Bitcoin_Logo_Horizontal_Dark-48px.png spending-bitcoins.jpg Chaum.jpg cypher.gif pictures of cypherpunks uk-front2.jpg Proof_of_Work_challenge_response.svg Namecoin_Logo.png namecoin-vs-bitcoin.png bitcoin+mining.jpg Namecoin.png dogecoin.png dogecoin_money.png dogecoin_wow.png 87
Bitcoin (Part I) Ken Calvert Keeping Current Seminar 22 January Keeping Current 1
Bitcoin (Part I) Ken Calvert Keeping Current Seminar 22 January 2014 2014.01.22 Keeping Current 1 Questions What problem is Bitcoin solving? Where did it come from? How does the system work? What makes
More informationUniversity of Duisburg-Essen Bismarckstr Duisburg Germany HOW BITCOIN WORKS. Matthäus Wander. June 29, 2011
University of Duisburg-Essen Bismarckstr. 90 47057 Duisburg Germany HOW BITCOIN WORKS June 29, 2011 Overview Electronic currency system Decentralized No trusted third party involved Unstructured peer-to-peer
More informationAbout cryptocurrencies and blockchains part 1. Jyväskylä 17th of April 2018 Henri Heinonen
About cryptocurrencies and blockchains part 1 Jyväskylä 17th of April 2018 Henri Heinonen (henri.t.heinonen@jyu.fi) What is a blockchain? BitTorrent is a famous example of a peer-to-peer network (P2P)
More informationSecurity Analysis of Bitcoin. Dibyojyoti Mukherjee Jaswant Katragadda Yashwant Gazula
Security Analysis of Bitcoin Dibyojyoti Mukherjee Jaswant Katragadda Yashwant Gazula Security Analysis of Bitcoin Introduction How Bitcoin works? Similar peer-to-peer systems Vulnerabilities and solutions
More informationBitcoin, a decentralized and trustless protocol
Bitcoin, a decentralized and trustless protocol Thomas Sibut-Pinote Inria Saclay February 12, 2015 Thomas Sibut-Pinote Bitcoin, a decentralized and trustless protocol 1 / 42 Introduction Questions 1 Introduction
More informationENEE 457: E-Cash and Bitcoin
ENEE 457: E-Cash and Bitcoin Charalampos (Babis) Papamanthou cpap@umd.edu Money today Any problems? Cash is cumbersome and can be forged Credit card transactions require centralized online bank are not
More informationIntroduction to Bitcoin I
Introduction to Bitcoin I P Peterlongo 1 A Tomasi 1 1 University of Trento Department of Mathematics June 10, 2013 Outline 1 Fiat and online payments Functions of Online payments and cost of clearing 2
More informationSmalltalk 3/30/15. The Mathematics of Bitcoin Brian Heinold
Smalltalk 3/30/15 The Mathematics of Bitcoin Brian Heinold What is Bitcoin? Created by Satoshi Nakamoto in 2008 What is Bitcoin? Created by Satoshi Nakamoto in 2008 Digital currency (though not the first)
More informationApplied cryptography
Applied cryptography Electronic Cash Andreas Hülsing 29 November 2016 1 / 61 Classical Cash - Life Cycle Mint produces money (coins / bank notes) Sent to bank User withdraws money (reduces account balance)
More informationProblem: Equivocation!
Bitcoin: 10,000 foot view Bitcoin and the Blockchain New bitcoins are created every ~10 min, owned by miner (more on this later) Thereafter, just keep record of transfers e.g., Alice pays Bob 1 BTC COS
More informationBlockchain. CS 240: Computing Systems and Concurrency Lecture 20. Marco Canini
Blockchain CS 240: Computing Systems and Concurrency Lecture 20 Marco Canini Credits: Michael Freedman and Kyle Jamieson developed much of the original material. Bitcoin: 10,000 foot view New bitcoins
More informationBiomedical and Healthcare Applications for Blockchain. Tiffany J. Callahan Computational Bioscience Program Hunter/Kahn Labs
Biomedical and Healthcare Applications for Blockchain Tiffany J. Callahan Computational Bioscience Program Hunter/Kahn Labs Network Analysis Working Group 01.25.2018 Outline Introduction to bitcoin + blockchain
More informationBLOCKCHAIN The foundation behind Bitcoin
BLOCKCHAIN The foundation behind Bitcoin Sourav Sen Gupta Indian Statistical Institute, Kolkata CRYPTOGRAPHY Backbone of Blockchain Technology Component 1 : Cryptographic Hash Functions HASH FUNCTIONS
More informationLet's build a blockchain!
I'm Haseeb. That's me. Let's build a blockchain! A mini-cryptocurrency in Ruby I'm Haseeb Qureshi. I'm a software engineer. I'm working at a blockchain company called 21.co. Unless something terrible has
More informationOn the security of security extensions for IP-based KNX networks. Aljosha Judmayer
On the security of security extensions for IP-based KNX networks Aljosha Judmayer ajudmayer@sba-research.org ajudmayer@auto.tuwien.ac.at 1 SBA Research Area 1 (GRC): Governance, Risk and Compliance P1.1:
More informationBiomedical Security. Cipher Block Chaining and Applications
1 Biomedical Security Erwin M. Bakker 2 Cipher Block Chaining and Applications Slides and figures are adapted from: W. Stallings, Cryptography and Network Security 4 th Edition and 7 th Edition 1 3 Block
More informationICS 421 & ICS 690. Bitcoin & Blockchain. Assoc. Prof. Lipyeow Lim Information & Computer Sciences Department University of Hawai`i at Mānoa
ICS 421 & ICS 690 Bitcoin & Blockchain Assoc. Prof. Lipyeow Lim Information & Computer Sciences Department University of Hawai`i at Mānoa Accepted by: Overstock.com Expedia.com Newegg.com Tigerdirect.com
More informationLecture 9. Anonymity in Cryptocurrencies
Lecture 9 Anonymity in Cryptocurrencies Some say Bitcoin provides anonymity Bitcoin is a secure and anonymous digital currency WikiLeaks donations page Others say it doesn t Bitcoin won't hide you from
More informationJan Møller Co-founder, CTO Chainalysis
Jan Møller Co-founder, CTO Chainalysis How Does Bitcoin Actually Work? This talk is not about the poli:cal or economical impact of Bitcoin. This talk is not about how to buy, sell, spend, or secure your
More informationBlockchain for Enterprise: A Security & Privacy Perspective through Hyperledger/fabric
Blockchain for Enterprise: A Security & Privacy Perspective through Hyperledger/fabric Elli Androulaki Staff member, IBM Research, Zurich Workshop on cryptocurrencies Athens, 06.03.2016 Blockchain systems
More informationCS 4770: Cryptography. CS 6750: Cryptography and Communication Security. Alina Oprea Associate Professor, CCIS Northeastern University
CS 4770: Cryptography CS 6750: Cryptography and Communication Security Alina Oprea Associate Professor, CCIS Northeastern University March 30 2017 Outline Digital currencies Advantages over paper cash
More informationEnsimag - 4MMSR Network Security Student Seminar. Bitcoin: A peer-to-peer Electronic Cash System Satoshi Nakamoto
Ensimag - 4MMSR Network Security Student Seminar Bitcoin: A peer-to-peer Electronic Cash System Satoshi Nakamoto wafa.mbarek@ensimag.fr halima.myesser@ensimag.fr 1 Table of contents: I- Introduction: Classic
More informationAnalyzing Bitcoin Security. Philippe Camacho
Analyzing Bitcoin Security Philippe Camacho philippe.camacho@dreamlab.net Universidad Católica, Santiago de Chile 15 of June 2016 Bitcoin matters Map Blockchain Design Known Attacks Security Models Double
More informationProof-of-Work & Bitcoin
CS 220: Introduction to Parallel Computing Proof-of-Work & Bitcoin Lecture 19 Bitcoin: Mining for Heat https://qz.com/1117836/bitcoin-mining-heatshomes-for-free-in-siberia/ 4/25/18 CS 220: Parallel Computing
More informationSKBI Cryptocurrency Technical Seminar Series Seminar 1: Basics: Cryptography and Transactions
SKBI Cryptocurrency Technical Seminar Series Seminar 1: Basics: Cryptography and Transactions Zhiguo Wan Sim Kee Boon Institute for Financial Economics Singapore Management University Schedule of bitcoin
More informationIntroduc)on to Bitcoin
Introduc)on to Bitcoin CONTENTS What is Bitcoin Who created it? Who prints it? How does Bitcoin work? The characteris5cs of Bitcoin WHAT IS BITCOIN Bitcoin is a form of digital currency, created and held
More informationComputer Security. 14. Blockchain & Bitcoin. Paul Krzyzanowski. Rutgers University. Spring 2019
Computer Security 14. Blockchain & Bitcoin Paul Krzyzanowski Rutgers University Spring 2019 April 15, 2019 CS 419 2019 Paul Krzyzanowski 1 Bitcoin & Blockchain Bitcoin cryptocurrency system Introduced
More informationBitcoin and Blockchain
Bitcoin and Blockchain COS 418: Distributed Systems Lecture 18 Zhenyu Song [Credit: Selected content adapted from Michael Freedman. Slides refined by Chris Hodsdon and Theano Stavrinos] Why Bitcoin? All
More informationBiomedical Security. Some Security News 10/5/2018. Erwin M. Bakker
Biomedical Security Erwin M. Bakker Some Security News October 03, 2018 - Hackers attacking healthcare through remote access systems and disrupting operations is the number one patient safety risk, according
More informationDigital Currencies: Algorithms and Protocols
Digital Currencies: Algorithms and Protocols Élise Alfieri , Emmanuel Fleury LaBRI, Université de Bordeaux, France March 7, 2017 Alfieri, Fleury
More informationInformation Security. message M. fingerprint f = H(M) one-way hash. 4/19/2006 Information Security 1
Information Security message M one-way hash fingerprint f = H(M) 4/19/2006 Information Security 1 Outline and Reading Digital signatures Definition RSA signature and verification One-way hash functions
More informationBlockchains & Cryptocurrencies
1 Blockchains & Cryptocurrencies A Technical Introduction Lorenz Breidenbach ETH Zürich Cornell Tech The Initiative for CryptoCurrencies & Contracts (IC3) 2 Cryptocurrency Mania Market cap as of yesterday:
More informationBitcoin. CS6450: Distributed Systems Lecture 20 Ryan Stutsman
Bitcoin CS6450: Distributed Systems Lecture 20 Ryan Stutsman Material taken/derived from Princeton COS-418 materials created by Michael Freedman and Kyle Jamieson at Princeton University. Licensed for
More informationUNIT - IV Cryptographic Hash Function 31.1
UNIT - IV Cryptographic Hash Function 31.1 31-11 SECURITY SERVICES Network security can provide five services. Four of these services are related to the message exchanged using the network. The fifth service
More informationSpaceMint Overcoming Bitcoin s waste of energy
Bitcoin Overcoming Bitcoin s waste of energy Georg Fuchsbauer joint work with S Park, A Kwon, K Pietrzak, J Alwen and P Gaži Digital currency Decentralized (no bank issuing coins) Pseudonymous Controled
More informationBITCOIN PROTOCOL & CONSENSUS: A HIGH LEVEL OVERVIEW
BITCOIN PROTOCOL & CONSENSUS: A HIGH LEVEL OVERVIEW Rustie Lin Wang Move the area1 over the image a little inside and then right click, replace image to change the background. (and delete this box while
More informationSoftware Security. Final Exam Preparation. Be aware, there is no guarantee for the correctness of the answers!
Software Security Final Exam Preparation Note: This document contains the questions from the final exam on 09.06.2017. Additionally potential questions about Combinatorial Web Security Testing and Decentralized
More informationAnonymity and Privacy
Computer Security Spring 2008 Anonymity and Privacy Aggelos Kiayias University of Connecticut Anonymity in networks Anonymous Credentials Anonymous Payments Anonymous E-mail and Routing E-voting Group,
More informationA simple approach of Peer-to-Peer E-Cash system
A simple approach of Peer-to-Peer E-Cash system Mr. Dharamvir, Mr. Rabinarayan Panda Asst. Professor, Dept. of MCA, The Oxford College of Engineering Bangalore, India. Abstract-With the popularization
More informationKey Security Issues for implementation of Digital Currency, including ITU-T SG17 activities
ITU Workshop on FG DFC Workshop on Standards for Digital Fiat Currency (DFC) () Key Issues for implementation of Digital Currency, including ITU-T SG17 activities Heung Youl Youm, PhD. Chairman of ITU-T
More informationBitcoin (and why it uses SO much energy)
Bitcoin (and why it uses SO much energy) David Malone Hamilton Institute / Dept Maths&Stats Maynooth University. 2018-11-08 Bitcoin Background Bitcoin is a cryptocurrency that started around 2008 2009.
More informationP2P BitCoin: Technical details
ELT-53206 Peer-to-Peer Networks P2P BitCoin: Technical details Mathieu Devos Tampere University of Technology Department of Electronics & Communications Engineering mathieu.devos@tut.fi TG406 2 Outline
More informationThe Design of an Anonymous and a Fair Novel E-cash System
International Journal of Information & Computation Technology. ISSN 0974-2239 Volume 2, Number 2 (2012), pp. 103-109 International Research Publications House http://www. ripublication.com The Design of
More informationHyperledger fabric: towards scalable blockchain for business
Marko Vukolić, IBM Research - Zurich Hyperledger fabric: towards scalable blockchain for business Trust in Digital Life The Hague, Netherlands, June 17 2016 Blockchain shared, replicated, ledger Consensus
More informationBlockchain Bitcoin & Ethereum
Blockchain Bitcoin & Ethereum Pascal.Urien@Telecom-ParisTech.fr Pascal Urien 1 "Bitcoin: A Peer-to-Peer Electronic Cash System." Satoshi Nakamoto In this paper, we propose a solution to the double-spending
More informationBitcoin. Arni Par ov. December 17, 2013
Bitcoin Arni Par ov December 17, 2013 Abstract Bitcoin is a distributed, peer-to-peer cryptocurrency that functions without any central authority and in recent years has gained large popularity. This paper
More informationChapter 13. Digital Cash. Information Security/System Security p. 570/626
Chapter 13 Digital Cash Information Security/System Security p. 570/626 Introduction While cash is used in illegal activities such as bribing money laundering tax evasion it also protects privacy: not
More informationKey concepts of blockchain
Advisory A brief history of blockchains 2008 The mysterious Satoshi Nakamoto publishes his Bitcoin white paper 2014 2017 Nov. 23 rd Ethereum crowd sale Number of crypto tokens: 1.172 BTC $8.216 The first
More informationEECS 498 Introduction to Distributed Systems
EECS 498 Introduction to Distributed Systems Fall 2017 Harsha V. Madhyastha Today Bitcoin: A peer-to-peer digital currency Spark: In-memory big data processing December 4, 2017 EECS 498 Lecture 21 2 December
More informationCS 4770: Cryptography. CS 6750: Cryptography and Communication Security. Alina Oprea Associate Professor, CCIS Northeastern University
CS 4770: Cryptography CS 6750: Cryptography and Communication Security Alina Oprea Associate Professor, CCIS Northeastern University April 9 2018 Schedule HW 4 Due on Thu 04/12 Programming project 3 Due
More informationSOME OF THE PROBLEMS IN BLOCKCHAIN TODAY
BLOCKCHAIN EVOLVED THE PROBLEM SOME OF THE PROBLEMS IN BLOCKCHAIN TODAY An overall lack of governance is one of the most challenging facets of current blockchain ecosystems Controversy regarding scalability
More informationDEV. Deviant Coin, Innovative Anonymity. A PoS/Masternode cr yptocurrency developed with POS proof of stake.
DEV Deviant Coin, Innovative Anonymity A PoS/Masternode cr yptocurrency developed with POS proof of stake. CONTENTS 03 Overview 06 Pre-mine phase 07 Privacy 08 Basic parameters 09 Proof-of-stake The benefits
More informationBitcoin Mining. A high-level technical introduction. Konstantinos Karasavvas
Bitcoin Mining A high-level technical introduction Konstantinos Karasavvas Outline PoW / Hashcash Transaction propagation Block mining Block propagation Mining Profitability Proof of Work From wikipedia:
More informationFruitchains: A Fair Blockchain?
Fruitchains: A Fair Blockchain? Kyrylo Voronchenko Supervised by Michal Zajac June 4, 2018 Abstract This report is an overview of the paper [PS16] in which authors introduced a new protocol called FruitChain
More informationCONSENSUS PROTOCOLS & BLOCKCHAINS. Techruption Lecture March 16 th, 2017 Maarten Everts (TNO & University of Twente)
CONSENSUS PROTOCOLS & BLOCKCHAINS Techruption Lecture March 16 th, 2017 Maarten Everts (TNO & University of Twente) 2 Consensus protocols & blockchain 3 Consensus protocols & blockchain 4 Consensus protocols
More informationDAVID ANDREWS, FOUNDER RYATTA BLOCKCHAIN FOUNDATIONS
DAVID ANDREWS, FOUNDER RYATTA GROUP, CRYPTOGRAPHY IS THE STUDY OF TECHNIQUES FOR SECURE COMMUNICATION cryptography is defined as the practice and study of techniques for secure communication in the early
More informationA Review on Blockchain Application for Decentralized Decision of Ownership of IoT Devices
Advances in Computational Sciences and Technology ISSN 0973-6107 Volume 10, Number 8 (2017) pp. 2449-2456 Research India Publications http://www.ripublication.com A Review on Blockchain Application for
More information0x1A Great Papers in Computer Security
CS 380S 0x1A Great Papers in Computer Security Vitaly Shmatikov http://www.cs.utexas.edu/~shmat/courses/cs380s/ Privacy on Public Networks Internet is designed as a public network Wi-Fi access points,
More informationSecurity: Focus of Control
Security: Focus of Control Three approaches for protection against security threats a) Protection against invalid operations b) Protection against unauthorized invocations c) Protection against unauthorized
More informationDarkcoin: Peer to Peer Crypto Currency with Anonymous Blockchain Transactions and an Improved Proof of Work System
Darkcoin: Peer to Peer Crypto Currency with Anonymous Blockchain Transactions and an Improved Proof of Work System Introduction Evan Duffield, Kyle Hagan (evan@darkcoin.io, kyle@darkcoin.io) 18 March 2014
More informationConsensus & Blockchain
Consensus & Blockchain S P Suresh Chennai Mathematical Institute Formal Methods Update Meeting IIT Mandi July 17, 2017 The Bitcoin revolution is upon us What is Bitcoin? Bitcoin: an exciting new currency
More informationILCOIN White Paper. In ILCOIN We Trust ILCOIN
ILCOIN White Paper In ILCOIN We Trust ILCOIN ILCOIN Development Team September 2017 TABLE OF CONTENTS WHAT IS ILCOIN WE NEED THINGS THAT DRAW ON THE REVOLUTION OF BITCOIN, BUT BITCOIN ALONE IS NOT GOOD
More informationBYZANTINE CONSENSUS THROUGH BITCOIN S PROOF- OF-WORK
Informatiemanagement: BYZANTINE CONSENSUS THROUGH BITCOIN S PROOF- OF-WORK The aim of this paper is to elucidate how Byzantine consensus is achieved through Bitcoin s novel proof-of-work system without
More informationBitcoin, Security for Cloud & Big Data
Bitcoin, Security for Cloud & Big Data CS 161: Computer Security Prof. David Wagner April 18, 2013 Bitcoin Public, distributed, peer-to-peer, hash-chained audit log of all transactions ( block chain ).
More informationLecture 6. Mechanics of Bitcoin
Lecture 6 Mechanics of Bitcoin Bitcoin transactions time An account-based ledger (not Bitcoin) Create 25 coins and credit to Alice ASSERTED BY MINERS SIMPLIFICATION: only one transaction per block time
More informationErgo platform. Dmitry Meshkov
Ergo platform Dmitry Meshkov Prehistory Motivation Theory Practice Provably secure 1000 currencies New features Ad-hoc solutions Impractical Security issues Motivation Theory Provably secure New features
More informationExceptional Access Protocols. Alex Tong
Exceptional Access Protocols Alex Tong Motivation Crypto Wars FBI vs. Apple What is the job of engineers? Requirements Government Decryption without notice to the user Ubiquitous international capability
More informationBlockchain as cryptanalytic tool
Blockchain as cryptanalytic tool Extended Abstract Manfred Lochter Bundesamt für Sicherheit in der Informationstechnik (BSI), Germany Abstract One approach for blockchain based applications to provide
More informationIntroduction to Cryptoeconomics
Introduction to Cryptoeconomics What is cryptoeconomics? Cryptoeconomics is about... Building systems that have certain desired properties Use cryptography to prove properties about messages that happened
More informationEVALUATION OF PROOF OF WORK (POW) BLOCKCHAINS SECURITY NETWORK ON SELFISH MINING
EVALUATION OF PROOF OF WORK (POW) BLOCKCHAINS SECURITY NETWORK ON SELFISH MINING I Gusti Ayu Kusdiah Gemeliarana Department of Electrical Engineering University of Indonesia Depok, Indonesia i.gusti79@ui.ac.id
More informationA Lightweight Blockchain Consensus Protocol
A Lightweight Blockchain Consensus Protocol Keir Finlow-Bates keir@chainfrog.com Abstract A lightweight yet deterministic and objective consensus protocol would allow blockchain systems to be maintained
More informationBlockchain, Cryptocurrency, Smart Contracts and Initial Coin Offerings: A Technical Perspective
SESSION ID: LAB3-R09 Blockchain, Cryptocurrency, Smart Contracts and Initial Coin Offerings: A Technical Perspective Tom Plunkett Consulting Solutions Director Oracle Captain Brittany Snelgrove United
More informationStealth Address. and Key Management Techniques in Blockchain Systems. Nicolas T. Courtois 1 and Rebekah Mercer 1,2. University College London, UK
Stealth Address and Key Management Techniques in Blockchain Systems Nicolas T. Courtois 1 and Rebekah Mercer 1,2 1 University College London, UK 2 Clearmatics Ltd, London, UK Topics Bitcoin vs. Monero
More informationBITCOIN MECHANICS AND OPTIMIZATIONS. Max Fang Philip Hayes
1 BITCOIN MECHNICS ND OPTIMIZTIONS Max Fang Philip Hayes 1 Cryptocurrency Mining: Proof-of-Work Consensus Nadir khtar LECTURE OUTLINE 2 1 Intro and Terminology 2 Bitcoin and Consensus 3 Bitcoin Concepts
More informationPublic Key Infrastructures
Public Key Infrastructures Certcoin Cryptography and Computer Algebra Prof. Johannes Buchmann Dr. Johannes Braun Background Blockchain Distributed database, consisting of a list of blocks Decentralized
More informationECC: Peer-to-Peer Electronic Cash with Trustless Network Services
ECC: Peer-to-Peer Electronic Cash with Trustless Network Services Greg Griffith October 2017 (griffith@cryptounited.io) https://www.ecc.network ECC: Peer-to-Peer Electronic Cash with Trustless Network
More informationGRADUBIQUE: AN ACADEMIC TRANSCRIPT DATABASE USING BLOCKCHAIN ARCHITECTURE
San Jose State University SJSU ScholarWorks Master's Projects Master's Theses and Graduate Research Fall 12-14-2018 GRADUBIQUE: AN ACADEMIC TRANSCRIPT DATABASE USING BLOCKCHAIN ARCHITECTURE Thinh Nguyen
More informationInternational Journal of Computer Engineering and Applications, Volume XIII, Issue II, Feb. 19, ISSN
BLOCK-CHAIN: SURVEY ON PRIVACY, SECURITY AND CHALLENGES Monalisha Sinha ABSTRACT: Department of computer science & engineering Birla institute of technology Ranchi, India Blockchain has gained wide attention
More informationCryptography. some history. modern secret key cryptography. public key cryptography. cryptography in practice
Cryptography some history Caesar cipher, rot13 substitution ciphers, etc. Enigma (Turing) modern secret key cryptography DES, AES public key cryptography RSA, digital signatures cryptography in practice
More informationPrivacy Enhancing Technologies CSE 701 Fall 2017
Privacy Enhancing Technologies Lecture 2: Anonymity Applications Department of Computer Science and Engineering University at Buffalo 1 Lecture Outline Anonymous communication mixes, anonymizing proxies,
More informationPayment systems. Tuomas Aura CSE-C3400 Information security. Aalto University, autumn 2014
Payment systems Tuomas Aura CSE-C3400 Information security Aalto University, autumn 2014 1. Card payments Outline 2. Anonymous payments and BitCoin 2 CARD PAYMENT 3 Bank cards Credit or debit card Card
More informationUsing Cryptography CMSC 414. October 16, 2017
Using Cryptography CMSC 414 October 16, 2017 Digital Certificates Recall: K pub = (n, e) This is an RSA public key How do we know who this is for? Need to bind identity to a public key We can do this using
More informationEthereum. Campbell R. Harvey* Duke University and NBER. Ashwin Ramachandran Duke University. Brent Xu ConsenSys. Innovation and Cryptoventures
Innovation and Cryptoventures Ethereum Campbell R. Harvey* Duke University and NBER Ashwin Ramachandran Duke University Brent Xu ConsenSys February 12, 2018 1 2 Overview Ethereum Basics Under the hood
More informationGraph-based forensic investigation of Bitcoin transactions
Graduate Theses and Dissertations Graduate College 2014 Graph-based forensic investigation of Bitcoin transactions Chen Zhao Iowa State University Follow this and additional works at: http://lib.dr.iastate.edu/etd
More informationBlockchain (a.k.a. the slowest, most fascinating database you ll ever see)
Blockchain (a.k.a. the slowest, most fascinating database you ll ever see) GOTO Amsterdam 13 June, 2017 Stefan Tilkov, @stilkov I don t know Blockchain and so can you 1. Bitcoin > Practical application
More informationCISC859: Topics in Advanced Networks & Distributed Computing: Network & Distributed System Security. A Brief Overview of Security & Privacy Issues
CISC859: Topics in Advanced Networks & Distributed Computing: Network & Distributed System Security A Brief Overview of Security & Privacy Issues 1 Topics to Be Covered Cloud computing RFID systems Bitcoin
More informationHow Bitcoin achieves Decentralization. How Bitcoin achieves Decentralization
Centralization vs. Decentralization Distributed Consensus Consensus without Identity, using a Block Chain Incentives and Proof of Work Putting it all together Centralization vs. Decentralization Distributed
More informationIntroduction and Overview. Why CSCI 454/554?
Introduction and Overview CSCI 454/554 Why CSCI 454/554? Get Credits and Graduate Security is important More job opportunities More research funds 1 Workload Five homework assignments Two exams (open book
More informationCS 470 Spring Security. Mike Lam, Professor. a.k.a. Why on earth do Alice and Bob need to talk so much?!? Content taken from the following:
50fb6be35f4c3105 9d4ed08fb86d8887 b746c452a9c9443b 15b22f450c76218e CS 470 Spring 2017 9df7031cdbff9d10 b700a92855f16328 5b757e66d2131841 62fedd7d9131e42e Mike Lam, Professor Security a.k.a. Why on earth
More informationDistributed Algorithms Bitcoin
Distributed Algorithms Bitcoin Alberto Montresor Università di Trento 2018/12/18 Acknowledgment: Joseph Bonneau, Ed Felten, Arvind Narayanan This work is licensed under a Creative Commons Attribution-ShareAlike
More informationCryptography and Cryptocurrencies. Intro to Cryptography and Cryptocurrencies
Intro to Cryptographic Hash Functions Hash Pointers and Data Structures Block Chains Merkle Trees Digital Signatures Public Keys and Identities Let s design us some Digital Cash! Intro to Cryptographic
More informationBlockchain Based E-Voting Recording System Design
Blockchain Based E-Voting Recording System Design Rifa Hanifatunnisa (Author) School of Electrical Engineering and Informatics Bandung Institute of Technology Bandung, West Java, Indonesia rifahani@students.itb.ac.id
More informationTOPPERCASH TOPPERCASH WHITEPAPER REFORM THE BEST OF BLOCKCHAIN
TOPPERCASH TOPPERCASH WHITEPAPER REFORM THE BEST OF BLOCKCHAIN ABSTRACT A PEER-TO-PEER CRYPTO-CURRENCY DESIGN DERIVED FROM SATOSHI NAKAMOTO S BITCOIN. PROOF- OF-STAKE REPLACES PROOF-OF- WORK TO PROVIDE
More informationBruno Pujos. January 14, 2015
calculator calculator January 14, 2015 Introduction calculator is a virtual crypto currency introduced in 2008-2009. Based on the bruteforce of a. For fast computation, use of /ASIC. : Field-Programmable
More informationProtocols for Anonymous Communication
18734: Foundations of Privacy Protocols for Anonymous Communication Anupam Datta CMU Fall 2016 Privacy on Public Networks } Internet is designed as a public network } Machines on your LAN may see your
More informationA world-wide network of interconnected objects uniquely addressable, based on standard communication protocols
Things having identities and virtual personalities operating in smart spaces using intelligent interfaces to connect and communicate within social, environmental, and user contexts A world-wide network
More informationBlockchain & Distributed Internet Infrastructure
Blockchain & Distributed Internet Infrastructure Dirk Kutscher NEC Laboratories Europe 1 Purpose of this Meeting Discuss blockchain-based and Distributed Internet Infrastructure concepts, state of the
More informationHacking Deterministic Bitcoin Addresses. Michael McKinnon
Hacking Deterministic Bitcoin Addresses Michael McKinnon - @bigmac This talk is ONLY about Bitcoin Bro, wanna buy some #sheepcoin? 2 I won t be outing Satoshi #whoissatoshi 3 I m not a Lawyer, This is
More informationREM: Resource Efficient Mining for Blockchains
REM: Resource Efficient Mining for Blockchains Fan Zhang, Ittay Eyal, Robert Escriva, Ari Juels, Robbert van Renesse Vancouver, Canada 13 September 2017 USENIX Security 2017 1 The Cryptocurrency Vision
More informationA survey of the peer to peer based DNS system
A survey of the peer to peer based DNS system Who am I? Data Analyst @ Dyn Keeper of dogs Lover of Internet Hater of Ne er do wells The Year of The Crypto Currency I swear I m not making this up Proof
More information