BaFin-Tech 2018 BlockChain & Security (from #developerview)

Similar documents
Distributed Ledger Technology & Fintech Applications. Hart Montgomery, NFIC 2017

Bitcoin, a decentralized and trustless protocol

Blockchain for Enterprise: A Security & Privacy Perspective through Hyperledger/fabric

The power of Blockchain: Smart Contracts. Foteini Baldimtsi

Key concepts of blockchain

Blockchain & Smart Contracts Introduction. Dr. Sebastian Bürgel

ENEE 457: E-Cash and Bitcoin

Lecture 44 Blockchain Security I (Overview)

Introduction to Blockchain

Blockchain without Bitcoin. Muralidhar Gopinath October 19, 2017 University at Albany

Smalltalk 3/30/15. The Mathematics of Bitcoin Brian Heinold

Privacy based Public Key Infrastructure (PKI) using Smart Contract in Blockchain Technology

The Blockchain. Josh Vorick

Biomedical and Healthcare Applications for Blockchain. Tiffany J. Callahan Computational Bioscience Program Hunter/Kahn Labs

Key Security Issues for implementation of Digital Currency, including ITU-T SG17 activities

About & Beyond PKI. Blockchain and PKI. André Clerc Dipl. Inf.-Ing. FH, CISSP, CAS PM TEMET AG, Zürich. February 9, 2017

Securing Your Cryptocurrency vs.1.0

10 minutes, 10 slides, goals, tech details and why it matters. Decentralized ID & Verifiable Claims

What is Proof of Work?

TC307 SG3 - SECURITY & PRIVACY

Introduction to Cryptography in Blockchain Technology. December 23, 2018

Blockchain, Cryptocurrency, Smart Contracts and Initial Coin Offerings: A Technical Perspective

Who wants to be a millionaire? A class in creating your own cryptocurrency

BITCOIN PROTOCOL & CONSENSUS: A HIGH LEVEL OVERVIEW

Not ACID, not BASE, but SALT A Transaction Processing Perspective on Blockchains

Hyperledger fabric: towards scalable blockchain for business

Blockchain & Distributed Internet Infrastructure

Exceptional Access Protocols. Alex Tong

SOME OF THE PROBLEMS IN BLOCKCHAIN TODAY

Cryptocurrencies for Investigators

International Journal of Computer Engineering and Applications, Volume XIII, Issue II, Feb. 19, ISSN

The security and insecurity of blockchains and smart contracts

BLOCKCHAIN ARCHITECT Certification. Blockchain Architect

primechain building blockchains for a better world

Blockchain Beyond Bitcoin. Mark O Connell

The nuts and bolts of blockchain technology

Blockchain! What consultants should know about it. Daniel

An Analysis of Atomic Swaps on and between Ethereum Blockchains Research Project I

White Paper. Blockchain alternatives: The case for CRAQ

Introduction to Bitcoin I

Digital Currencies: Algorithms and Protocols

Blockchains & Cryptocurrencies

The game If you listen very carefully during the first 4 cards (or use the cheat sheet) you will get an advantage on the last 5 cards

Lecture 10. A2 - will post tonight - due in two weeks

Lightpaper TENZORUM. The unstoppable machine for self-sovereign key management and access to the decentralized world.

Public Key Infrastructures

KDC COIN WHITEPAPER KDC COIN WHITEPAPER.

Ergo platform: from prototypes to a survivable cryptocurrency

Principals of Blockchain technology - Digital Business Ecosystem Kick of meeting Helsinki

A New Internet for Decentralized Apps

CS 4770: Cryptography. CS 6750: Cryptography and Communication Security. Alina Oprea Associate Professor, CCIS Northeastern University

Problem: Equivocation!

SpaceMint Overcoming Bitcoin s waste of energy

Hawk: The Blockchain Model of Cryptography and Privacy-Preserving Smart Contracts. Yashar Dehkan Asl

Hyperledger Fabric v1:

Blockchain (a.k.a. the slowest, most fascinating database you ll ever see)

Reliability, distributed consensus and blockchain COSC412

Distributed Ledger With Secure Data Deletion

Brown University. Yana Hrytsenko. Final Project: Blockchain for PKI: Using Blockchain data structure for Public Key. Infrastructure.

Jan Møller Co-founder, CTO Chainalysis

CS 4770: Cryptography. CS 6750: Cryptography and Communication Security. Alina Oprea Associate Professor, CCIS Northeastern University

Computer Security. 14. Blockchain & Bitcoin. Paul Krzyzanowski. Rutgers University. Spring 2019

Breaking the Blockchain: Real-World Use Cases, Opportunities and Challenges

Hyperledger Quilt and Interledger Protocol. Nathan Aw - Technical Ambassador Edmund To - Organizer of Hyperledger Meetup Hong Kong

Blockchain Based E-Voting Recording System Design

Lecture 3. Introduction to Cryptocurrencies

Bitcoin and Blockchain

OpenbankIT: a banking platform for e- money management based on blockchain technology

Chapter 13. Digital Cash. Information Security/System Security p. 570/626

Why is blockchain exciting? Data Sharing.

HashCash Consultants. Whitepaper-HC NET

A Review on Blockchain Application for Decentralized Decision of Ownership of IoT Devices

Blockchain. Technology Primer

Elphyrecoin (ELPH) a Private, Untraceable, ASIC-Resistant CryptoCurrency Based on CryptoNote

How to buy LIVE Token with Ethereum and Bitcoin step by step

BLOCKCHAIN The foundation behind Bitcoin

Security Analysis of Bitcoin. Dibyojyoti Mukherjee Jaswant Katragadda Yashwant Gazula

Executive Summary. (The Abridged Version of The White Paper) BLOCKCHAIN OF THINGS, INC. A Delaware Corporation

DEV. Deviant Coin, Innovative Anonymity. A PoS/Masternode cr yptocurrency developed with POS proof of stake.

Breaking Hardware Wallets

Deconstructing Blockchains: Concepts, Systems, and Insights

Blockchain (de)constructed

GENESIS VISION NETWORK

ISSUSE AND FEATURES TO CONSIDER WHEN SELECTING A BLOCKCHAIN SYSTEM. Find us at

How Formal Analysis and Verification Add Security to Blockchain-based Systems

I. Introduction. II. Security, Coinage and Attacks

PERFECT MIX FOR PERFECT DATA PROTECTION

Callisto Network Whitepaper

Blockchain-backed analytics: Adding blockchain-based quality gates to data science projects

THEORY OF TOKENIZATION

SESSION TITLE GOES HERE Second Cosmos for Line the Goes Business Here Intelligence Professional

Technical White Paper of. MOAC Mother of All Chains. June 8 th, 2017

Using Chains for what They re Good For

BEYOND TRADITIONAL PASSWORD AUTHENTICATION: PKI & BLOCKCHAIN

Proof-of-Stake Protocol v3.0

Cryptography and Cryptocurrencies. Intro to Cryptography and Cryptocurrencies

A simple approach of Peer-to-Peer E-Cash system

The Design of an Anonymous and a Fair Novel E-cash System

An analysis of the applicability of blockchain to secure IP addresses allocation, delegation and bindings draft-paillisse-sidrops-blockchain-01

PQ-Crypto Standardization Preparing today for the future of cryptography

Transcription:

BaFin-Tech 2018 BlockChain & Security (from #developerview) DLT Lab 10 th April 2018 sven.lehnert@main-incubator.com, @itnext_de

Experiences from practice Agenda: Blockchain Security 1 Theory: Blockchain general 2 Theory: Basic Concepts 3 Focus: Smart Contracts 4 Conclusion E Extra: Cryptocurrencies 2

1 Basics 1 Blockchain an attempt of a definition A Blockchain, or distributed ledger, is a technological protocol that enables data to be exchanged directly between different contracting parties within a network without the need for intermediaries. Each transaction is communicated to all network nodes, and once verified and confirmed, is added to an immutable transaction chain. [Deloitte] 3

Cryptographic Hashing Asym. Public-Key Crypto Distributed P2P Computing 2 Basics: Three pillars as technical ground 1 POW Merkle Tree Consensus Trustless Network Open Source, or publicly verifiable code basis

2 Basics: Blocks 2 The math is strong in our tech-family! 9F069D0A8450C6EBA947D6FF81934DE9B5948E87CCE8C1DC30544CD3D2A3A601 95702EA004BCEBD29618382993D4A8EA731E627C665C223A4D1A46905221397B 5

2 Basics: Hashing 2 Blocks are chained via Hashes Image: https://www.youtube.com/watch?v=sso_eiwhsd4 6

2 Basics: Hashing 3 Tampering is made hard! Image: https://www.youtube.com/watch?v=sso_eiwhsd4 7

2 #frompractice: Architecture & Processes 4 Holistic security is not only technology, but also people and processes! Immaturity and complexity of the technology* Lack of standards and regulations around Blockchain technology Widespread belief that a Blockchain is secure by design #frompractice: - what (critical data?) to share and with whom? - how to deal with multi tenancy? - how can we ensure secure storage of customer s private keys? - how and where should passwords and keys be generated? - how can we securely update the chain code? *Text: partly from Deloitte, Image: IBM

2 #frompractice: encryption 5 Encryption done in one of my Trade Finance projects Every participant has already a private and public key pair Public key is shared among all participants Private key is kept private We encrypted every transaction with new symmetric secret key, then The symmetric secret key is sent to every participant encrypted with participant s public key Symmetric secret key can be extracted only by the authorized participant using it s private key

Focus: Smart Contracts

3 Focus: Smart Contracts 1 DRAFT Code is Law! Really? 11

3 Focus: Smart Contracts 2 12

3 Focus: Smart Contracts 3 The DAO Hack The DAO hack led to a hard fork (chain split) (Ethereum Classic was born = Code is Law) 13

3 Focus: Smart Contracts 4 DRAFT Law is Law!! 14

3 #frompractice 4 Another Trade Finance example: European Commercial Paper (R3 Corda) Real legal contract as reference or attachment here!

Conclusion

4 Conclusion: Secure or not? 1 Predictions DRAFT Blockchain does not reinvent the wheel, though it is a sweetspot of technologies like cryptography, digital signatures and distributed computing, making it therefore possible to create an Internet of Possession in a secure and democratic way.

4 Conclusion: Secure or not? 2 Predictions In the blockchain world, each user can and should own their data, and 'central' players are less vulnerable to data losses and breaches. [William Mougayar] DRAFT When decentralized blockchain protocols start displacing the centralized web services that dominate the current Internet, we'll start to see real internet-based sovereignty. The future Internet will be decentralized. [Olaf Carlson-Wee]

Do you want to know more?

Extra: Cryptocurrencies

E In Cryptocurrencies we trust Do we? 1 Interaction: 21

E Cryptocurrencies 2 Bitcoin / Cryptocurrencies from a User s perspective It s all about the keys Posessession is nine-tenth of the law - In Bitcoin it s 10/10! (Private) Keys: o You can loose it o Misplace it o Have it stolen Or accidently give the wrong amount to someone There is no recourse it s like: you just throwed away your money from a high bridge! DRAFT 22

E Cryptocurrencies 3 Bitcoin is kind of inofficial digital Cash or Gold, so you don t want to loose it.. What you can do You can backup your keys like any file Store multiple copies Print it on paper and keep it in a bank tresor (cold storage) 23