Introduc)on to Bitcoin

Similar documents
Jan Møller Co-founder, CTO Chainalysis

Introduction to Bitcoin I

ENEE 457: E-Cash and Bitcoin

Smalltalk 3/30/15. The Mathematics of Bitcoin Brian Heinold

Problem: Equivocation!

Bitcoin (Part I) Ken Calvert Keeping Current Seminar 22 January Keeping Current 1

Hawk: The Blockchain Model of Cryptography and Privacy-Preserving Smart Contracts. Yashar Dehkan Asl

CS 4770: Cryptography. CS 6750: Cryptography and Communication Security. Alina Oprea Associate Professor, CCIS Northeastern University

CS 4770: Cryptography. CS 6750: Cryptography and Communication Security. Alina Oprea Associate Professor, CCIS Northeastern University

Bitcoin, a decentralized and trustless protocol

Chapter 13. Digital Cash. Information Security/System Security p. 570/626

Computer Security. 14. Blockchain & Bitcoin. Paul Krzyzanowski. Rutgers University. Spring 2019

DAVID ANDREWS, FOUNDER RYATTA BLOCKCHAIN FOUNDATIONS

Elphyrecoin (ELPH) a Private, Untraceable, ASIC-Resistant CryptoCurrency Based on CryptoNote

University of Duisburg-Essen Bismarckstr Duisburg Germany HOW BITCOIN WORKS. Matthäus Wander. June 29, 2011

EECS 498 Introduction to Distributed Systems

Ensimag - 4MMSR Network Security Student Seminar. Bitcoin: A peer-to-peer Electronic Cash System Satoshi Nakamoto

Blockchain. CS 240: Computing Systems and Concurrency Lecture 20. Marco Canini

Security Analysis of Bitcoin. Dibyojyoti Mukherjee Jaswant Katragadda Yashwant Gazula

Bitcoin. Arni Par ov. December 17, 2013

Bitcoin and Blockchain

TOPPERCASH TOPPERCASH WHITEPAPER REFORM THE BEST OF BLOCKCHAIN

SpaceMint Overcoming Bitcoin s waste of energy

BITCOIN PROTOCOL & CONSENSUS: A HIGH LEVEL OVERVIEW

P2P BitCoin: Technical details

Bitcoin/Namecoin/*coin: On Bitcoin like protocols and their relation to other IT-Security issues

Blockchain without Bitcoin. Muralidhar Gopinath October 19, 2017 University at Albany

Bitcoin. CS6450: Distributed Systems Lecture 20 Ryan Stutsman

Biomedical Security. Cipher Block Chaining and Applications

Lecture 9. Anonymity in Cryptocurrencies

Biomedical Security. Some Security News 10/5/2018. Erwin M. Bakker

As a 3rd generation currency, not only are transactions secured, private and fast, you actually get paid for holding DigitalPrice coins.

Key concepts of blockchain

What is Bitcoin? Consensus technology has the power to do for economics what the internet did for information - Dan Larimer

Blockchain for Enterprise: A Security & Privacy Perspective through Hyperledger/fabric

Bitcoin, Security for Cloud & Big Data

ICS 421 & ICS 690. Bitcoin & Blockchain. Assoc. Prof. Lipyeow Lim Information & Computer Sciences Department University of Hawai`i at Mānoa

Blockchain Certification Protocol (BCP)

Cryptography and Cryptocurrencies. Intro to Cryptography and Cryptocurrencies

Applied cryptography

Key Security Issues for implementation of Digital Currency, including ITU-T SG17 activities

BLOCKCHAIN Blockchains and Transactions Part II A Deeper Dive

The power of Blockchain: Smart Contracts. Foteini Baldimtsi

About cryptocurrencies and blockchains part 1. Jyväskylä 17th of April 2018 Henri Heinonen

BYZANTINE CONSENSUS THROUGH BITCOIN S PROOF- OF-WORK

CSE 5852, Modern Cryptography: Foundations Fall Lecture 26. pk = (p,g,g x ) y. (p,g,g x ) xr + y Check g xr +y =(g x ) r.

ILCOIN White Paper. In ILCOIN We Trust ILCOIN

A Perspective on Bitcoin and Blockchain

SOME OF THE PROBLEMS IN BLOCKCHAIN TODAY

ECC: Peer-to-Peer Electronic Cash with Trustless Network Services

Alternatives to Blockchains. Sarah Meiklejohn (University College London)

Privacy Enhancing Technologies CSE 701 Fall 2017

BBc-1 : Beyond Blockchain One - An Architecture for Promise-Fixation Device in the Air -

Biomedical and Healthcare Applications for Blockchain. Tiffany J. Callahan Computational Bioscience Program Hunter/Kahn Labs

Blockchains & Cryptocurrencies

REM: Resource Efficient Mining for Blockchains

Who wants to be a millionaire? A class in creating your own cryptocurrency

International Journal of Computer Engineering and Applications, Volume XIII, Issue II, Feb. 19, ISSN

Ergo platform. Dmitry Meshkov

Transactions as Proof-of-Stake! by Daniel Larimer!

Lecture 12. Algorand

Security: Focus of Control

How Bitcoin achieves Decentralization. How Bitcoin achieves Decentralization

Blockchain (a.k.a. the slowest, most fascinating database you ll ever see)

The Blockchain. Josh Vorick

DEV. Deviant Coin, Innovative Anonymity. A PoS/Masternode cr yptocurrency developed with POS proof of stake.

Digital Currencies: Algorithms and Protocols

Analyzing Bitcoin Security. Philippe Camacho

A Gentle Introduction To Bitcoin Mining

Distributed Ledger Technology & Fintech Applications. Hart Montgomery, NFIC 2017

CCP: Conflicts Check Protocol for Bitcoin Block Security 1

Bitcoin. Tom Anderson

A HASH-CASH BASED MUSIC STREAMING PAYMENT SYSTEM. Timothy Chen San Jose State University Fall 2014

Short review of the Coinmama.com. Registration on the Coinmama

The Design of an Anonymous and a Fair Novel E-cash System

A simple approach of Peer-to-Peer E-Cash system

Radix - Public Node Incentives

WHITEPAPER 1.0 Boostx, Lead Developer BoxyCoin

Proof of Stake Made Simple with Casper

Darkcoin: Peer to Peer Crypto Currency with Anonymous Blockchain Transactions and an Improved Proof of Work System

XSN coin. TPoS Setup Guide.

Whitepaper Rcoin Global

Bitcoin (and why it uses SO much energy)

Neel Gupte. Index Terms Bitcoin, Cryptocurreny, Block Chain, Hashing, Proof-of-Work, Double-spending, Momentum Method, Proof of Stake.

Let's build a blockchain!

Consensus & Blockchain

Ergo platform: from prototypes to a survivable cryptocurrency

BLOCKCHAIN The foundation behind Bitcoin

Adapting Blockchain Technology for Scientific Computing. Wei Li

Blockchain & Distributed Internet Infrastructure

The Bitcoin Transaction Graph: Anonymity

Anupam Datta CMU. Fall 2015

Hyperledger fabric: towards scalable blockchain for business

Introducing Cloud Currencies

Technical White Paper of. MOAC Mother of All Chains. June 8 th, 2017

Prelude. The notes within this Whitepaper publication are intended to formally document the concepts and features of the Aegeus cryptocurrency.

Adapting Blockchain Technology for Scientific Computing. Wei Li

New Cryptocurrency Protocol without Proof of Work

Payment systems. Tuomas Aura CSE-C3400 Information security. Aalto University, autumn 2014

Reliability, distributed consensus and blockchain COSC412

Transcription:

Introduc)on to Bitcoin

CONTENTS What is Bitcoin Who created it? Who prints it? How does Bitcoin work? The characteris5cs of Bitcoin

WHAT IS BITCOIN Bitcoin is a form of digital currency, created and held electronically. No one controls it. Bitcoins aren t printed, like dollars or euros they re produced by people, and increasingly businesses, running computers all around the world, using sogware that solves mathema)cal problems. It s the first example of a growing category of money known as cryptocurrency.

The characteris5cs of Bitcoin EASY Person to Person Send bitcoin from your computer, tablet, smart phone or other device, to anyone, anywhere in the world, day or night. SECURE Strong cryptography OPEN Fully decentralized Bitcoin verifies transac)ons with the same state-of-the-art encryp)on used in banking, military and government applica)ons. Bitcoin is open-source. Nobody owns it; the most popular client is maintained by a community of open-source developers. FAIR Minimal Fees Using the Bitcoin network is free, except for a voluntary fee you can use to speed up transac)on processing.

Who created it? A sogware developer called Satoshi Nakamoto proposed bitcoin, which was an electronic payment system based on mathema)cal proof. The idea was to produce a currency independent of any central authority, transferable electronically, more or less instantly, with very low transac)on fees.

Who prints it? No one. This currency isn t physically printed by a central bank. Some argue central banks are unaccountable to the popula)on and can simply produce more money to cover the na)onal debt, thus devaluing their currency. Instead, bitcoin is created digitally, by a community of people anyone can join. Bitcoins are mined, using compu)ng power in a distributed network. This network also processes transac)ons made with the virtual currency, effec)vely making bitcoin its own payment network.

Security in Bitcoin Authen)ca)on Am I paying the right person? Not some other impersonator? Integrity Is the coin double-spent? Can an avacker reverse or change transac)ons? Availability Can I make a transac)on any)me I want? Confiden)ality Are my transac)ons private? Anonymous?

Security in Bitcoin Authen)ca)on à Public Key Crypto: Digital Signatures Am I paying the right person? Not some other impersonator? Integrity à Digital Signatures and Cryptographic Hash Is the coin double-spent? Can an avacker reverse or change transac)ons? Availabilityà Broadcast messages to the P2P network Can I make a transac)on any)me I want? Confiden)alityà Pseudonymity Are my transac)ons private? Anonymous?

Public Key Crypto: Encryp)on Key pair: public key and private key

Public Key Crypto: Encryp)on Key pair: public key and private key

Public Key Crypto: Digital Signature First, create a message digest using a cryptographic hash Then, encrypt the message digest with your private key Authen)ca)on Integrity

Cryptographic Hash Func)ons Consistent: hash(x) always yields same result One-way: given Y, hard to find X s.t. hash(x) = Y Collision resistant: given hash(w) = Z, hard to find X such that hash(x) = Z Message of arbitrary length Hash Fn Fixed Size Hash 13

Back to BitCoin Valida)on Is the coin legit? (proof-of-work) à Use of Cryptographic Hashes How do you prevent a coin from double-spending? à Broadcast to all nodes Crea)on of a virtual coin/note How is it created in the first place? à Provide incen)ves for miners How do you prevent infla)on? (What prevents anyone from crea)ng lots of coins?) à Limit the crea)on rate of the BitCoins

Preven)ng Double-spending The only way is to be aware of all transac)ons. Each node (miner) verifies that this is the first spending of the Bitcoin by the payer. Only when it is verified it generates the proofof-work and avach it to the current chain.

Bitcoin Network Each P2P node runs the following algorithm: New transac)ons are broadcast to all nodes. Each node (miners) collects new transac)ons into a block. Each node works on finding a proof-of-work for its block. (Hard to do. Probabilis)c. The one to finish early will probably win.) When a node finds a proof-of-work, it broadcasts the block to all nodes. Nodes accept the block only if all transac)ons in it are valid (digital signature checking) and not already spent (check all the transac)ons). Nodes express their acceptance by working on crea)ng the next block in the chain, using the hash of the accepted block as the previous hash.

Prac)cal Limita)on At least 10 mins to verify a transac)on. Agree to pay Wait for one block (10 mins) for the transac)on to go through. But, for a large transac)on ($$$) wait longer. Because if you wait longer it becomes more secure. For large $$$, you wait for six blocks (1 hour).