Blockchain Wallets, Public Keys and Tokens

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson
Download our mobile app to listen on the go
Get App

Questions and Answers

Which of the following best describes the primary function of a blockchain wallet?

  • To execute smart contracts on a blockchain network.
  • To provide real-time cryptocurrency market analysis.
  • To mine new cryptocurrency blocks.
  • To store and manage digital assets, enabling users to perform transactions. (correct)

How do public and private keys work together to secure transactions?

  • The public key is used to digitally sign transactions, while the private key is used to verify the signature.
  • The public key is used to identify the user on the blockchain, while the private key confirms their identity.
  • The public key is used to provide an address for depositing and receiving funds, and the private key allows control over the funds. (correct)
  • The private key is used to encrypt transactions, and the public key is used to decrypt them.

Which of the following is a key characteristic that distinguishes deterministic wallets from non-deterministic wallets?

  • Deterministic wallets generate keys randomly, while non-deterministic wallets derive keys from a seed value.
  • Deterministic wallets only support a single cryptocurrency, while non-deterministic wallets support multiple.
  • Deterministic wallets require regular backups, whereas non-deterministic wallets do not due to their random key generation.
  • Deterministic wallets derive keys from a seed value, whereas non-deterministic wallets generate keys randomly. (correct)

What is a potential disadvantage of using deterministic wallets that users should be aware of?

<p>If the seed phrase is compromised or lost, the entire wallet's contents are at risk. (C)</p> Signup and view all the answers

How do Hierarchical Deterministic (HD) wallets improve upon non-deterministic wallets?

<p>They offer a more secure and efficient way to manage multiple addresses and keys using a tree structure derived from a seed. (D)</p> Signup and view all the answers

What is a primary vulnerability associated with brain wallets?

<p>They are prone to password guessing and brute force attacks. (C)</p> Signup and view all the answers

In the context of cryptocurrency wallets, what distinguishes paper wallets from hardware wallets?

<p>Paper wallets refer to key material printed on paper, while hardware wallets use a tamper-resistant device to store keys. (C)</p> Signup and view all the answers

What is a potential risk associated with using online wallets for cryptocurrency storage?

<p>Users need to trust the online wallet service provider, making them vulnerable to service provider risks. (A)</p> Signup and view all the answers

What is the purpose of tokenization in the context of blockchain technology?

<p>To convert rights to an asset into a digital token on a blockchain. (A)</p> Signup and view all the answers

Which of the following statements accurately distinguishes between fungible and non-fungible tokens?

<p>Fungible tokens are divisible into smaller units and are interchangeable, whereas non-fungible tokens represent unique assets and are not interchangeable. (A)</p> Signup and view all the answers

What is a key characteristic of a definition for a cryptocurrency?

<p>It uses cryptographic techniques to regulate the generation of units and verify transfers of funds independently of a central bank. (B)</p> Signup and view all the answers

How are altcoins generally created?

<p>Via hard forks of existing cryptocurrencies or the creation of entirely new codebases. (D)</p> Signup and view all the answers

What distinguishes alternative chains from altcoins in the context of approaches to Bitcoin?

<p>Alternative chains aim to build a decentralized blockchain platform, while altcoins primarily introduce a new virtual currency. (D)</p> Signup and view all the answers

What primary feature differentiates Zcash from other cryptocurrencies?

<p>Zcash uses Zero-Knowledge Proofs (ZK-SNARKs) to provide complete privacy for its users. (B)</p> Signup and view all the answers

What is the significance of the Scrypt algorithm in Litecoin?

<p>It enables faster transaction processing due to its faster block generation time, using it as a Proof-of-Work. (D)</p> Signup and view all the answers

What is a potential negative consequence of a hard fork in a blockchain like Ethereum?

<p>It can split the user community due to disagreements over the changes. (A)</p> Signup and view all the answers

In the context of ERC token standards, what does ERC stand for?

<p>Ethereum Request for Comments (C)</p> Signup and view all the answers

What is the main role of ERC standards?

<p>To dictate guidelines and rules for creating and deploying smart contracts on the Ethereum blockchain. (D)</p> Signup and view all the answers

What fundamental functionality does ERC-20 provide as a specification?

<p>The specification establishes rules and guidelines related to creating fungible tokens on the Ethereum blockchain. (C)</p> Signup and view all the answers

How does ERC-777 enhance the ERC-20 standard?

<p>It divides tokens further by allowing smart contracts to subscribe to token transfers by introducing 'hooks'. (A)</p> Signup and view all the answers

What is 'tokenization' described as?

<p>Converting the rights to an asset into a digital token on a blockchain. (A)</p> Signup and view all the answers

What is one of the limitations of ERC-20 Fungible Tokens?

<p>Slow transaction speed (C)</p> Signup and view all the answers

Which standard is an Extension of ERC20?

<p>ERC827 (C)</p> Signup and view all the answers

Which of the following statements is most accurate?

<p>Metamask wallets are covered in this class. (C)</p> Signup and view all the answers

What is a key attribute of Non-deterministic wallets?

<p>Are also called just a bunch of key wallets. (C)</p> Signup and view all the answers

What is the disadvantage of brain wallets?

<p>This method is prone to password guessing and brute force attacks. (B)</p> Signup and view all the answers

Which altcoin was released in 2016?

<p>Zcash (B)</p> Signup and view all the answers

Which Proof of Work does Litecoin use?

<p>Scrypt (B)</p> Signup and view all the answers

Which statement is not true?

<p>ERC-777 guarantees operation with compatible dApps (A)</p> Signup and view all the answers

Why is it bad to have a hard fork?

<p>It splits the user community due to disagreement. (C)</p> Signup and view all the answers

Which ERC standard is backwards compatible with ERC-20?

<p>ERC-777 (B)</p> Signup and view all the answers

Which ERC standard Provides additional transaction data?

<p>ERC-827 (D)</p> Signup and view all the answers

Which advantage does Allows operators for managed transactions?

<p>ERC-777 (A)</p> Signup and view all the answers

What is a potential downside to using ERC-827?

<p>High gas costs (C)</p> Signup and view all the answers

Flashcards

Blockchain Wallet

A software program allowing users to buy, sell, and monitor their digital currency or cryptocurrency balance. It stores public and private keys and records transactions on the blockchain.

Non-deterministic wallets

Wallets that contain randomly generated private keys. Managing large numbers of keys is difficult and prone to errors.

Deterministic wallets

Wallets where keys are derived from a seed value via hash functions, commonly represented by mnemonic code words.

Hierarchical Deterministic (HD) wallets

A type of deterministic wallet that stores keys in a tree structure derived from a seed. It allows for more secure and efficient management of multiple addresses.

Signup and view all the flashcards

Brain wallets

Wallets which generate private keys and public addresses based on a passphrase or sequence of words chosen by the user.

Signup and view all the flashcards

Paper and Hardware wallets

A paper-based wallet with the required key material printed on it, requiring physical security. Hardware wallets use a tamper-resistant device to store keys.

Signup and view all the flashcards

Online and Mobile wallets

Wallets stored entirely online and provided as a service via the cloud. Mobile wallets are installed on mobile devices.

Signup and view all the flashcards

Metamask

An Ethereum wallet, installable as a browser extension, designed to run decentralized applications (dApps).

Signup and view all the flashcards

Tokenization

The process of converting rights to an asset into a digital token on a blockchain, allowing any asset (not only money) to be digitally linked to a token.

Signup and view all the flashcards

Non-fungible Tokens (NFT)

Cryptographic tokens representing something unique and not interchangeable.

Signup and view all the flashcards

Fungible Tokens

Tokens that are exchangeable with any other token of the same type. These are divisible into smaller units and not uniform in nature where tokens are identical to each other.

Signup and view all the flashcards

Cryptocurrency

A digital currency that uses cryptographic techniques to regulate the generation of currency units and verify fund transfers independently of a central bank.

Signup and view all the flashcards

Altcoins

Alternative cryptocurrencies created after Bitcoin, often generated via hard forks or new code.

Signup and view all the flashcards

Namecoin

The first alternative coin project introduced in 2011.

Signup and view all the flashcards

Zcash

The first cryptocurrency using Zero-Knowledge Proofs (ZK-SNARKs), providing complete user privacy.

Signup and view all the flashcards

Litecoin

A fork of Bitcoin's source code released in 2011, using Scrypt for faster transactions.

Signup and view all the flashcards

ERC (Ethereum Request for Comment)

A technical document that dictates guidelines and rules for creating and deploying a smart contract on the Ethereum blockchain.

Signup and view all the flashcards

Ether (ETH)

The native token used by the Ethereum blockchain and network for verifying transactions.

Signup and view all the flashcards

ERC-20 Token

The standard for creating smart contract-enabled fungible tokens to be used in the Ethereum ecosystem, making assets interchangeable.

Signup and view all the flashcards

Study Notes

  • Lecture covers Wallets and Tokens within Blockchain and Cryptocurrency

Wallets

  • Blockchain wallets are software programs enabling users to buy, sell, and monitor balances for digital currencies or cryptocurrencies
  • Blockchain wallets store private and public keys
  • They keep records of all cryptocurrency transactions on the blockchain
  • Public Key represents the address to deposit and receive funds

Public and Private Keys

  • Analogy of colors illustrates how public and private keys help secure transactions between parties

Types of Wallets

  • Non-deterministic Wallets
    • These wallets contain randomly generated private keys
    • They are nicknamed "just a bunch of keys" wallets
    • Bitcoin core client generates keys when first started and as needed
    • Disadvantages of non-deterministic wallets:
      • Managing many keys can be difficult and error-prone
      • Can lead to theft and loss of coins
      • Require regular backups
      • Need encryption for theft or loss prevention
  • Deterministic Wallets derive keys from a seed value using hash functions
    • A seed number is generated randomly and usually represented by human-readable mnemonic code words
    • Mnemonic code words were defined in Bitcoin Improvement Proposal BIP 39
      • The mnemonic phrase can recover all keys, simplifying private key management
      • Electrum is an example of a deterministic wallet
    • Disadvantage: Single point of failure exists because seed phrase simplifies backup, an entire wallet's contents are at risk if the phrase is compromised or lost.
  • Hierarchical Deterministic (HD) Wallets store keys in a tree structure derived from a seed
    • The seed generates a parent key (master key) used to generate child then grandchild keys
    • This is defined in BIP32 and BIP44
    • HD wallets advance non-deterministic wallets by managing multiple addresses and keys more securely and efficiently
      • Trezor, Jaxx, and Electrum are commercially available HD wallets
    • If the seed phrase is not complex enough or stored improperly, there is potential vulnerability to brute force attacks
  • Brain Wallets let users generate private keys and corresponding public addresses using a passphrase or sequence of chosen words
    • Unlike hierarchical wallets (which use algorithms to derive keys from a seed), brain wallets directly use the passphrase as the private key
    • Disadvantage: Prone to password guessing and brute force attacks; key stretching can slow down attackers.
  • Paper Wallets are paper-based with printed key material requiring physical security for storage
    • These wallets can be generated online from service providers like bitcoinpaperwallet.com or bitaddress.org
  • Hardware Wallets typically use a tamper resistant device to store keys
    • Another is to use a tamper-resistant device to store keys
    • A custom-built device or Secure Element (SE) in NFC phone can be used
    • Trezor and Ledger (various types) are common Bitcoin hardware wallets
  • Online Wallets are stored online, provided as a service, and usually via the cloud
    • Users can manage their wallets and perform functions via a web interface
    • Users must trust the online wallet service provider, e.g., GreenAddress
  • Mobile Wallets are installed on mobile devices
    • They enable payments via smartphone cameras which can scan QR codes quickly
    • They're available for Android and iOS; examples include Blockchain, breadwallet, Copay, and Jaxx
      • Web wallets and hosted wallets as well as "physical storage facilities" like Xapo and Vo1t can be considered mobile wallets

Metamask Wallet

  • Ethereum wallet that can be installed as a Chrome extension
  • Helps run dApps without being part of the Ethereum network
  • Interfaces with Infura (where smart contracts can be run)

Tokenization

  • Tokenization converts rights to an asset into a digital token on a blockchain
  • Assets (not just money) can be linked digitally to a token
    • Gold, real estate, and stocks can be represented on a blockchain using tokens
  • Two token types:
    • Non-fungible
    • Fungible

Non-Fungible Tokens (NFTs)

  • NFTs are cryptographic tokens representing something unique
  • NFTs are not interchangeable
  • NFTs are not divisible into smaller units
  • Applications:
    • Creating verifiable digital scarcity
    • Crypto gaming, such as Crypto Kitties on Ethereum
    • Representing digital art or music ownership
  • The Non-Fungible Token protocol is defined in ERC-721 (a token standard).

Fungible Tokens

  • These tokens can be exchanged with any other token of the same type of divisible into smaller units
  • Not uniform in nature, all tokens are identical to each other in nature
    • Similar to fiat currencies
  • Fungible token standard is defined in ERC-20

Cryptocurrencies Definition

  • Digital currency using cryptographic techniques to regulate currency generation and verify fund transfers
  • Operates independently of a central bank

Altcoins

  • An altcoin is generated in the case of a hard fork via forking, all together new code or modification of old code
  • Methods of providing the initial amount of new coins when a cryptocurrency is launched
  • Could create a new blockchain: Proof of Burn (PoB), Proof of ownership, Pegged sidechains

First Altcoin

  • Namecoin was the first alternative coin project, introduced in 2011
  • Two categories for bitcoin alternatives, based on primary purpose:
    • Alternative chains aim to build a decentralized blockchain platform
    • Altcoins intend to introduce a new virtual currency

Other Altcoins

  • Prevalent altcoins other than Namecoin include Zcash, Litecoin, and Primecoin
  • Zcash was introduced in 2016

Zcash Data

  • Zcash is the first currency to use Zero-Knowledge Proofs (ZK-SNARKs) for complete user privacy
  • These proofs are concise and easy to verify, maintaining privacy
    • Setting up initial parameters is a complicated process and needs to set up the proving key and verifying key
  • Attribute data for Zcash:
    • Launch Date: 28/10/16
    • Currency code: ZEC
    • Maximum coins: 21 million (like Bitcoin)
    • Block Time: 10 minutes
    • Consensus: Proof of Work (equihash)
    • Difficulty adjustment algorithm: DigiShield V3 (modified)
    • Mining hardware: CPU, GPU
    • Difficulty adjustment period: 1 block

Litecoin Data

  • Litecoin is a fork of the Bitcoin source code (2011)
  • Uses Scrypt as PoW for faster transactions, with a faster block generation time of 2.5 minutes
  • Scrypt features:
    • Memory hard function for the SHA-256 based PoW algorithm
    • Originally proposed as Password-Based Key Derivation Function (PBKDF)
    • A large array of pseudorandom bits must be held in memory
    • Algorithm is based on the Time-Memory Trade-Off (TMTO)
  • Difficulty readjustment is achieved every 3.5 days roughly due to faster block generation time
  • Litecoin total coin supply is 84 million

Hard Fork in Ethereum

  • A hard fork on Ethereum created a new currency : Ethereum Classic (ETC)
  • Ethereum Classic is the old chain and Ether is the new chain
  • Bad because: opposes decentralization, splits user community due to disagreement
  • Raises the question of distinction between the Altcoin with either ETH or ETC because it is the result of a chain split

ERC Token Standards

  • ERC (Ethereum Request for Comment) constitutes technical documentation outlining guidelines and rules for creating & deploying smart contracts on the Ethereum blockchain
  • ERC-20, 721, 777, 1155 are examples of commonly used ERC standards

ERC-20 and ERC-777 Fungible Tokens

  • Ether (ETH) serves as the native token in Ethereum for verifying transactions
  • ERC-20 creates smart contract-enabled fungible tokens within the Ethereum ecosystem
  • ERC-20 properties:
    • Interchangable and compatible with currencies and smart contracts
    • Guarantees operation with compatible dApps
    • Provides transaction receipts
    • Widely used and Supported
    • High gas costs, low scalability, slow transaction speed.
  • ERC-777 has backward compatibility with ERC-20 and is more efficient for token transfers

Comparing standards ERC-223 and ERC-827

  • ERC-20 is the most widely used with no protection
  • ERC-223 has backward compatibility and provides token loss protection
  • ERC-777 has backward compatibility, introduces hooks, improves interaction and safety
  • ERC-827, backward compatibility, Single-step transfer of date, higher gas cost and requires security due to hooks

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Related Documents

More Like This

Use Quizgecko on...
Browser
Browser