Cryptography Concepts

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson
Download our mobile app to listen on the go
Get App

Questions and Answers

What is a significant challenge associated with symmetric encryption when multiple parties need to communicate?

  • The need for only one key pair per person.
  • Simplified key exchange using public keys.
  • The ability to directly sign messages, ensuring non-repudiation.
  • The large number of keys required, specifically $n(n-1)/2$ for _n_ parties. (correct)

Asymmetric encryption requires the secure exchange of a shared secret before communication can begin.

False (B)

How many key pairs are needed in asymmetric encryption for a group of 20 people to communicate securely with each other?

20

In asymmetric encryption, messages can be digitally signed by encrypting them with the sender's ______ key.

<p>private</p> Signup and view all the answers

Match the following encryption types with their key characteristics:

<p>Symmetric Encryption = Requires a shared secret key between communicating parties. Asymmetric Encryption = Uses a public key for encryption and a private key for decryption. Digital Signatures = Achieved by encrypting a message with the sender's private key. Key Exchange Problem = Mitigated in asymmetric encryption due to the use of public keys.</p> Signup and view all the answers

Which of the following is NOT a typical application of asymmetric encryption?

<p>Bulk data encryption (D)</p> Signup and view all the answers

A hashing algorithm designed to be collision-free must have a hash value shorter than the initial data.

<p>False (B)</p> Signup and view all the answers

What is the primary security goal achieved by hashing functions?

<p>integrity</p> Signup and view all the answers

In asymmetric cryptography, a simple key exchange is achieved through the use of a ______ and a private key.

<p>public</p> Signup and view all the answers

Match the following encryption types with their key management characteristics:

<p>Symmetric Encryption = Single shared key Asymmetric Encryption = Public and private key pair</p> Signup and view all the answers

Which of the following algorithms is used in asymmetric encryption?

<p>RSA (D)</p> Signup and view all the answers

Knowing the hash value of a message guarantees the ability to reconstruct the original message.

<p>False (B)</p> Signup and view all the answers

What is the term for when different initial data produces the same hash value?

<p>collision</p> Signup and view all the answers

Which event marked the official launch of the Bitcoin Foundation?

<p>September 2013 (D)</p> Signup and view all the answers

Mastercoin, the first Altcoin, emerged after the release of the Ethereum whitepaper.

<p>False (B)</p> Signup and view all the answers

Which of the following technologies or concepts was introduced before Bitcoin's white paper in 2008?

<p>Hashcash (D)</p> Signup and view all the answers

What year did a bug in the Ethereum DAO code get exploited, resulting in the theft of $50M in ether?

<p>2016</p> Signup and view all the answers

A(n) ______ in blockchain is any computer or hardware device connected to the blockchain network.

<p>node</p> Signup and view all the answers

Hal Finney's Bitcoin transaction occurred before the Bitcoin Genesis block was mined.

<p>False (B)</p> Signup and view all the answers

What is the name of the decentralized digital currency and smart contract introduced by Nick Szabo?

<p>bit gold</p> Signup and view all the answers

Match the following events/ entities with the corresponding year:

<p>Bitcoin marketplace surpasses $1 Billion, First bitcoin ATM unveiled, The University of Nicosia in Cyprus accepts Bitcoin = 2013 Establishment of R3: a consortium of over 40 financial Institutions committed to implementing blockchain technology = 2014 Linux Foundation unveils Hyperledger to boost blockchain development = 2015 Bug in Ethereum DAO code exploited, causing theft of $50M in ether = 2016</p> Signup and view all the answers

In 2012, ______ a payment protocol focusing on integration with banking systems was launched.

<p>Ripple</p> Signup and view all the answers

Which of the following blockchain platforms is tailored for the entertainment industry?

<p>TRON (C)</p> Signup and view all the answers

What characterizes Blockchain 4.0 (2018-future)?

<p>Integration with IoT, AI, and Big Data. (B)</p> Signup and view all the answers

What event marked the first real-world valuation of Bitcoin?

<p>The first Bitcoin purchase of a pizza (B)</p> Signup and view all the answers

Namecoin has the same mining algorithm as Bitcoin, but faster transaction speeds.

<p>False (B)</p> Signup and view all the answers

A 'Ledger' in blockchain refers to a type of cryptocurrency wallet.

<p>False (B)</p> Signup and view all the answers

Who introduced a general cryptographic theory for secured chains in 2000?

<p>Stefan Knost</p> Signup and view all the answers

Match the following milestones with their corresponding years:

<p>Bitcoin Whitepaper Release = 2008 First Bitcoin Transaction = 2009 First Bitcoin Purchase = 2010 Bitcoin Parity with USD = 2011</p> Signup and view all the answers

In a peer-to-peer network, what does each node possess?

<p>A ledger consisting of a sequence of blocks they've reached consensus on. (C)</p> Signup and view all the answers

A block selected by the consensus protocol is only valid if all nodes in the network proposed it.

<p>False (B)</p> Signup and view all the answers

What happens to outstanding transactions that do not make it into a particular block?

<p>They wait to be included in the next block.</p> Signup and view all the answers

________ is the study of strategies involved in complex games.

<p>Game Theory</p> Signup and view all the answers

Which of the following is an example of a game theory concept or problem?

<p>The Byzantine General's Problem (C)</p> Signup and view all the answers

In the Two General Problem, the generals can successfully attack if, and only if, they both attack at different times.

<p>False (B)</p> Signup and view all the answers

What is the primary challenge in the Two General Problem?

<p>Reliable communication between the generals.</p> Signup and view all the answers

Match the following concepts with their descriptions:

<p>Distributed Consensus = Agreement among multiple participants in a distributed system. Game Theory = Analysis of strategic interactions. Two General Problem = Challenge of coordinating an attack with unreliable communication.</p> Signup and view all the answers

What is the primary incentive for validators in a Proof of Stake (PoS) system to verify transactions?

<p>Earning transaction fees from the block they validate. (B)</p> Signup and view all the answers

In a Proof of Stake system, validators are guaranteed selection for forging the next block if they have the largest stake.

<p>False (B)</p> Signup and view all the answers

In the context of Proof of Stake, what is 'coin age' and how is it calculated?

<p>Coin age is calculated by multiplying the number of days the coins have been held as stake by the number of coins that are staked. It influences a node’s eligibility to forge new blocks.</p> Signup and view all the answers

Validators in a Proof of Stake system risk losing a portion of their ______ if they verify fraudulent transactions.

<p>stake</p> Signup and view all the answers

Match the following block selection methods with their descriptions:

<p>Randomized Block Selection = Validators are selected based on a combination of the lowest hash value and the highest stake. Coin Age Selection = Nodes are chosen based on how long their tokens have been staked.</p> Signup and view all the answers

Why do Proof of Stake systems often start with pre-mined coins or Proof of Work before transitioning?

<p>To distribute initial coin ownership and establish network security. (B)</p> Signup and view all the answers

The relationship between stake size and the chance of being selected as a validator in Proof of Stake is non-linear.

<p>False (B)</p> Signup and view all the answers

What happens to a validator's stake and transaction fees if they decide to stop being a validator in a Proof of Stake system?

<p>The validator’s stake plus any accumulated transaction fees will be released after a certain period of time.</p> Signup and view all the answers

Flashcards

Symmetric Encryption

Encryption using a single, shared secret key for both encryption and decryption.

Key Exchange Problem

A weakness of symmetric encryption is the secure exchange of the shared key before communication.

Symmetric Key Management

Managing shared secrets becomes unwieldy as the number of communicating parties increases.

Asymmetric Encryption

Encryption using a pair of keys: a public key for encryption and a private key for decryption.

Signup and view all the flashcards

Digital Signature

Using your private key to encrypt a message, proving its origin and ensuring it hasn't been tampered with.

Signup and view all the flashcards

Hashcash

A proof-of-work system introduced before Bitcoin.

Signup and view all the flashcards

Bit gold

A concept for decentralized digital currency and smart contracts.

Signup and view all the flashcards

Stefan Knost

Introduced a cryptographic theory for secured chains.

Signup and view all the flashcards

Satoshi Nakamoto

The pseudonymous creator of Bitcoin.

Signup and view all the flashcards

Bitcoin Pizza

First real-world transaction using Bitcoin.

Signup and view all the flashcards

Litecoin

Alternative to Bitcoin with faster transaction speeds.

Signup and view all the flashcards

Namecoin

First Bitcoin fork.

Signup and view all the flashcards

Ripple

A payment protocol that focuses on integration with banking systems.

Signup and view all the flashcards

Bitcoin Foundation Launch

Founded in September 2012, it aimed to standardize and promote Bitcoin.

Signup and view all the flashcards

Altcoin

An alternative cryptocurrency to Bitcoin; Mastercoin was one of the first.

Signup and view all the flashcards

Ethereum

A decentralized, open-source blockchain featuring smart contract functionality.

Signup and view all the flashcards

R3 Consortium

A permissioned distributed ledger consortium of financial institutions.

Signup and view all the flashcards

Smart Contracts

These automatically execute the terms of a contract when conditions are met.

Signup and view all the flashcards

Node

A device connected to the internet that participates in a blockchain network.

Signup and view all the flashcards

Ledger

A public record of transactions maintained across multiple computers.

Signup and view all the flashcards

Wallet

A file that stores the cryptographic keys used to access and manage cryptocurrencies.

Signup and view all the flashcards

Types of Asymmetric Encryption

Asymmetric encryption methods used in cybersecurity.

Signup and view all the flashcards

Symmetric Encryption Domain

Confidentiality only.

Signup and view all the flashcards

Asymmetric Encryption Domain

Confidentiality, Integrity, Authentication, Non-repudiation.

Signup and view all the flashcards

Symmetric Key Exchange

Complex.

Signup and view all the flashcards

Asymmetric Key Exchange

Simple.

Signup and view all the flashcards

Symmetric Scalability

Not scalable; keys increase exponentially.

Signup and view all the flashcards

Asymmetric Scalability

Scalable.

Signup and view all the flashcards

Hashing

Ensures data integrity and authentication using fixed-length hash values.

Signup and view all the flashcards

Block Proposal

Each node proposes its outstanding transaction pool as the next block.

Signup and view all the flashcards

Consensus Protocol

A protocol where each node's input is its proposed block

Signup and view all the flashcards

Valid Block

A valid block selected as output even if proposed by only one node.

Signup and view all the flashcards

Outstanding Transaction

Valid transactions that didn't make it into a block.

Signup and view all the flashcards

Game Theory

The study of strategies involved in complex games.

Signup and view all the flashcards

Two Generals Problem

A scenario where two generals must attack at the same time to win.

Signup and view all the flashcards

Two Generals Defeat

Both Generals army can defeat the enemy only if they both attack at same time

Signup and view all the flashcards

Block (in Blockchain)

A group of transactions bundled together.

Signup and view all the flashcards

Validators (in PoS)

Participants who stake their personal wealth to validate transactions and create new blocks.

Signup and view all the flashcards

Staking

The act of validators locking up an amount of coins into the network as collateral.

Signup and view all the flashcards

Block Selection Variants

Methods used in Proof of Stake (PoS) to select the next validator to create a block.

Signup and view all the flashcards

Randomized Block Selection

A block selection method where validators are chosen based on a combination of the lowest hash value and the highest stake.

Signup and view all the flashcards

Coin Age Selection

A block selection method that chooses nodes based on how long their tokens have been staked.

Signup and view all the flashcards

Coin Age

Calculated by multiplying the number of days the coins have been held as stake by the number of coins that are staked.

Signup and view all the flashcards

Validator stake slashing

Validators are incentivized to act honestly because they lose a portion of their stake if they verify fraudulent transactions.

Signup and view all the flashcards

Study Notes

Blockchain

  • Blockchain denotes a distributed, replicated peer-to-peer network of databases.
  • It facilitates transactions between multiple non-trusting parties without needing a trusted third party.
  • Blockchain maintains a tamper-resistant, append-only list of time-sequenced records.
  • Blockchain is a type of distributed ledger on the internet for recording transactions and maintaining a permanent, verifiable record of information.

History of Blockchain

  • Satoshi Nakamoto first published the technology in 2008 in a white paper titled "A Peer-to-peer Electronic Cash System".
  • The design aimed to create a decentralized digital currency free from government regulation using peer-to-peer transactions.
  • In 2009, Satoshi Nakamoto implemented Bitcoin, the first application of Blockchain.

Bitcoin and Blockchain

  • Bitcoin and Blockchain are often referred to interchangeably, but are distinct concepts.
  • Blockchain is the foundational technology behind Bitcoin.
  • Around 15,000 mainstream cryptocurrencies exist in the market.

Evolution of Blockchain

  • The 1950s saw the development and adoption of the first computers.
  • Arpanet, the early Internet on a peer-to-peer network, was created in 1969.
  • In 1973, Public-key cryptography was implemented by Clifford Cocks.
  • RSA, a public-key cryptosystem widely used for secure data transmissions was released in in 1977.
  • Ralph Merkle patented hash trees, now called Merkle trees, in 1979.
  • The IBM Personal Computer launched with DOS operating system in 1982.
  • In 1991, Stuart Haber and W Scott Stornetta worked on cryptographically secure chains.
  • Proof-of-work with Hashcash was created in 1997.
  • Nick Szabo introduced bit gold as for decentralized digital currency and smart contracts in 1996.
  • Stefan Knost introduced a general cryptographic theory for secured chains in 2000.
  • Satoshi Nakamoto released the Bitcoin white paper on October 31, 2008, presenting the concept of a peer-to-peer payment system.
  • Bitcoin.org was registered in August 2008.
  • The Bitcoin Genesis block was mined on January 3, 2009.
  • Hal Finney received the first Bitcoin transaction on January 12, 2009, launching Bitcoin's application as a public blockchain.
  • Bitcoin was registered as open source code on October 12, 2009.
  • Bitcoin Market was recognized as a digital currency by October 31, 2009.
  • The first Bitcoin purchase occurred on May 22, 2010 involving 10,000 BTC for a $25 pizza.
  • The Bitcoin marketplace surpassed $1 million on November 6, 2010.
  • Namecoin, the first Bitcoin fork, and Litecoin were released as alternatives to Bitcoin with different mining algorithms and faster transaction speeds in 2011.
  • Bitcoin reached parity with the US dollar (1BTC = 1USD) in 2011.
  • Diaspora, a decentralized social network, and Ripple, a permissioned blockchain, launched in 2012.
  • A payment protocol focusing on integration with banking systems launched in 2012.
  • The Bitcoin Foundation was launched in September 2012.
  • The Bitcoin marketplace surpassed $1 billion on March 28, 2013.
  • The first bitcoin ATM was unveiled on May 2, 2013.
  • The University of Nicosia in Cyprus accepted Bitcoin in 2013.
  • Mastercoin (the first Altcoin) emerged as one of the earliest in 2013
  • Vitalik Buterin released the Ethereum white paper in 2013.
  • In 2014, R3 was established as a consortium of over 40 financial institutions dedicated to implementing blockchain technology.
  • Ethereum Blockchain was funded by crowdsale in 2014.
  • PayPal announced Bitcoin integration and Microsoft accepted Bitcoin in 2014.
  • The Genesis block was created in Ethereum in 2015.
  • Linux Foundation unveiled Hyperledger in 2015 to boost blockchain development.
  • Visa, Citi, Nasdaq, Capital One, and Fiserv invested $30 million in Blockchain startup Chain.com in 2015.
  • A Bug in Ethereum DAO code was exploited, causing a $50M theft in ether in 2016.
  • EOS was unveiled by Block.one in 2017 as a new Blockchain protocol for industry-scale decentralized applications.
  • The Bitcoin marketplace is valued above $2T in 2018.
  • TRON, a blockchain platform for the entertainment industry, first launched in 2018.
  • Other innovations that began around 2018 include business-oriented hybrid blockchain projects and integration with IoT, AI, and Big Data.

Blockchain Architecture

  • Key components include node, ledge, wallet, nonce, hash, mining, and consensus protocol.

Node

  • An electronic device connected to the internet.
  • Any computer or hardware device connected to the blockchain is a node.
  • All nodes hold a copy of the blockchain ledger and are interconnected.
  • Types of nodes can be a full node or a partial node.

Ledger

  • In blockchain, a database of immutable information.
  • Traditional databases operate on the CURD (Create, Read, Update, Delete) principle.
  • Ledgers operate on the principle of Append-Only.

Wallet

  • A digital wallet that allows users to manage cryptocurrency.
  • Blockchain wallets allow users to send and receive cryptocurrency.

Mining

  • A mechanism where nodes validate transactions and add them to the blockchain ledger.

Consensus Protocol

  • A set of rules allowing nodes to agree on the data value or network state, benefiting the network as a whole, instead of individual interests.
  • It is used in blockchain to ensure all transactions are validated before being added.

Encryption

  • A part of human history, used to create secure communications. Its been explored since the era of Roman emperor Gaius Julius Cesar (100–44 BC).
  • Frank Miller (1842–1925) developed one-time pads to enhance Vigenere encryption.
  • The German Army used Enigma during World War II.
  • Enigma is a machine that encrypts and decrypts by identifying the positions of three rotors and a few patches.
  • German U-boats used these codes on paper sheets for months.
  • Enigma was less secure than the perfect Vigenere cipher, and was breached during WWII.

Vigenere Cipher

  • Described in 1553 by Giovan Battista Bellaso.
  • It resisted decryption attempts until 1863.
  • It has the following features: Plaintext: ATTACKATDAWN, Key: LEMONLEMONLE and Ciphertext: LXFOPVEFRNHR

Types of Encryption

  • Symmetric Encryption
  • Asymmetric Encryption

Symmetric Encryption

  • Systems allowing encryption and decryption with knowledge of the algorithm and key.
  • It is easy and does not require complex math.
  • Key exchange and management is critical.
  • The key must be exchanged and done so securely before transmission can begin.
  • Key management problem where both parties know the same secret, its also known as shared secret.
  • In communications with multiple people, n(n-1)/2 keys are needed.
  • A group of 20 people typically needs 190 keys
  • Types of symmetric encryption include Stream cipher (ex, RC4) such as WEP, WPA, SSL, TSL and Block cipher such as (AES, DES, 3DES).

ASymmetric Encryption

  • There are two keys: a public key to encrypt and a private key to decrypt. This system is also known as public key encryption.
  • It simplifies key exchange and management.
  • Only a pair of keys (private/public) is needed for each person.
  • 20 people require only 20 pairs of keys to communicate.
  • It allows users to sign messages encrypting them with their private key.
  • This helps any recipient with the user´s public key to verify the sender and content and thus granting non-repudiation.
  • Types of asymmetric encryption are Diffie-Hellman (IPSec), RSA Algorithm and Elliptic Curve Cryptography.

Symmetric vs. Asymmetric Encryption

  • Symmetric encryption grants confidentiality; Asymmetric encryption offers Integrity, Authentication, and Non-repudiation
  • Symmetric requires a single shared key; Asymmetric uses a public and a private key.
  • Symmetric key exchange is complex, while it it´s simple using asymmetric encryption.
  • Symmetric is not scalable while asymmetric is.
  • Symmetric employs a small key size, asymmetric a big one.
  • Symmetric implementation is fast, while asymmetric is slow.
  • Symmetric is best for Bulk Data and asymmetric encryption for small amounts of data, key exchange, digital envelopes, digital signatures and digital certificates.

Hashing

  • Hashing concerns integrity and authentication, while encryption pertains to confidentiality.
  • Hashing algorithms reduce any data amount to a fixed-length value, better known as the hash value.
  • A hash value behaves like a fingerprint of the initial data.
  • Small data changes result in huge changes in the hash value.
  • It´s harder to guess the original data with a trial-and-error approach.
  • Hashing is a one-way algorithm.
  • The possibility exists that different initial data will have the same hash value since the output is of fixed length.
  • This is known as collision.
  • A well-designed algorithm should prevent collision
  • Create an algorithm without possibility of collision would need a hash value longer than the text.
  • It is not possible to extract the original data by knowing the hash value.
  • Some hashing algorithms like MD5 have a huge amount of collisions.
  • It's possible to find a short string that matches that hash value by just googling it.
  • But said short string may not be the real original message.
  • Hashing can verify if a received file is identical to the sent one.
  • It authenticate users by storing passwords as hashes and comparing the hash of the password provided by the user with the data stored instead of the password itself.

MD5

  • Message Digest 5 is the most famous MD hashing algorithm and is one of the best-known of all hashing algorithms.
  • 128-bit output (32 characters), processing initial data in 512-bit blocks
  • It is deprecated because of its high number of collisions.

SHA (Secure Hash Algorithm)

  • Another series of algorithms similar to MD5.
  • The various algorithms that constitute the SHA series are listed below.
  • SHAO: first version of SHA that due to its significant flaw identified was withdrawn shortly after publication
  • SHA1: produces 160-bit output and is considered at risk of breaking given there isn´t much security.
  • SHA2: set of algorithms that can create outputs of 224-bit, 256-bit, 384 bits and 512 bit. Considered save because it provides 112 to 256 bits of security.
  • SHA3: a set of algorithms like the SHA2 that is based on the Keccak algorithm instead.

Centralization vs Decentralization

  • Decentralization an important concept that is not unique to Bitcoin.
  • The notion of a competing pattern of centralization versus decentralization arises in a variety of different digital technologies
  • It is useful to understand the central conflict between these two to understand how it plays out in blockchain.
  • The Internet is famously decentralized having dominated walled-garden alternatives
  • Email is at its core a decentralized system that´s based on the Simple Mail Transfer Protocol (SMTP), an open standard that faces competition from Facebook or LinkedIn mail, though stays as main solution for person-to-person communication.
  • On instant messaging and text messaging we have instead a hybrid model.
  • Social networking: centralized systems like Facebook and LinkedIn continue to dominate.
  • This conflict predates the digital era
  • Similar struggle is visible in the history of telephony, radio, television, and film.
  • Decentralization is not all or nothing.
  • Most system are purely decentralized or purely Centralized.
  • For example, email is fundamentally a decentralized system
  • It is based on a standardized protocol (SMTP) anyone can operate an email server of their own.
  • Nonetheless a reduced number of centralized webmail providers have become dominant.
  • The Bitcoin protocol is decentralized
  • Services like Bitcoin exchanges and wallet software may be centralized or decentralized to varying degrees.
  • It breaks down into the question of how the Bitcoin protocol achieves decentralization into five specific questions

Centralization vs Decentralization key questions to solve

  • Who maintains the ledger of transactions?
  • Who has authority over which transactions are valid?
  • Who creates new bitcoins?
  • Who determines how the rules of the system change?
  • How do bitcoins acquire exchange value?
  • Different aspects of Bitcoin fall in different areas of the centralization/decentralization spectrum
  • The peer-to-peer network is close to purely decentralized: anyone can run a Bitcoin node as there´s a fairly low barrier to entry.
  • Clients can be easily downloaded and a node can be run in a notebook.
  • There are several thousand nodes.
  • Bitcoin mining is technically also open to anyone, but it requires a high capital cost.
  • A high degree of centralization is visible in the Bitcoin mining ecosystem
  • The Bitcoin community considers this undesirable and as a concentration of power.
  • Thirdly, the updates to the bitcoin nodes´ software also has a significant effect in when and how to change the very rules that keep the system alive.
  • One can imagine that are numerous interoperable implementations of the protocol
  • In practice, most nodes run the reference implementation and its developers are trusted by the community thus earning lots of power

Distributed Consensus

consensus has various applications, studied for decades in computer science.

  • Common motivation: reliability of distributed systems
  • It can be used to build a massive, distributed key-value store.
  • A distributed key-value store can enable build a public key directory or a distributive domain name system.
  • Distributed consensus protocols have two properties.
  • They must to terminate with all honest nodes agreeing on the value.
  • The value must have been generated by an honest node.
  • Cryptocurrencies a peer-to-peer system.
  • If Alice wants to pay Bob, she broadcasts a transaction to all of Bitcoin nodes that comprise the peer-to-peer network.
  • It's not necessary for Bob to participate in the peer network or running a node.
  • He will get the funds no regardless of his participation on the node network.
  • All nodes must agree on exactly which transactions were broadcast and the order these transactions occurred.
  • It results in a single, global ledger for the system.
  • So at any given point, all the nodes in the peer-to-peer network have a ledger consisting of a sequence of blocks each including a list of transactions that they've reached consensus on.
  • Each node has also a pool of outstanding transactions heard about not yet being added to the block chain.
  • For these transactions, consensus has not yet occurred.
  • Each node might have a slightly different version of the outstanding transaction pool.
  • At regular intervals, every ten minutes for example, every node in the system propose its next block
  • The nodes execute some consensus protocol where each node's input is its block.
  • Some nodes may be trying to get a fake transaction accepted.
  • We can assume that all honest nodes should agree.
  • If the protocols succeeds, a valid block will be selected as output
  • Now there may be valid pending transaction to be included in the selected blocked If some transaction did not make it in this time, it just awaits the next block´s validation.

Game Theory

  • Study of strategies involved in complex games.
  • Art of making the best move with optimal strategy for a given situation.
  • Method of modeling real world situations in a game form.
  • And analyzing what the best move of a player could be in a given situation for a desired outcome.
  • Examples are Nash Equilibrium, Prisoner's Dilemma, Byzantine General's Problem and Zero-Sum Games

Two General Problem

  • States a scenario where two generals are attacking a common enemy.
  • Both generals must attack at the same time to reach a common goal or they will loose the battle
  • So, the communication is crucial to their success.
  • General 1 must send a messenger to share a time of attack, that may be captured by enemy.
  • When messenger´s altered message won´t pass the correct details of the attack, their fate is sealed.
  • A new messenger is sent.
  • Once the information is received the same exchange of acknowledgement follows.
  • As messenger can be compromised in any moment, the battle becomes unsolved.

Byzantine Generals Problem

  • An advanced version of the "Two General Problem", where one or more generals can be traitors.
  • Consensus is reached when 2/3 of the actors are honest
  • Otherwise, armies do not coordinate their attack and the enemy wins.
  • When Lieutenant´s 3 command doesn´t match others, the command must go with the majority.
  • If commander sends conflicting info, Lieutenants may retreat.
  • Those problems can´t be avoided.

Computer Science Engineering

  • It unites different concepts from multiple sources to make blockchain possible.
  • This sources are computer science, cryptography, and game theory
  • Hash Pointers and Merkle Tree are main concepts.

Hash-pointers

  • A pointer to a location with its cryptographic hash
  • Verify that info hasn't changed.
  • To build every kind of data structures.
  • We can utilize hash pointers to take a familiar data structure that uses pointers, such as a binary search tree.

Blockchain with hash pointers

  • Provides a tamper-evident property for blockchain.
  • Altered data is easy to discover.
  • Consider what occurs if an adversary attempts to alter data in the middle of the chain.

Merkle Tree

  • Useful data structure using hash pointer in a binary tree.
  • A binary tree with hash pointers is known as Merkle Tree
  • Ralph Merkle is its inventor.

Proof Of Membership

  • Allows a precise block chain´s membership
  • Validates a chain by showing a data block
  • Rest ignores as long as hashes verify through block´s path/root.

Proof Of Non-Membership

  • Also available using Merkle Tree.
  • Shows tree by path to just-before place of missing item .
  • Items being a proof when in consecutive placement.

Blockchain Transaction Process

  • Network broadcasts new transactions to all nodes
  • Nodes validate transactions to accept or reject its authencity.
  • Nodes may then group validate transactions into blocks
  • Consensus is needed amongst nodes for new Block creation.
  • The global system knows no timestamps
  • Adding new blocks done linear regardless.

Block Timestamp

  • All blocks time stamped by arriving order in the chain.
  • The network must unanimously accept block addition in the chain

Proof of Work vs Proof of Stake

  • This consensus is algorithm is widely used and thoroughly tested through blockchain

Proof of Work

  • Originated in 1993
  • Cynthia Dwork and Moni Naor were its creators
  • Adopted in 2009 to discourage DDoS over trustless distibuted consensus
  • First miner to solve the Block problem gets rewarded

How Proof of Works works

  • A block is what is known when transactions are bundled
  • To find if so or not A: miners should verify
  • And, if the above test goes all right . To keep block and system legit miners should solve a mathematical puzzle
  • The first block to do gets benefits: The Reward The block rewards the mining system, and transactions are properly stored

Mining Understanding

  • Finding "has-valued" operations by a single miner Determine number of NoNce(Numerical sample test ) Criptographic Hash Algorithms over block data, result in smaller outcomes

Breaking Ponts in Prook of Work

  • As computation needs rise . Electricity needs too
  • Bitcoin farms, the result of the rise, have a strong demand -5 Million for US homes, and a whole country of similar electricity needs, and has a high reward for those involved Miners make blocks in bigger pools -Centraling is a result: The miner's create pools, or use it from thers, this rises hashpower for those inside

Why Proof of Work a Concern

  • Over the recent years, most of the new coins over the net, have been mined centralized via pools as those listed as follows:.
  • The chart overpools, or use it from thers, shows the major miners as centralized.
  • The chart overpools, or use it from thers, shows the major miners as centralized

Proof of Stake

  • Quantum Mechanic created in 2011
  • Created in 2011 (bitcointalk.org)
  • Competition is bad so should not be allowed
  • Stake now defined in a determinated by wealth creation
  • Transacting can create rewards unlike block creatiot, can instead create

Key Points to know in Proof of Stake

  • Blocks are bundled and made by a group(same idea as before, just with a validator)
  • Validators stake a security deposit(a wealth based number for a security deposit)
  • Randoms now are selected via wealth distribution. Validators mint/forge a new block/are selected to be next:
  • Validators take fees inside block
  • Validators lose coins when found verifying the wrong actions
  • Chains will properly reward those who verify good data

Variations of those Block's Selection

  • Cryptocurrencies using Proof of Stake often start by: "Selling Pre-Mines, Or the Proof of Work Algorithm, then move on to Proof Of Stakes when possible.
  • While others create rewards.
  • Proof of work is usually a reward(creating new coins) and the Proof of Stake is a fee.

Variations over selection

  • Users want more coins so staking to be apart of the process, or required by staking . Stake Sizing now rewards larger nodes by a chance to block more:
  • Those who are willing to put more in, can and it grows the selection.
  • For those that need it: more rewards are given back.
  • -To work: unequals are added intod that the selection process.
  • Common selection used Methods use block age etc.

Block Selction Variation continued

  • Randomzations now, the method shows the valdidators where blocks will be and:
  • Size shows how nodes may change their sizes, based on the stake for public, or private and thus "next forger is created.

Variance Block

  • Selection in Age Selection chooses nodes based on how long: Their tokens have been staked
  • Times the tokens days coins stake them for more staking in return. Coin Ages must reset after forged" A reset after forged is common and a while for next block

Key Points of Note

  • The bigger miners do dominate the blockchain .
  • The price comes down in Proof of Works as equipment is easier to acquire, and more efficient .
  • Stake versus Chance relation and also linear: Validators lose is true, but long running blocks make this correct
  • Nodes come and go. As long as they verify and do their parts, they and others profit Plus, a better "for node", that is to mean validators' stake will give even further rewards

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Related Documents

More Like This

Encryption Systems Quiz
5 questions

Encryption Systems Quiz

ConsistentSugilite9031 avatar
ConsistentSugilite9031
Symmetric vs Asymmetric Encryption
0 questions
Use Quizgecko on...
Browser
Browser