SlideShare a Scribd company logo
1 of 39
BLOCKCHAIN and BITCOIN
Hugo Rodrigues | KB Samaha
November, 2016
The concept
• Bitcoin is a distributed
• peer-to-peer
• digital currency that can be transferred instantly
and securely between any two people in the
world.
• It's like electronic cash that you can use to pay
friends or merchants.
What Is Bitcoin?
Bitcoin Whitepaper – 2008.10.31*
* Halloween
Bitcoin Video
https://www.youtube.com/watch?v=Gc2en3nHxA4#action=share
Why does it have value?
•The worth of a thing
•is the price it will bring
Rai Stones of Yap
How much Bitcoin worth ?
As of today 11/10/16 ?
Bitcoin : Currency and technology
• Mining
• 21 million
• Volatile value
• >50% in hands of 880 individuals
• Litecoin, Ripple, Zerocoin
Currency
“Satoshi Nakamoto”
2009
• Blockchain
• Distributed shared ledger
• Cryptograhy (SHA‐256, PKI)
• Consensus model
• Smart contracts
Technology
8
Blockchain Defined
Simply defined a Blockchain is little more than a:
• Distributed
• Secure
• Logfile - ledger
A digital currency was in a lot of ways the first demonstrable use
4 key concepts of blockchain
Distributedshared ledger Cryptography
Consensus Smart contracts
Distributed shared ledgers
• Group of replicated logs/databases (nodes)
• Transactions distributed in blocks
• All nodes hold all transactions
• Parties identified with public key (= anonymised)
• Accessibility of transactions depending on blockchain implementation
• Resilient for failure of one or more nodes
• Group of nodes operate tamper proof
Network Evolution
Cryptography
Hashing functions
Creation of a bit string (digest) representingintegrityof content other string. Changing one character in the original string results in complete different has.
Changing multiple characters in original string that results in the same hash requireslarge amount of processing power for a long period of time.
13
Public & private keys and wallets
Two large prime numbers that have a mathematical relation with each other.A string encrypted with one key can only be decrypted with the other. One
key needs to be kept private,the other one can be made publicly known so that it can be used by other parties to exchange data with you in a secure
manner. Private keys need to be storedthat it is accessible only for owner. This can be done on personal devices(PC, smart card, USB stick, phone, …)or
remotelywith a service provider (cold and hot wallets).
Encryption
Scrambling of clear text withthe public key of the recipient so that the holder of that private key is the only one that can descramble the message. This is
used to guarantee the confidentiality of the data exchanged.
Digital signature
Encryption of hash representingof original data to be secured with the private key of the sender (called digital signature) that is decrypted by the recipient
with the public of the sender.If the decryptedhash matches the content of the original data it implies two things. First, the encryption can only be
performedwith the private key corresponding with public key and secondly, the original data can’t be tamperedwith.
Consensus
• Consensus = Majority of nodes agree on validity of transactions
• Includes validation on double‐spending
• Permissionless (public) vs. permissioned (private) blockchain setup
• Proof‐of‐work / proof‐of‐stake the proof validity of node
(only applicable for permissionless network)
14
Smart Contracts
• Business logic that can be assigned to a transaction on the blockchain
• Acts as a ‘notary’ of blockchain transactions
• Holds conditions under which specific actions can/must be perfomed
• Facilitates escrow services
• Can’t be modified without predefined permissions
15
Potential of blockchain extends across a wide
range of application areas
Financial Services
• Payments
• Securities registration & processing
• Lending
Governmental services
• Voting
• Registrations (passports, driving license)
• Permits
Trade
• Document exchange
• Asset exchange
• Escrow services
• Trade agreements
• Property
• Real estate
• Intellectual property
• Cars
• Identification & Security
• Party/device registration
• Authentication
• Access control
• Internet of Things (IoT)
• Autonomous devices, such as
• Cars
• Drones
• Robots
Technology principles
Sending Bitcoins - example
I’LL send 0.1
Bitcoin to Bob.
Alice
$ F T
Protocol: sending BTC
1. Craft a transaction.
2. Give it to your
computer.
Protocol: participating
On valid transactions:
1. Update ledger
2. Relay transaction
Addresses are like Accounts
• The wallet listens for transactions addressed to any of its public keys
• In theory - is the only node that is able to decrypt and accept the transfer
• “Coins” are “sent” by broadcasting the transaction to the network
which are verified to be viable and then added to a block
• Keys can represent a MULTI-SIG address that requires a N of M private
keys in order to decrypt the message
• N private keys
• M keys
19
A 2of3 multisig address can be created by following these steps:
1.Gather (or generate) 3 bitcoin addresses, on whichever machines will be participating, using getnewaddress or
getaccountaddress RPC commands (or copy and paste from the GUI).
2.Get their public keys using the validateaddress RPC command 3 times.
3.Then create a 2-of-3 multisig address using addmultisigaddress;
e.g.
addmultisigaddress returns the multisignature address
 Public keys are raw hexadecimal and don't contain checksums like bitcoin addresses do.
 Send funds into that 2-of-3 transaction using the normal sendtoaddress/sendmany RPC commands
Creating a Multisignature Address
bitcoind addmultisigaddress 2
'["044322868cb17d64dcc22185ae2d4493111d73244c3668f8ac79ecc79c0ba8d30a6756d0fa20157
709af3281cc721c7f53321a8cabda29b77900b7e4fe0174b114","..second pubkey..","..third pubkey.."]’
Assuring Pseudo Anonymity
• Using public key cryptography, specifically:
Elliptic Curve Cryptography due to its
• Key strength
• Shorter keys
• Transactions are sent to public key “addresses” eg:
1AjYPi8qryPCJu6xgdJuQzVnWFXLmxq9s3
1Give4dbry2pyJihnpqV6Urq2SGEhpz3K
21
Example - https://blockchain.info/
Blocks
A block 𝐵 contains
 RH(𝐵′) for another block 𝐵′,
 a list of transactions,
 and an arbitrary number
“nonce”.
Block 𝐵 is valid if the
first 𝑑 = 5 digits of the
hash of 𝐵 are all zero.
8046465385222
0000031105830
0000077326777
RH
=
A Tree of Blocks
If we have a block, with a
bit of work, we can find a
“next block”…
...and yet another “next
block”…
…or a block which
continues here…
… and so on.
Random Hash Function
In practice, we hope that SHA256 behaves “like a random oracle”.
SHA256: TextFiles → 0, … , 2256
− 1
Calculation:
If we made all computers on the world compute SHA256…
It takes ~“40 × 14 ⋅ 109
years” to find 𝑥1 ≠ 𝑥2 s.t.
SHA256 𝑥1 = SHA256 𝑥2 .
• We need a protocol to agree on a transaction.
• “Consensus protocols”. Studied since 1980, starting
with Pease, Shostak, Lamport.
• Main idea for protocols:
Consensus Protocols
What transaction
are you using?
Protocols work if (say) >
70% of the computers
follow the protocol.
The Protocol - for Finding Blocks
Protocol: finding blocks
1. Take the longest chain you
can find.
2. Collect transactions.
3. Find a new valid block here.
4. Publish it.
The Protocol - for Participants
Protocol: To know who owns BTC
1. Take the longest chain you
can find.
2. Process the transactions in
this chain in order
“proof of work” - node generating a block needs to prove that it has put
enough computing resources to solve a mathematical puzzle.
Transaction order protection
Mathematical race to protect transactions
Why work to find blocks?
Many people are trying to find blocks, which uses a lot of resources…
A real lot!
This is called “mining”
“What is Bitcoin Mining” – Video
http://www.bitcoinmining.com
34
Risks
Double Spending
I can exploit this!
Black Hat
Alice
Bob
: Give BTC from Black Hat to Alice
: Give BTC from Black Hat to Bob
Black Hat prepares
two transactions:
These transactions
spend previously
spent bitcoins!
Thanks
!
Thanks
!
Build an Alternate Chain?
The more RH-calls are
devoted to a chain, the
faster it grows.
Thus, intuitively: to
build a chain as fast as
the rest, you need as
many RH-calls as the
rest.
Maybe I should
build another
chain?
Distributed Denial of Service Attacks (DDoS)
If I cannot cheat bitcoin,
maybe I can mess it up!
Interesting idea…
…and while Bitcoin
incorporates many,
many rules to handle
this…
…people still try!
• Using computing power of third parties to achieve faster mining
performance (without knowledge and consent of the third party)
• The 51% cartel attack
• A Goldfinger attack (Sabatoge: "Losing" Bitcoins)
Mining problems
Improving Bitcoin: Open Problem
• Computing SHA256 around 2 × 1017 times per
second seems like a big waste of energy.
• Back of the envelope calculation gives a daily energy
use of 5.000.000+ kWh (> $500.000+)
• Can we improve the situation?
(There is previous work which studies this).

More Related Content

What's hot

Blockchain Technology
Blockchain TechnologyBlockchain Technology
Blockchain TechnologyRashi Singh
 
Introduction to Blockchain and Smart Contracts
Introduction to Blockchain and Smart ContractsIntroduction to Blockchain and Smart Contracts
Introduction to Blockchain and Smart ContractsTechracers
 
Introduction to Blockchain
Introduction to BlockchainIntroduction to Blockchain
Introduction to BlockchainJordan Harris
 
Blockchain Study(1) - What is Blockchain?
Blockchain Study(1) - What is Blockchain?Blockchain Study(1) - What is Blockchain?
Blockchain Study(1) - What is Blockchain?Fermat Jade
 
Blockchain
BlockchainBlockchain
BlockchainSai Nath
 
Blockchain Security Issues and Challenges
Blockchain Security Issues and Challenges Blockchain Security Issues and Challenges
Blockchain Security Issues and Challenges Merlec Mpyana
 
An Introduction to Blockchain Technology
An Introduction to Blockchain Technology An Introduction to Blockchain Technology
An Introduction to Blockchain Technology Niuversity
 
Smart Contract & Ethereum
Smart Contract & EthereumSmart Contract & Ethereum
Smart Contract & EthereumAkshay Singh
 
Blockchain Introduction Presentation
Blockchain Introduction PresentationBlockchain Introduction Presentation
Blockchain Introduction PresentationAmr Alaa Yassen
 
Distributed systems and blockchain technology
Distributed systems and blockchain technologyDistributed systems and blockchain technology
Distributed systems and blockchain technologyAlket Cecaj
 
Overview of Blockchain Consensus Mechanisms
Overview of Blockchain Consensus MechanismsOverview of Blockchain Consensus Mechanisms
Overview of Blockchain Consensus MechanismsJohannes Ahlmann
 
Blockchain and Smart Contracts (Series: Blockchain Basics)
Blockchain and Smart Contracts (Series: Blockchain Basics)Blockchain and Smart Contracts (Series: Blockchain Basics)
Blockchain and Smart Contracts (Series: Blockchain Basics)Financial Poise
 
Blockchain Explained | Blockchain Simplified | Blockchain Technology | Blockc...
Blockchain Explained | Blockchain Simplified | Blockchain Technology | Blockc...Blockchain Explained | Blockchain Simplified | Blockchain Technology | Blockc...
Blockchain Explained | Blockchain Simplified | Blockchain Technology | Blockc...Edureka!
 
Ethereum (Blockchain Network)
Ethereum (Blockchain Network)Ethereum (Blockchain Network)
Ethereum (Blockchain Network)Qais Ammari
 
Blockchain Security and Privacy
Blockchain Security and PrivacyBlockchain Security and Privacy
Blockchain Security and PrivacyAnil John
 
What is a blockchain?
What is a blockchain?What is a blockchain?
What is a blockchain?Kevin Koo
 

What's hot (20)

Blockchain Technology
Blockchain TechnologyBlockchain Technology
Blockchain Technology
 
Introduction to Blockchain and Smart Contracts
Introduction to Blockchain and Smart ContractsIntroduction to Blockchain and Smart Contracts
Introduction to Blockchain and Smart Contracts
 
Introduction to Blockchain
Introduction to Blockchain Introduction to Blockchain
Introduction to Blockchain
 
BLOCKCHAIN
BLOCKCHAINBLOCKCHAIN
BLOCKCHAIN
 
Introduction to Blockchain
Introduction to BlockchainIntroduction to Blockchain
Introduction to Blockchain
 
Blockchain Study(1) - What is Blockchain?
Blockchain Study(1) - What is Blockchain?Blockchain Study(1) - What is Blockchain?
Blockchain Study(1) - What is Blockchain?
 
Blockchain
BlockchainBlockchain
Blockchain
 
All About Ethereum
All About EthereumAll About Ethereum
All About Ethereum
 
Blockchain Security Issues and Challenges
Blockchain Security Issues and Challenges Blockchain Security Issues and Challenges
Blockchain Security Issues and Challenges
 
An Introduction to Blockchain Technology
An Introduction to Blockchain Technology An Introduction to Blockchain Technology
An Introduction to Blockchain Technology
 
Smart Contract & Ethereum
Smart Contract & EthereumSmart Contract & Ethereum
Smart Contract & Ethereum
 
Bitcoin
BitcoinBitcoin
Bitcoin
 
Blockchain Introduction Presentation
Blockchain Introduction PresentationBlockchain Introduction Presentation
Blockchain Introduction Presentation
 
Distributed systems and blockchain technology
Distributed systems and blockchain technologyDistributed systems and blockchain technology
Distributed systems and blockchain technology
 
Overview of Blockchain Consensus Mechanisms
Overview of Blockchain Consensus MechanismsOverview of Blockchain Consensus Mechanisms
Overview of Blockchain Consensus Mechanisms
 
Blockchain and Smart Contracts (Series: Blockchain Basics)
Blockchain and Smart Contracts (Series: Blockchain Basics)Blockchain and Smart Contracts (Series: Blockchain Basics)
Blockchain and Smart Contracts (Series: Blockchain Basics)
 
Blockchain Explained | Blockchain Simplified | Blockchain Technology | Blockc...
Blockchain Explained | Blockchain Simplified | Blockchain Technology | Blockc...Blockchain Explained | Blockchain Simplified | Blockchain Technology | Blockc...
Blockchain Explained | Blockchain Simplified | Blockchain Technology | Blockc...
 
Ethereum (Blockchain Network)
Ethereum (Blockchain Network)Ethereum (Blockchain Network)
Ethereum (Blockchain Network)
 
Blockchain Security and Privacy
Blockchain Security and PrivacyBlockchain Security and Privacy
Blockchain Security and Privacy
 
What is a blockchain?
What is a blockchain?What is a blockchain?
What is a blockchain?
 

Viewers also liked

Bitcoin 101: The Currency, The Network, The Community
Bitcoin 101: The Currency, The Network, The CommunityBitcoin 101: The Currency, The Network, The Community
Bitcoin 101: The Currency, The Network, The CommunityEarthsite
 
Demysitifying Bitcoin and Blockchain
Demysitifying Bitcoin and Blockchain Demysitifying Bitcoin and Blockchain
Demysitifying Bitcoin and Blockchain Ganesh Kondal
 
Introduction to Bitcoin and ECDSA
Introduction to Bitcoin and ECDSAIntroduction to Bitcoin and ECDSA
Introduction to Bitcoin and ECDSANikesh Mistry
 
Concept of BlockChain & Decentralized Application
Concept of BlockChain & Decentralized ApplicationConcept of BlockChain & Decentralized Application
Concept of BlockChain & Decentralized ApplicationSeiji Takahashi
 
Blockchain: The Information Technology of the Future
Blockchain: The Information Technology of the FutureBlockchain: The Information Technology of the Future
Blockchain: The Information Technology of the FutureMelanie Swan
 

Viewers also liked (6)

Bitcoin 101: The Currency, The Network, The Community
Bitcoin 101: The Currency, The Network, The CommunityBitcoin 101: The Currency, The Network, The Community
Bitcoin 101: The Currency, The Network, The Community
 
Demysitifying Bitcoin and Blockchain
Demysitifying Bitcoin and Blockchain Demysitifying Bitcoin and Blockchain
Demysitifying Bitcoin and Blockchain
 
Blockchain Vision
Blockchain VisionBlockchain Vision
Blockchain Vision
 
Introduction to Bitcoin and ECDSA
Introduction to Bitcoin and ECDSAIntroduction to Bitcoin and ECDSA
Introduction to Bitcoin and ECDSA
 
Concept of BlockChain & Decentralized Application
Concept of BlockChain & Decentralized ApplicationConcept of BlockChain & Decentralized Application
Concept of BlockChain & Decentralized Application
 
Blockchain: The Information Technology of the Future
Blockchain: The Information Technology of the FutureBlockchain: The Information Technology of the Future
Blockchain: The Information Technology of the Future
 

Similar to Blockchain and Bitcoin

Bitcoin, Banking and the Blockchain
Bitcoin, Banking and the BlockchainBitcoin, Banking and the Blockchain
Bitcoin, Banking and the Blockchainseancarmody
 
Crypto currency - a digital asset
Crypto currency - a digital asset Crypto currency - a digital asset
Crypto currency - a digital asset mayil vealan
 
Cryptocurrency-Bitcoin
Cryptocurrency-BitcoinCryptocurrency-Bitcoin
Cryptocurrency-BitcoinSatwikaHotwani
 
Blockchain & crypto
Blockchain & cryptoBlockchain & crypto
Blockchain & cryptoAtul Mangat
 
Trading-CryptoCurrency-Advanced-Trading-Strategies.pdf
Trading-CryptoCurrency-Advanced-Trading-Strategies.pdfTrading-CryptoCurrency-Advanced-Trading-Strategies.pdf
Trading-CryptoCurrency-Advanced-Trading-Strategies.pdfShreeharshaHegde7
 
Trading-CryptoCurrency-Advanced-Trading-Strategies.pdf
Trading-CryptoCurrency-Advanced-Trading-Strategies.pdfTrading-CryptoCurrency-Advanced-Trading-Strategies.pdf
Trading-CryptoCurrency-Advanced-Trading-Strategies.pdfLeokas123
 
CRYPTO CURRENCY.pptx
CRYPTO CURRENCY.pptxCRYPTO CURRENCY.pptx
CRYPTO CURRENCY.pptxB.VIGNESH
 
Bitcoin 101 - Certified Bitcoin Professional Training Session
Bitcoin 101 - Certified Bitcoin Professional Training SessionBitcoin 101 - Certified Bitcoin Professional Training Session
Bitcoin 101 - Certified Bitcoin Professional Training SessionLisa Cheng
 
Blockchain, bitcoin, ethereum and ICOs
Blockchain, bitcoin, ethereum and ICOsBlockchain, bitcoin, ethereum and ICOs
Blockchain, bitcoin, ethereum and ICOsBogdan Fiedur
 
An in depth presentation of Cryptocurrency.
An in depth presentation of Cryptocurrency.An in depth presentation of Cryptocurrency.
An in depth presentation of Cryptocurrency.SanjeebSamanta1
 
Blockchain - Presentacion Betabeers Galicia 10/12/2014
Blockchain - Presentacion Betabeers Galicia 10/12/2014Blockchain - Presentacion Betabeers Galicia 10/12/2014
Blockchain - Presentacion Betabeers Galicia 10/12/2014WeKCo Coworking
 

Similar to Blockchain and Bitcoin (20)

Blockchain.pptx
Blockchain.pptxBlockchain.pptx
Blockchain.pptx
 
Bitcoin, Banking and the Blockchain
Bitcoin, Banking and the BlockchainBitcoin, Banking and the Blockchain
Bitcoin, Banking and the Blockchain
 
Crypto currency - a digital asset
Crypto currency - a digital asset Crypto currency - a digital asset
Crypto currency - a digital asset
 
Blockchain External.pdf
Blockchain External.pdfBlockchain External.pdf
Blockchain External.pdf
 
Bitcoin
BitcoinBitcoin
Bitcoin
 
Block chain introduction
Block chain introductionBlock chain introduction
Block chain introduction
 
Cryptocurrencies.pptx
Cryptocurrencies.pptxCryptocurrencies.pptx
Cryptocurrencies.pptx
 
Cryptocurrency-Bitcoin
Cryptocurrency-BitcoinCryptocurrency-Bitcoin
Cryptocurrency-Bitcoin
 
Blockchain
BlockchainBlockchain
Blockchain
 
Blockchain & crypto
Blockchain & cryptoBlockchain & crypto
Blockchain & crypto
 
Trading-CryptoCurrency-Advanced-Trading-Strategies.pdf
Trading-CryptoCurrency-Advanced-Trading-Strategies.pdfTrading-CryptoCurrency-Advanced-Trading-Strategies.pdf
Trading-CryptoCurrency-Advanced-Trading-Strategies.pdf
 
Trading-CryptoCurrency-Advanced-Trading-Strategies.pdf
Trading-CryptoCurrency-Advanced-Trading-Strategies.pdfTrading-CryptoCurrency-Advanced-Trading-Strategies.pdf
Trading-CryptoCurrency-Advanced-Trading-Strategies.pdf
 
Bitcoin Cryptocurrency
Bitcoin CryptocurrencyBitcoin Cryptocurrency
Bitcoin Cryptocurrency
 
CRYPTO CURRENCY.pptx
CRYPTO CURRENCY.pptxCRYPTO CURRENCY.pptx
CRYPTO CURRENCY.pptx
 
Bitcoin 101 - Certified Bitcoin Professional Training Session
Bitcoin 101 - Certified Bitcoin Professional Training SessionBitcoin 101 - Certified Bitcoin Professional Training Session
Bitcoin 101 - Certified Bitcoin Professional Training Session
 
Blockchain meetup
Blockchain meetupBlockchain meetup
Blockchain meetup
 
Blockchain, bitcoin, ethereum and ICOs
Blockchain, bitcoin, ethereum and ICOsBlockchain, bitcoin, ethereum and ICOs
Blockchain, bitcoin, ethereum and ICOs
 
Introduction to Blockchain and Cryptocurrencies
Introduction to Blockchain and CryptocurrenciesIntroduction to Blockchain and Cryptocurrencies
Introduction to Blockchain and Cryptocurrencies
 
An in depth presentation of Cryptocurrency.
An in depth presentation of Cryptocurrency.An in depth presentation of Cryptocurrency.
An in depth presentation of Cryptocurrency.
 
Blockchain - Presentacion Betabeers Galicia 10/12/2014
Blockchain - Presentacion Betabeers Galicia 10/12/2014Blockchain - Presentacion Betabeers Galicia 10/12/2014
Blockchain - Presentacion Betabeers Galicia 10/12/2014
 

More from Hugo Rodrigues

Evolution security controls towards Cloud Services
Evolution security controls towards Cloud ServicesEvolution security controls towards Cloud Services
Evolution security controls towards Cloud ServicesHugo Rodrigues
 
Paper: Crypto Currency Mining
Paper: Crypto Currency MiningPaper: Crypto Currency Mining
Paper: Crypto Currency MiningHugo Rodrigues
 
RISE AND FALL ON CORPORATE UNCERTAINTY
RISE AND FALL ON CORPORATE UNCERTAINTYRISE AND FALL ON CORPORATE UNCERTAINTY
RISE AND FALL ON CORPORATE UNCERTAINTYHugo Rodrigues
 
Apresentação Produtividade e Desempenho
Apresentação Produtividade e DesempenhoApresentação Produtividade e Desempenho
Apresentação Produtividade e DesempenhoHugo Rodrigues
 
Relatório candidatura QREN
Relatório candidatura QRENRelatório candidatura QREN
Relatório candidatura QRENHugo Rodrigues
 
Modelo de segmentação de Clientes
Modelo de segmentação de ClientesModelo de segmentação de Clientes
Modelo de segmentação de ClientesHugo Rodrigues
 
TAEG: nominal - real- efectiva
TAEG: nominal - real- efectivaTAEG: nominal - real- efectiva
TAEG: nominal - real- efectivaHugo Rodrigues
 
Investigação Operacional // How to raise up to 80% gross margin based in effi...
Investigação Operacional // How to raise up to 80% gross margin based in effi...Investigação Operacional // How to raise up to 80% gross margin based in effi...
Investigação Operacional // How to raise up to 80% gross margin based in effi...Hugo Rodrigues
 
Projeto de Controlo de Silo para Parqueamento
Projeto de Controlo de Silo para ParqueamentoProjeto de Controlo de Silo para Parqueamento
Projeto de Controlo de Silo para ParqueamentoHugo Rodrigues
 
Rede Social // Social Network for Kids #Concept
Rede Social // Social Network for Kids #ConceptRede Social // Social Network for Kids #Concept
Rede Social // Social Network for Kids #ConceptHugo Rodrigues
 
SOA - Service Oriented Architecture
SOA - Service Oriented ArchitectureSOA - Service Oriented Architecture
SOA - Service Oriented ArchitectureHugo Rodrigues
 
Análise Organizacional Zack
Análise Organizacional ZackAnálise Organizacional Zack
Análise Organizacional ZackHugo Rodrigues
 
Soluções Sector Financeiro
Soluções Sector FinanceiroSoluções Sector Financeiro
Soluções Sector FinanceiroHugo Rodrigues
 
Service Oriented Architecture
Service Oriented ArchitectureService Oriented Architecture
Service Oriented ArchitectureHugo Rodrigues
 

More from Hugo Rodrigues (15)

Evolution security controls towards Cloud Services
Evolution security controls towards Cloud ServicesEvolution security controls towards Cloud Services
Evolution security controls towards Cloud Services
 
Paper: Crypto Currency Mining
Paper: Crypto Currency MiningPaper: Crypto Currency Mining
Paper: Crypto Currency Mining
 
Alibaba goes India
Alibaba goes IndiaAlibaba goes India
Alibaba goes India
 
RISE AND FALL ON CORPORATE UNCERTAINTY
RISE AND FALL ON CORPORATE UNCERTAINTYRISE AND FALL ON CORPORATE UNCERTAINTY
RISE AND FALL ON CORPORATE UNCERTAINTY
 
Apresentação Produtividade e Desempenho
Apresentação Produtividade e DesempenhoApresentação Produtividade e Desempenho
Apresentação Produtividade e Desempenho
 
Relatório candidatura QREN
Relatório candidatura QRENRelatório candidatura QREN
Relatório candidatura QREN
 
Modelo de segmentação de Clientes
Modelo de segmentação de ClientesModelo de segmentação de Clientes
Modelo de segmentação de Clientes
 
TAEG: nominal - real- efectiva
TAEG: nominal - real- efectivaTAEG: nominal - real- efectiva
TAEG: nominal - real- efectiva
 
Investigação Operacional // How to raise up to 80% gross margin based in effi...
Investigação Operacional // How to raise up to 80% gross margin based in effi...Investigação Operacional // How to raise up to 80% gross margin based in effi...
Investigação Operacional // How to raise up to 80% gross margin based in effi...
 
Projeto de Controlo de Silo para Parqueamento
Projeto de Controlo de Silo para ParqueamentoProjeto de Controlo de Silo para Parqueamento
Projeto de Controlo de Silo para Parqueamento
 
Rede Social // Social Network for Kids #Concept
Rede Social // Social Network for Kids #ConceptRede Social // Social Network for Kids #Concept
Rede Social // Social Network for Kids #Concept
 
SOA - Service Oriented Architecture
SOA - Service Oriented ArchitectureSOA - Service Oriented Architecture
SOA - Service Oriented Architecture
 
Análise Organizacional Zack
Análise Organizacional ZackAnálise Organizacional Zack
Análise Organizacional Zack
 
Soluções Sector Financeiro
Soluções Sector FinanceiroSoluções Sector Financeiro
Soluções Sector Financeiro
 
Service Oriented Architecture
Service Oriented ArchitectureService Oriented Architecture
Service Oriented Architecture
 

Recently uploaded

Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 

Recently uploaded (20)

Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 

Blockchain and Bitcoin

  • 1. BLOCKCHAIN and BITCOIN Hugo Rodrigues | KB Samaha November, 2016
  • 3. • Bitcoin is a distributed • peer-to-peer • digital currency that can be transferred instantly and securely between any two people in the world. • It's like electronic cash that you can use to pay friends or merchants. What Is Bitcoin?
  • 4. Bitcoin Whitepaper – 2008.10.31* * Halloween
  • 6. Why does it have value? •The worth of a thing •is the price it will bring Rai Stones of Yap
  • 7. How much Bitcoin worth ? As of today 11/10/16 ?
  • 8. Bitcoin : Currency and technology • Mining • 21 million • Volatile value • >50% in hands of 880 individuals • Litecoin, Ripple, Zerocoin Currency “Satoshi Nakamoto” 2009 • Blockchain • Distributed shared ledger • Cryptograhy (SHA‐256, PKI) • Consensus model • Smart contracts Technology 8
  • 9. Blockchain Defined Simply defined a Blockchain is little more than a: • Distributed • Secure • Logfile - ledger A digital currency was in a lot of ways the first demonstrable use
  • 10. 4 key concepts of blockchain Distributedshared ledger Cryptography Consensus Smart contracts
  • 11. Distributed shared ledgers • Group of replicated logs/databases (nodes) • Transactions distributed in blocks • All nodes hold all transactions • Parties identified with public key (= anonymised) • Accessibility of transactions depending on blockchain implementation • Resilient for failure of one or more nodes • Group of nodes operate tamper proof
  • 13. Cryptography Hashing functions Creation of a bit string (digest) representingintegrityof content other string. Changing one character in the original string results in complete different has. Changing multiple characters in original string that results in the same hash requireslarge amount of processing power for a long period of time. 13 Public & private keys and wallets Two large prime numbers that have a mathematical relation with each other.A string encrypted with one key can only be decrypted with the other. One key needs to be kept private,the other one can be made publicly known so that it can be used by other parties to exchange data with you in a secure manner. Private keys need to be storedthat it is accessible only for owner. This can be done on personal devices(PC, smart card, USB stick, phone, …)or remotelywith a service provider (cold and hot wallets). Encryption Scrambling of clear text withthe public key of the recipient so that the holder of that private key is the only one that can descramble the message. This is used to guarantee the confidentiality of the data exchanged. Digital signature Encryption of hash representingof original data to be secured with the private key of the sender (called digital signature) that is decrypted by the recipient with the public of the sender.If the decryptedhash matches the content of the original data it implies two things. First, the encryption can only be performedwith the private key corresponding with public key and secondly, the original data can’t be tamperedwith.
  • 14. Consensus • Consensus = Majority of nodes agree on validity of transactions • Includes validation on double‐spending • Permissionless (public) vs. permissioned (private) blockchain setup • Proof‐of‐work / proof‐of‐stake the proof validity of node (only applicable for permissionless network) 14
  • 15. Smart Contracts • Business logic that can be assigned to a transaction on the blockchain • Acts as a ‘notary’ of blockchain transactions • Holds conditions under which specific actions can/must be perfomed • Facilitates escrow services • Can’t be modified without predefined permissions 15
  • 16. Potential of blockchain extends across a wide range of application areas Financial Services • Payments • Securities registration & processing • Lending Governmental services • Voting • Registrations (passports, driving license) • Permits Trade • Document exchange • Asset exchange • Escrow services • Trade agreements • Property • Real estate • Intellectual property • Cars • Identification & Security • Party/device registration • Authentication • Access control • Internet of Things (IoT) • Autonomous devices, such as • Cars • Drones • Robots
  • 18. Sending Bitcoins - example I’LL send 0.1 Bitcoin to Bob. Alice $ F T Protocol: sending BTC 1. Craft a transaction. 2. Give it to your computer. Protocol: participating On valid transactions: 1. Update ledger 2. Relay transaction
  • 19. Addresses are like Accounts • The wallet listens for transactions addressed to any of its public keys • In theory - is the only node that is able to decrypt and accept the transfer • “Coins” are “sent” by broadcasting the transaction to the network which are verified to be viable and then added to a block • Keys can represent a MULTI-SIG address that requires a N of M private keys in order to decrypt the message • N private keys • M keys 19
  • 20. A 2of3 multisig address can be created by following these steps: 1.Gather (or generate) 3 bitcoin addresses, on whichever machines will be participating, using getnewaddress or getaccountaddress RPC commands (or copy and paste from the GUI). 2.Get their public keys using the validateaddress RPC command 3 times. 3.Then create a 2-of-3 multisig address using addmultisigaddress; e.g. addmultisigaddress returns the multisignature address  Public keys are raw hexadecimal and don't contain checksums like bitcoin addresses do.  Send funds into that 2-of-3 transaction using the normal sendtoaddress/sendmany RPC commands Creating a Multisignature Address bitcoind addmultisigaddress 2 '["044322868cb17d64dcc22185ae2d4493111d73244c3668f8ac79ecc79c0ba8d30a6756d0fa20157 709af3281cc721c7f53321a8cabda29b77900b7e4fe0174b114","..second pubkey..","..third pubkey.."]’
  • 21. Assuring Pseudo Anonymity • Using public key cryptography, specifically: Elliptic Curve Cryptography due to its • Key strength • Shorter keys • Transactions are sent to public key “addresses” eg: 1AjYPi8qryPCJu6xgdJuQzVnWFXLmxq9s3 1Give4dbry2pyJihnpqV6Urq2SGEhpz3K 21
  • 23. Blocks A block 𝐵 contains  RH(𝐵′) for another block 𝐵′,  a list of transactions,  and an arbitrary number “nonce”. Block 𝐵 is valid if the first 𝑑 = 5 digits of the hash of 𝐵 are all zero. 8046465385222 0000031105830 0000077326777 RH
  • 24. = A Tree of Blocks If we have a block, with a bit of work, we can find a “next block”… ...and yet another “next block”… …or a block which continues here… … and so on.
  • 25. Random Hash Function In practice, we hope that SHA256 behaves “like a random oracle”. SHA256: TextFiles → 0, … , 2256 − 1 Calculation: If we made all computers on the world compute SHA256… It takes ~“40 × 14 ⋅ 109 years” to find 𝑥1 ≠ 𝑥2 s.t. SHA256 𝑥1 = SHA256 𝑥2 .
  • 26. • We need a protocol to agree on a transaction. • “Consensus protocols”. Studied since 1980, starting with Pease, Shostak, Lamport. • Main idea for protocols: Consensus Protocols What transaction are you using? Protocols work if (say) > 70% of the computers follow the protocol.
  • 27. The Protocol - for Finding Blocks Protocol: finding blocks 1. Take the longest chain you can find. 2. Collect transactions. 3. Find a new valid block here. 4. Publish it.
  • 28. The Protocol - for Participants Protocol: To know who owns BTC 1. Take the longest chain you can find. 2. Process the transactions in this chain in order
  • 29.
  • 30. “proof of work” - node generating a block needs to prove that it has put enough computing resources to solve a mathematical puzzle. Transaction order protection
  • 31. Mathematical race to protect transactions
  • 32. Why work to find blocks? Many people are trying to find blocks, which uses a lot of resources… A real lot! This is called “mining”
  • 33. “What is Bitcoin Mining” – Video http://www.bitcoinmining.com 34
  • 34. Risks
  • 35. Double Spending I can exploit this! Black Hat Alice Bob : Give BTC from Black Hat to Alice : Give BTC from Black Hat to Bob Black Hat prepares two transactions: These transactions spend previously spent bitcoins! Thanks ! Thanks !
  • 36. Build an Alternate Chain? The more RH-calls are devoted to a chain, the faster it grows. Thus, intuitively: to build a chain as fast as the rest, you need as many RH-calls as the rest. Maybe I should build another chain?
  • 37. Distributed Denial of Service Attacks (DDoS) If I cannot cheat bitcoin, maybe I can mess it up! Interesting idea… …and while Bitcoin incorporates many, many rules to handle this… …people still try!
  • 38. • Using computing power of third parties to achieve faster mining performance (without knowledge and consent of the third party) • The 51% cartel attack • A Goldfinger attack (Sabatoge: "Losing" Bitcoins) Mining problems
  • 39. Improving Bitcoin: Open Problem • Computing SHA256 around 2 × 1017 times per second seems like a big waste of energy. • Back of the envelope calculation gives a daily energy use of 5.000.000+ kWh (> $500.000+) • Can we improve the situation? (There is previous work which studies this).