SlideShare ist ein Scribd-Unternehmen logo
1 von 22
Downloaden Sie, um offline zu lesen
Blockchain
Presented by Rakib
References:
https://anders.com/blockchain/
https://anders.com/blockchain/blockchain.html
https://blockchaindemo.io/
Myth-Busters
● Blockchain doesn’t mean crypto-currency
● Crypto-currency doesn’t mean BitCoin or Ethereum
--------------------------------
● Blockchain is just a technology. ex: database | cache | etc
● Crypto-currency uses an implementation of blockchains
● BitCoin, Ethereum these are all different kinds of
crypto-currencies which use different ways of
implementing the Blockchain
A chain is only as strong as its weakest link
A block
Index
Data
Hash
Nonce
Previous Hash
Difficulty Level Miner
What is a hash?
A scrambled representation of a value which is hard to
reverse to determine the original value that it represents.
h = f(x)
Popular hashing functions:
sha1 | sha256 | md5 | AES | bcrypt | many more
“hello world”
sha1
sha256
md5
“hello world”
sha1 2aae6c35c94fcfb415dbe95f408b9ce91ee846ed
sha256
b94d27b9934d3e08a52e52d7da7dabfac484efe3
7a5380ee9088f7ace2efcde9
md5 5eb63bbbe01eeed093cb22bb8f5acdc3
“hello world” “Hello world”
sha1 2aae6c35c94fcfb415dbe95f408b9ce91ee846ed 7b502c3a1f48c8609ae212cdfb639dee39673f5e
sha256
b94d27b9934d3e08a52e52d7da7dabfac484efe3
7a5380ee9088f7ace2efcde9
64ec88ca00b268e5ba1a35678a1b5316d212f4f3
66b2477232534a8aeca37f3c
md5 5eb63bbbe01eeed093cb22bb8f5acdc3 3e25960a79dbc69b674cd4ec67a72c62
Back to the chain
It always starts with
a block
-
the GENESIS block
● index = 0
● no previous hash
The Data
The data can be any
data representing
any event or any
information that
happened in the
world
the hash is
produced by
hashing the data
and the nonce
hash = f(data+nonce)
The Hash
Disclaimer: The hash is actually computed from a
combination of several fields like:
(data + nonce + index + previous hash + timestamp).
But for the simplicity of these slides, we will only consider
(data + nonce).
The nonce is
determined by
the miner ,
incrementally until
the hash meets a
pre-defined.
difficulty level .
The Nonce
hash = f(data + nonce)
Difficulty Level: ‘$0000’
f(‘hello world’ + 1) = 7b502c3a1f48c8609ae212cdfb639de……
f(‘hello world’ + 2) = 2aae6c35c94fcfb415dbe95f408b9ce……
f(‘hello world’ + 3) = b94d27b9934d3e08a52e52d7da7dab……
f(‘hello world’ + 245) = 3e25960a79dbc69b674cd4ec67a7……
f(‘hello world’ + 9436) = 5eb63bbbe01eeed093cb22bb8f……
f(‘hello world’ + 85460) = 0000a51677b3cc64056c498c1d……
● the data contains any new
information / event
● increments the index by 1
● determines a new nonce
to validate a new hash for
the new data
● previous hash refers to
the hash of the previous
block - which 1 index less
Enter next block
● There is one genesis block
● Every other block follows the genesis block sequentially
● Every block knows the hash of its previous block
● Modify the data in one block:
○ it changes its own hash
○ which invalidates the value of ‘previous hash’ in the
next block
○ which invalidates the next block’s own hash
○ the whole chain collapses following that one block
One chain of many blocks
A chain is only as strong as its weakest link
Demo
https://anders.com/blockchain/blockchain.html
Some pointers
An immutable record of the past
Historical events cannot be changed easily
Democratically determine problematic peers
Can use public-private keypair-signing to further
reinforce integrity of the blockchain
Further illustrated video tutorials
https://anders.com/blockchain/
Thanks
Syed Rakib Al Hasan
Software Engineer
fave Malaysia
github.com/syedrakib
linkedin.com/in/syedrakib
twitter.com/syedrakib

Weitere ähnliche Inhalte

Was ist angesagt?

Was ist angesagt? (20)

Intro to Blockchain - And, by the way, what the heck is proof-of-work?
Intro to Blockchain - And, by the way, what the heck is proof-of-work?Intro to Blockchain - And, by the way, what the heck is proof-of-work?
Intro to Blockchain - And, by the way, what the heck is proof-of-work?
 
Introduction to Blockchain
Introduction to BlockchainIntroduction to Blockchain
Introduction to Blockchain
 
create your own cryptocurrency
create your own cryptocurrencycreate your own cryptocurrency
create your own cryptocurrency
 
bitcoin_presentation
bitcoin_presentationbitcoin_presentation
bitcoin_presentation
 
Intro to Blockchain Slides
Intro to Blockchain SlidesIntro to Blockchain Slides
Intro to Blockchain Slides
 
Blockchain
BlockchainBlockchain
Blockchain
 
Blockchain Technology
Blockchain TechnologyBlockchain Technology
Blockchain Technology
 
Bitcoin - Beyond the basics
Bitcoin - Beyond the basicsBitcoin - Beyond the basics
Bitcoin - Beyond the basics
 
Bitcoin Blockchain - Under the Hood
Bitcoin Blockchain - Under the HoodBitcoin Blockchain - Under the Hood
Bitcoin Blockchain - Under the Hood
 
Bitcoin & Ethereum Address
Bitcoin & Ethereum AddressBitcoin & Ethereum Address
Bitcoin & Ethereum Address
 
Simone Bronzini - Weaknesses of blockchain applications - Codemotion Milan 2018
Simone Bronzini - Weaknesses of blockchain applications - Codemotion Milan 2018Simone Bronzini - Weaknesses of blockchain applications - Codemotion Milan 2018
Simone Bronzini - Weaknesses of blockchain applications - Codemotion Milan 2018
 
Introduction to Ethereum
Introduction to EthereumIntroduction to Ethereum
Introduction to Ethereum
 
Intro into blockchain
Intro into blockchainIntro into blockchain
Intro into blockchain
 
Ethereum Intro
Ethereum IntroEthereum Intro
Ethereum Intro
 
Bitcoins Math
Bitcoins MathBitcoins Math
Bitcoins Math
 
Best practices to build secure smart contracts
Best practices to build secure smart contractsBest practices to build secure smart contracts
Best practices to build secure smart contracts
 
Bitcoin, Blockchain and the Crypto Contracts - Part 2
Bitcoin, Blockchain and the Crypto Contracts - Part 2Bitcoin, Blockchain and the Crypto Contracts - Part 2
Bitcoin, Blockchain and the Crypto Contracts - Part 2
 
Pi network
Pi networkPi network
Pi network
 
Bitcoin p2p money
Bitcoin p2p moneyBitcoin p2p money
Bitcoin p2p money
 
Blockchain and bitcoin
Blockchain and bitcoinBlockchain and bitcoin
Blockchain and bitcoin
 

Ähnlich wie Blockchain - a basic overview

Abusing Microsoft Kerberos - Sorry you guys don’t get it
Abusing Microsoft Kerberos - Sorry you guys don’t get itAbusing Microsoft Kerberos - Sorry you guys don’t get it
Abusing Microsoft Kerberos - Sorry you guys don’t get it
E Hacking
 

Ähnlich wie Blockchain - a basic overview (20)

The blockchain game
The blockchain gameThe blockchain game
The blockchain game
 
Concept of BlockChain & Decentralized Application
Concept of BlockChain & Decentralized ApplicationConcept of BlockChain & Decentralized Application
Concept of BlockChain & Decentralized Application
 
BlockchainConf.tech - Build a private blockchain workshop
BlockchainConf.tech - Build a private blockchain workshopBlockchainConf.tech - Build a private blockchain workshop
BlockchainConf.tech - Build a private blockchain workshop
 
Blockchain Technologies for Data Science
Blockchain Technologies for Data ScienceBlockchain Technologies for Data Science
Blockchain Technologies for Data Science
 
Blockchain, cryptography and tokens — NYC Bar presentation
Blockchain, cryptography and tokens — NYC Bar presentationBlockchain, cryptography and tokens — NYC Bar presentation
Blockchain, cryptography and tokens — NYC Bar presentation
 
Django cryptography
Django cryptographyDjango cryptography
Django cryptography
 
Cryptography and SSL in Smalltalk - StS 2003
Cryptography and SSL in Smalltalk - StS 2003Cryptography and SSL in Smalltalk - StS 2003
Cryptography and SSL in Smalltalk - StS 2003
 
“Technical Intro to Blockhain” by Yurijs Pimenovs from Paybis at CryptoCurren...
“Technical Intro to Blockhain” by Yurijs Pimenovs from Paybis at CryptoCurren...“Technical Intro to Blockhain” by Yurijs Pimenovs from Paybis at CryptoCurren...
“Technical Intro to Blockhain” by Yurijs Pimenovs from Paybis at CryptoCurren...
 
Blockchain and bitcoin fundamentals (usages and applications)
Blockchain and bitcoin fundamentals (usages and applications)Blockchain and bitcoin fundamentals (usages and applications)
Blockchain and bitcoin fundamentals (usages and applications)
 
Cryptography 202
Cryptography 202Cryptography 202
Cryptography 202
 
Bitcoin developer guide
Bitcoin developer guideBitcoin developer guide
Bitcoin developer guide
 
J.burke HackMiami6
J.burke HackMiami6J.burke HackMiami6
J.burke HackMiami6
 
Abusing Microsoft Kerberos - Sorry you guys don’t get it
Abusing Microsoft Kerberos - Sorry you guys don’t get itAbusing Microsoft Kerberos - Sorry you guys don’t get it
Abusing Microsoft Kerberos - Sorry you guys don’t get it
 
Abusing Microsoft Kerberos - Sorry you guys don't get it
Abusing Microsoft Kerberos - Sorry you guys don't get itAbusing Microsoft Kerberos - Sorry you guys don't get it
Abusing Microsoft Kerberos - Sorry you guys don't get it
 
Cryptography
CryptographyCryptography
Cryptography
 
Blockchain Cryptography for Developers (Nakov @ BlockWorld 2018, San Jose)
Blockchain Cryptography for Developers (Nakov @ BlockWorld 2018, San Jose)Blockchain Cryptography for Developers (Nakov @ BlockWorld 2018, San Jose)
Blockchain Cryptography for Developers (Nakov @ BlockWorld 2018, San Jose)
 
SMART Seminar Series: "Blockchain and its Applications". Presented by Prof Wi...
SMART Seminar Series: "Blockchain and its Applications". Presented by Prof Wi...SMART Seminar Series: "Blockchain and its Applications". Presented by Prof Wi...
SMART Seminar Series: "Blockchain and its Applications". Presented by Prof Wi...
 
Modern Linux Tracing Landscape
Modern Linux Tracing LandscapeModern Linux Tracing Landscape
Modern Linux Tracing Landscape
 
The Ring programming language version 1.5.1 book - Part 28 of 180
The Ring programming language version 1.5.1 book - Part 28 of 180The Ring programming language version 1.5.1 book - Part 28 of 180
The Ring programming language version 1.5.1 book - Part 28 of 180
 
Ssh and sshfp dns records v04
Ssh and sshfp dns records v04Ssh and sshfp dns records v04
Ssh and sshfp dns records v04
 

Kürzlich hochgeladen

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 

Kürzlich hochgeladen (20)

Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 

Blockchain - a basic overview

  • 2. Myth-Busters ● Blockchain doesn’t mean crypto-currency ● Crypto-currency doesn’t mean BitCoin or Ethereum -------------------------------- ● Blockchain is just a technology. ex: database | cache | etc ● Crypto-currency uses an implementation of blockchains ● BitCoin, Ethereum these are all different kinds of crypto-currencies which use different ways of implementing the Blockchain
  • 3. A chain is only as strong as its weakest link
  • 5. What is a hash? A scrambled representation of a value which is hard to reverse to determine the original value that it represents. h = f(x) Popular hashing functions: sha1 | sha256 | md5 | AES | bcrypt | many more
  • 8. “hello world” “Hello world” sha1 2aae6c35c94fcfb415dbe95f408b9ce91ee846ed 7b502c3a1f48c8609ae212cdfb639dee39673f5e sha256 b94d27b9934d3e08a52e52d7da7dabfac484efe3 7a5380ee9088f7ace2efcde9 64ec88ca00b268e5ba1a35678a1b5316d212f4f3 66b2477232534a8aeca37f3c md5 5eb63bbbe01eeed093cb22bb8f5acdc3 3e25960a79dbc69b674cd4ec67a72c62
  • 9. Back to the chain
  • 10. It always starts with a block - the GENESIS block ● index = 0 ● no previous hash
  • 11. The Data The data can be any data representing any event or any information that happened in the world
  • 12. the hash is produced by hashing the data and the nonce hash = f(data+nonce) The Hash Disclaimer: The hash is actually computed from a combination of several fields like: (data + nonce + index + previous hash + timestamp). But for the simplicity of these slides, we will only consider (data + nonce).
  • 13. The nonce is determined by the miner , incrementally until the hash meets a pre-defined. difficulty level . The Nonce
  • 14. hash = f(data + nonce) Difficulty Level: ‘$0000’ f(‘hello world’ + 1) = 7b502c3a1f48c8609ae212cdfb639de…… f(‘hello world’ + 2) = 2aae6c35c94fcfb415dbe95f408b9ce…… f(‘hello world’ + 3) = b94d27b9934d3e08a52e52d7da7dab…… f(‘hello world’ + 245) = 3e25960a79dbc69b674cd4ec67a7…… f(‘hello world’ + 9436) = 5eb63bbbe01eeed093cb22bb8f…… f(‘hello world’ + 85460) = 0000a51677b3cc64056c498c1d……
  • 15. ● the data contains any new information / event ● increments the index by 1 ● determines a new nonce to validate a new hash for the new data ● previous hash refers to the hash of the previous block - which 1 index less Enter next block
  • 16.
  • 17. ● There is one genesis block ● Every other block follows the genesis block sequentially ● Every block knows the hash of its previous block ● Modify the data in one block: ○ it changes its own hash ○ which invalidates the value of ‘previous hash’ in the next block ○ which invalidates the next block’s own hash ○ the whole chain collapses following that one block One chain of many blocks
  • 18. A chain is only as strong as its weakest link
  • 20. Some pointers An immutable record of the past Historical events cannot be changed easily Democratically determine problematic peers Can use public-private keypair-signing to further reinforce integrity of the blockchain
  • 21. Further illustrated video tutorials https://anders.com/blockchain/
  • 22. Thanks Syed Rakib Al Hasan Software Engineer fave Malaysia github.com/syedrakib linkedin.com/in/syedrakib twitter.com/syedrakib