Intro To Blockchain Bootcamp 011820 PDF
Intro To Blockchain Bootcamp 011820 PDF
100,000.00
What is a blockchain?
…a consensus-supported, ledger of
cryptographically signed statements that are
recorded in an agreed-upon order (in a
deterministic way). ARGH!
5 Key Developments in Blockchain
• Emergence of Bitcoin
• Separation from Bitcoin
• Smart Contracts
• Proof of Stake
• Scaling blockchain tech
Source: “A brief history of Blockchain Technology,” by Bernard Marr, Forbes. (16 Feb 2018)
Emergence of Bitcoin (Dev1)
• Bitcoin: A Peer to Peer Electronic Cash System by Satoshi Nakamoto
• Describes a purely decentralized currency (2008)
• Potentially transformative and disruptive technology
• Release of Bitcoin to open source community (2009)
• Cryptocurrency is the first “killer app” for blockchain tech
• Ecosystem begins to explode (miners, traders, merchants, consumers…)
• “Blockchain is to Bitcoin, what the Internet is to email. A big
electronic system, on top of which you build applications.”
• Sally Davies, FT Technology Reporter
• Blockchain ≠ Bitcoin
Separation from Bitcoin (Dev2)
• Blockchain can be used beyond cryptocurrency
• A decentralized ledger permanently recording transactions between
parties
• No need for third party authentication (Efficiency! Lower cost!)
• People start to ask, how can blockchain help me?
• Supply chains, healthcare, insurance, transportation, voting,
contracts, …
What is blockchain?
• Hashing
• Block
• Block chain
• Distributed block chain
• …and a dash of crypto
What is hashing?
• A hash is a fingerprint of some input data.
• Can be used to retrieve data _and_ verify that data hasn’t changed.
Want more? Crypto courses: CS 4264, MATH 4175 + 4176, ECE 5580
256-bit hashing
Digital fingerprint of data. Deterministic. Many to 256 mapping.
Think carrots.
Smart Contracts (Dev3)
• Next Killer App for Blockchain
• Exchange money, property or services without centralized authority
• If-then clauses tied to exchange
• Real estate transaction: You place deposit, I send key by date.
• If no key by date, refund you. If key by date, deposit to me, key to you.
• Blockchain community “judges” the contract validity through consensus.
• Transaction recorded permanently on the blockchain.
Consensus Alternatives?
• Proof of Work Merits
• Widely used
• Robust, working solution for a decade
• “Harder” to hack with scale
• Proof of Work Limitations
• Mining is wasteful
• Tragedy of the commons (when bounties disappear, incentives decrease)
• Smaller network (or oligarchy via collusion) can lead to manipulation
Proof of Stake (Dev4)
• Serves same purpose as Proof of Work
• Adding to blockchain and verification of new blocks by p2p network
• Creator of new blocks deterministic (linked to wealth or stake)
• Chosen from pool of users with stake
• “Miners” take transaction fee for producing blocks
• Penalty is possible loss of stake for bad actors
• 51% threat based on “supply” rather than computing power
Think sticks.
Proof of Stake (Dev4)
• Merits
• Greener and cheaper form of consensus than Proof of Work
• Seen as promising alternative to Proof of work
• “Harder” to hack at scale
• Can be faster to reach consensus
• Limitations
• Not as widespread adoption as Proof of Work (but growing)
• Can potentially be manipulated with collusion
• Extension
• Delegated proof of stake (DPOS)
Transaction ledger example
• Symmetric cryptography
• Implies sender and receiver are in control of the cipher
• Example: Julius Caesar shifted message sent by # letters in alphabet.
• (encrypt: shift right by 1) Kirk Cameron --> ljsl dbnfspo (decrypt shift left by 1)
• Challenges: 1) Can be easy to decrypt; 2) How to tell others the cipher.
Public Key Cryptography
• One asymmetric solution
• RECEIVER: Generates a KEY PAIR (Public + Private)
• Sends Public Key to SENDER
• SENDER: Encrypt message using RECEIVER's Public Key
• Sends encrypted message to RECEIVER
• RECEIVER: Decrypts encrypted message using private key
Anything encrypted by YOUR PUBLIC key can only be opened by YOUR private key
Keeps data secured and only viewable by you (or using your private key)
Anything encrypted by YOUR PRIVATE key can only be opened by YOUR public key
Thus proving you locked it in the first place
Transaction ledger example
Validity of individual transaction checked with public key and transaction data.
Validity of block transaction checked with hash and data.
Validity of individual transaction checked with public key and transaction data.
Validity of block transaction checked with hash and data.
Remined/modified Transaction
Validity of individual transaction checked with public key and transaction data.