UNIT V FBT
UNIT V FBT
Bitcoin relies on a consensus mechanism known as Proof-of-Work (PoW) to ensure the security
and integrity of its blockchain. Here's how it works:
1. Mining:
2. Block Creation:
3. Block Validation:
4. Chain Growth:
Why PoW?
Security: The computational effort required to solve the puzzles makes it extremely
difficult for malicious actors to manipulate the blockchain.
Decentralization: No single entity controls the network, ensuring fairness and
transparency.
Incentive: Miners are rewarded with newly minted bitcoins for their efforts,
incentivizing them to maintain the network's security.
The concept of Merkle Tree is named after Ralph Merkle, who patented the idea in 1979.
Fundamentally, it is a data structure tree in which every leaf node labelled with the hash of a
data block, and the non-leaf node labelled with the cryptographic hash of the labels of its child
nodes. The leaf nodes are the lowest node in the tree.
A Merkle tree stores all the transactions in a block by producing a digital fingerprint of the entire
set of transactions. It allows the user to verify whether a transaction can be included in a block or
not.
Merkle trees are created by repeatedly calculating hashing pairs of nodes until there is only one
hash left. This hash is called the Merkle Root, or the Root Hash. The Merkle Trees are
constructed in a bottom-up approach.
Every leaf node is a hash of transactional data, and the non-leaf node is a hash of its previous
hashes. Merkle trees are in a binary tree, so it requires an even number of leaf nodes. If there is
an odd number of transactions, the last hash will be duplicated once to create an even number of
leaf nodes.
The above example is the most common and simple form of a Merkle tree, i.e., Binary Merkle
Tree. There are four transactions in a block: TX1, TX2, TX3, and TX4. Here you can see, there
is a top hash which is the hash of the entire tree, known as the Root Hash, or the Merkle Root.
Each of these is repeatedly hashed, and stored in each leaf node, resulting in Hash 0, 1, 2, and 3.
Consecutive pairs of leaf nodes are then summarized in a parent node by
hashing Hash0 and Hash1, resulting in Hash01, and separately hashing Hash2 and Hash3,
resulting in Hash23. The two hashes (Hash01 and Hash23) are then hashed again to produce the
Root Hash or the Merkle Root.
Merkle Root is stored in the block header. The block header is the part of the bitcoin block
which gets hash in the process of mining. It contains the hash of the last block, a Nonce, and the
Root Hash of all the transactions in the current block in a Merkle Tree. So having the Merkle
root in block header makes the transaction tamper-proof. As this Root Hash includes the hashes
of all the transactions within the block, these transactions may result in saving the disk space.
The Merkle Tree maintains the integrity of the data. If any single detail of transactions or order
of the transaction's changes, then these changes reflected in the hash of that transaction. This
change would cascade up the Merkle Tree to the Merkle Root, changing the value of the Merkle
root and thus invalidating the block. So everyone can see that Merkle tree allows for a quick and
simple test of whether a specific transaction is included in the set or not.
Hardness of Mining
Transaction Verifiability
Anonymity
Pseudonymity: Bitcoin transactions are pseudonymous rather than anonymous. Users are
identified by public keys, not real names.
Privacy Concerns: While Bitcoin offers a degree of privacy, advanced blockchain
analysis techniques can potentially link public keys to real-world identities, raising
concerns about user privacy.
Forks
Hard Forks: A significant change to the Bitcoin protocol that creates a new blockchain
incompatible with the old one.
Soft Forks: A less disruptive change that maintains compatibility with the existing
blockchain.
Chain Split: Forks can lead to temporary chain splits, where two competing chains exist.
The network eventually settles on a single chain through a process called consensus.
Double Spending
Security Analysis:
o Cryptographic strength of the underlying algorithms.
Economic Analysis:
o Incentive structures for miners and users.