Module2_Lect2_202425
Module2_Lect2_202425
Blockchain
and DLT
(BLCH)
ITC801
Subject In-charge
Dr. Joanne Gomes
Professor Dept. of Information Technology SFIT
Room No. 316
email: [email protected]
Module 2
Lecture 2
Bitcoin
Topics:
• Bitcoin Concepts: keys, addresses and wallets
Asymmetric Keys
Bitcoin Concepts: keys
• Bitcoin is based on public key cryptography Receive Funds Sign transactions
• Ownership of bitcoin is established through digital
keys, bitcoin addresses, and digital signatures.
Wallet
• Keys enables bitcoin, to have properties like
decentralized trust and control, ownership
attestation, & cryptographic-proof security model.
Public
Key
Hashing
&
Encoding
Bitcoin
Address
Why Use Asymmetric or Public key Cryptography?
• Asymmetric cryptography used in Bitcoin because it has ability to generate digital signatures.
• There is a mathematical relationship between the public and the private key that allows the
private key to be used to generate signatures on messages.
• Through the presentation of the public key and signature, everyone in the bitcoin network can
verify and accept the transaction as valid, confirming that the person transferring the bitcoin
owned them at the time of the transfer.
• Private Key
– used to create signatures required to spend bitcoin by proving ownership of funds used in a transaction
– must remain secret at all times
– should be backed up and protected from accidental loss.
• The private key is generated by picking up a simple random number between 1 and 2256
(between 1 and n - 1, where n = 1.158 * 1077), in such a way that it should not be predictable or
repeatable. Example:
1E99423A4ED27608A15A2616A2B0E9E52CED330AC530EDCC32C8FFC6A526AEDD
Public Keys
• The public key is calculated from the Private Key
private key using elliptic curve
multiplication, which is irreversible
K=k*G
where k is the private key, G is a
constant point called the
Elliptic Curve
generator point, and K is the resulting
Multiplication
public key.
Point of Infinity