An Analysis and Breakdown of SHA Hashing in Bitcoin Cyryptocurrency Project Proposal - Spring 2015.

Slides:



Advertisements
Similar presentations
CT-KIP Magnus Nyström, RSA Security 23 May Overview A client-server protocol for initialization (and configuration) of cryptographic tokens —Intended.
Advertisements

Cryptocurrency Café UVa cs4501 Spring 2015 David Evans Class 16: Alternate Cryptocurrencies flickr cc: epSos.de.
MD5 Summary and Computer Examination Process Introduction to Computer Forensics.
Problem 1 3/10/2011Practical Aspects of Modern Cryptography.
Cryptocurrency Café UVa cs4501 Spring 2015 David Evans Class 25: Proof of Reserve New York City, 1929.
Dr Alejandra Flores-Mosri Message Authentication Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to:
Secure Hashing and DSS Sultan Almuhammadi ICS 454 Principles of Cryptography.
Cryptocurrency Café UVa cs4501 Spring 2015 David Evans Class 23: Blooming Sidechains!
Cryptography1 CPSC 3730 Cryptography Chapter 11, 12 Message Authentication and Hash Functions.
Lecture slides prepared for “Computer Security: Principles and Practice”, 2/e, by William Stallings and Lawrie Brown, Chapter 21 “Public-Key Cryptography.
Cryptocurrency Café UVa cs4501 Spring 2015 David Evans Class 11: Mining Pools and Attacks.
Security Security is a measure of the system’s ability to protect data and information from unauthorized access while still providing access to people.
Introduction1-1 Data Communications and Computer Networks Chapter 6 CS 3830 Lecture 31 Omar Meqdadi Department of Computer Science and Software Engineering.
1 Bitcoin A Digital Currency. Functions of Money.
Lecture 4.2: Hash Functions: Design* CS 436/636/736 Spring 2012 Nitesh Saxena * some slides borrowed from Gene Tsudik.
Cryptography Fundamentals
CS426Fall 2010/Lecture 51 Computer Security CS 426 Lecture 5 Cryptography: Cryptographic Hash Function.
Exam 1. Spring Comparison Spring 2007 A’s 12 8% B’s 25 17% C’s 46 32% Passing 83 57% D’s 34 23% Median 71% Spring 2008 A’s 25 14% B’s 45 27% C’s 38 22%
Section #9: Bitcoins. Digital currency Unique string of bits Use cryptography for security and privacy Not tied to names: hard to trace Finite set of.
Cryptocurrency Café UVa cs4501 Spring 2015 David Evans Class 18.
Secure Instant Messenger in Android Name: Shamik Roy Chowdhury.
CRYPTOCURRENCY Bitcoin,Ether & Beyond..
Symposium on Distributed Ledger Technology SDLT'2017
CSE 4095 Lecture 22 – BlockChain Slides adapted from Claudio Orlandi.
Denis Pinkas. Bull SA. Cryptographic Maintenance Policy IETF LTANS meeting in Paris August, 1rst , 2005 Denis Pinkas. Bull SA.
ERS to XML Introduction to ERS syntax in XML format
CS260 Data Mining Using Tensor Methods 00 – Paper Title
Bitcoin Mining by David Kopczyk.
Cryptographic Hash Pointers
One-way Encryption Ideal Properties
An Analysis and Breakdown of SHA Hashing in Bitcoin
CS 7403 Secure Electronic Commerce University of Tulsa Tyler Moore
So what is Blockchain anyway?
최신정보보호기술 경일대학교 사이버보안학과 김 현성.
One-way Encryption Properties
Data Structures and Analysis (COMP 410)
MAC: Message Authentication Code
Cryptographic Hash Functions
CS 240: Computing Systems and Concurrency Lecture 20 Marco Canini
تحليل الحساسية Sensitive Analysis.
Addresses Campbell R. Harvey Duke University, NBER and
Nonce Making Sense of Nonces.
Campbell R. Harvey Duke University and NBER
Blockchain Principles
Blockchain Concepts RISK FORUM 2017 Hash function (e.g. SHA-256)
Chapter 11: Hash Tables.
Certificate Enrollment Process
Addresses Campbell R. Harvey Duke University, NBER and
Data Structures and Analysis (COMP 410)
Unit 3 Review (Calculator)
Campbell R. Harvey Duke University and NBER
Chapter 11: Hash Tables.
CS5220 Advanced Topics in Web Programming Secure REST API
TrustChain: A Sybil-resistant scalable blockchain
The blockchain : Bitcoin
Bitcoin Data Structures
Do Now Give 1 example of potential energy.
Wokshop SAIS 2018 Dr. Meg Murray Kennesaw state university
Cryptography Lecture 13.
Calculate 9 x 81 = x 3 3 x 3 x 3 x 3 3 x 3 x 3 x 3 x 3 x 3 x =
Faculty Seminar Series Blockchain Technology
Lecture 4: Hash Functions
Cryptography Fundamentals
ג'ואי מזרחי מיכל חקשור דור אזולאי.
Campbell R. Harvey Duke University and NBER
Cryptographic Hash Functions
Campbell R. Harvey Duke University and NBER
Bitcoin and Blockchain
Blockchains Lecture 4.
Author: Satoshi Nakamoto
Presentation transcript:

An Analysis and Breakdown of SHA Hashing in Bitcoin Cyryptocurrency Project Proposal - Spring 2015

SHA Use in Bitcoin ● SHA256 used heavily as bitcoin’s underlying cryptographic hashing function ● Two examples (of many) are its use in the Merkle tree hash, as well as the proof of work calculation

Bitcoin and Beyond Areas of use: ● bitcoin ● pointcoin ● other CS classwork (CS3240) ● encrypting sensitive forms (taxes, etc.) ● We have been taught to be more critical of foreign methods/software

An Exploratory Analysis of SHA encryption 1)How the algorithm (SHA256) actually works 2)Comparison of the different version’s algorithms 3)Historical review of attacks on SHA algorithm 4)Energy analysis for hashing power 5)A forecast for the future (SHA -3, tokenization for data transfer, the potential of mining without hashing, etc.)