Bitcoin (what, why and how?)

Slides:



Advertisements
Similar presentations
Hash Functions A hash function takes data of arbitrary size and returns a value in a fixed range. If you compute the hash of the same data at different.
Advertisements

The easy answers to the hard questions! WHAT IS BITCOIN?
CIS 725 Key Exchange Protocols. Alice ( PB Bob (M, PR Alice (hash(M))) PB Alice Confidentiality, Integrity and Authenication PR Bob M, hash(M) M, PR Alice.
COMS 486 Iowa State University Introduction to Bitcoin A P2P Electronic Cash System.
1 Digital Signatures & Authentication Protocols. 2 Digital Signatures have looked at message authentication –but does not address issues of lack of trust.
Michal Kriziak MA1N0218 Financial Management The Bitcoin Currency.
Bitcoin Double Spending Attack Karame, Androulaki & Capkun Presented by Subhro Kar CSCE 715, Fall 2013.
Stefan Dziembowski Why do the cryptographic currencies need a solid theory? Forum Informatyki Teoretycznej, Warsaw
1 Chapter 5 Money and the Federal Reserve These slides supplement the textbook, but should not replace reading the textbook.
CSCI283 Fall 2005 GWU All slides from Bishop’s slide set Public Key Infrastructure (PKI)
Advanced Computer Communications PROFESSOR:STUDENT: PROF. DR. ING. BRAD REMUS STEFAN FEILMEIER FACULTATEA DE INGINERIE HERRMANN OBERTH MASTER-PROGRAM.
BY MUKTADIUR RAHMAN MAY 06, 2010 INTERODUCTION TO CRYPTOGRAPHY.
Presented by Xiaoping Yu Cryptography and PKI Cosc 513 Operating System Presentation Presented to Dr. Mort Anvari.
1 CPSC156: The Internet Co-Evolution of Technology and Society Lectures 19,20, and 21: April 5, 10, and 12, 2007 Cryptographic Primitives.
BITCOIN An introduction to a decentralised and anonymous currency. By Andy Brodie.
Bitcoin is the FUTURE of MONEY!!
Introduction to Public Key Infrastructure (PKI) Office of Information Security The University of Texas at Brownsville & Texas Southmost College.
Network Security – Part 2 V.T. Raja, Ph.D., Oregon State University.
Financial Transactions on Internet Financial transactions require the cooperation of more than two parties. Transaction must be very low cost so that small.
Alexander Potapov.  Authentication definition  Protocol architectures  Cryptographic properties  Freshness  Types of attack on protocols  Two-way.
Cryptography Project David B. Robins March What are some desirable qualities? What should be used? 1.Portability 2.Durability 3.Fungibility/homogeneity.
31.1 Chapter 31 Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Page 1 Secure Communication Paul Krzyzanowski Distributed Systems Except as otherwise noted, the content of this presentation.
1 Cryptography Basics. 2 Cryptography Basic terminologies Symmetric key encryption Asymmetric key encryption Public Key Infrastructure Digital Certificates.
Tonga Institute of Higher Education Design and Analysis of Algorithms IT 254 Lecture 9: Cryptography.
The world’s first decentralized digital currency Meni Rosenfeld Bitcoil 29/11/2012Written by Meni Rosenfeld1.
Digital Cash By Gaurav Shetty. Agenda Introduction. Introduction. Working. Working. Desired Properties. Desired Properties. Protocols for Digital Cash.
MIS 3090 IT for Financial Services Digital Cash September 4, 2015.
Chapter 3 What Is Money?.
Digital Currency Kody Myers. Definition Currency that does not exist in any physical form, but can be used similarly to physical currency while retaining.
Network Security – Part 2 (Continued) Lecture Notes for May 8, 2006 V.T. Raja, Ph.D., Oregon State University.
IT 221: Introduction to Information Security Principles Lecture 6:Digital Signatures and Authentication Protocols For Educational Purposes Only Revised:
Cryptography, Authentication and Digital Signatures
David Evans CS200: Computer Science University of Virginia Computer Science Class 36: Public-Key Cryptography If you want.
Digital Cash. p2. OUTLINE  Properties  Scheme  Initialization  Creating a Coin  Spending the Coin  Depositing the Coin  Fraud Control  Anonymity.
4 th lecture.  Message to be encrypted: HELLO  Key: XMCKL H E L L O message 7 (H) 4 (E) 11 (L) 11 (L) 14 (O) message + 23 (X) 12 (M) 2 (C) 10 (K) 11.
23-1 Last time □ P2P □ Security ♦ Intro ♦ Principles of cryptography.
1 Bitcoin A Digital Currency. Functions of Money.
Encryption. What is Encryption? Encryption is the process of converting plain text into cipher text, with the goal of making the text unreadable.
IT FOR FINANCIAL SERVICES IS356. Agenda What is Bitcoin? A digital currency that is created and exchanged independently of any government or bank. Bitcoin.
Advanced Database Course (ESED5204) Eng. Hanan Alyazji University of Palestine Software Engineering Department.
Lecture 16: Security CDK4: Chapter 7 CDK5: Chapter 11 TvS: Chapter 9.
BITCOIN What is bitcoin? Put simply, bitcoin is a digital currency. It can be used to make electronic payments face to face or over the internet just like.
31.1 Chapter 31 Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Electronic Cash R. Newman. Topics Defining anonymity Need for anonymity Defining privacy Threats to anonymity and privacy Mechanisms to provide anonymity.
IS ANONYMOUS CURRENCY A GOOD IDEA? BY ADAM LASSWELL.
Private key
Bitcoins: Decentralized Digital Currency How it Works When Bitcoin was first created, 21 million coins were scattered across the digital realm and hidden.
Lecture 9 Overview. Digital Signature Properties CS 450/650 Lecture 9: Digital Signatures 2 Unforgeable: Only the signer can produce his/her signature.
Bitcoin Tech Talk Zehady Abdullah Khan (Andy) Graduate Assistant, Computer Science Department, Purdue University.
Section #9: Bitcoins. Digital currency Unique string of bits Use cryptography for security and privacy Not tied to names: hard to trace Finite set of.
The coins and paper used as money are called Currency. Money must be durable, portable, divisible, uniform, limited in supply, and acceptable. Money is.
Bitcoin: Fake, Virtual and Real Partha Dasgupta Arizona State University Tempe, AZ, USA Note: “Current” numbers used are from mid-2015.
Block Chain 101 May 2017.
Motivation ✓ ✘ ? Bitcoin/Ideal Credit Card Works on Internet
Computer Communication & Networks
Bitcoin - a distributed virtual currency system
Deanonymization of Clients in Bitcoin P2P Network
Keys Campbell R. Harvey Duke University, NBER and
Campbell R. Harvey Duke University and NBER
EECS 498 Introduction to Distributed Systems Fall 2017
Crypto Mining LLC.
Campbell R. Harvey Duke University and NBER
CDK4: Chapter 7 CDK5: Chapter 11 TvS: Chapter 9
Modernization of. Currency. Evolution Of Currency: Bartering System: Grains and cattle are popular in Barters. Firstly recorded in Egypt. Coinage: Metals.
CDK: Chapter 7 TvS: Chapter 9
Faculty Seminar Series Blockchain Technology
Chapter 8 roadmap 8.1 What is network security?
Campbell R. Harvey Duke University and NBER
GAYATRI INSTITUTE OF COMPUTER AND MANAGEMENT HINJILICUT (GANJAM)
Presentation transcript:

Bitcoin (what, why and how?) Partha Dasgupta Arizona State University Tempe, AZ, USA

Overview What is bitcoin? What is money and/or currency? Bitcoin properties Cryptography Bitcoin logs, mining and transactions Using Bitcoins Bitcoin properties, again

Money? Currency? Money: a store of value. An object that can be traded for any other object Gold Valuable coins Currency: A medium of exchange of money and goods. Circulation of money Method by which circulation is done In most cases >> money = currency Fiat Currency: A form of currency that has value because someone in authority says it has value. Governments. USD, CNY/RMB, EUR, GBP, JPY and so on. Bitcoin is digital fiat currency No authority, users think is has value Completely digital

What is BITCOIN? A currency that is issued, used and controlled by its users Not cash, stock, bond, smartcard, stored value wallet. Not a digital replacement of paper money (not tied to US Dollar or Chinese RMB) Bitcoin is money or currency not created or managed by a country or corporation Bitcoin users can create bitcoins. (Make money!!) Bitcoins can be used for transactions Bitcoins cannot be forged, copied, double spent – security is enforced by cryptography and P2P log checking. Value?? Ownership?? Control?? Hard to understand but clearly defined.

Where did Bitcoin come from? A paper that was anonymously sent to a journal. By a person called “Satoshi Nakamoto”. Never published. No one knows who Satoshi is, real name, age, gender, location. Some have claimed to have received emails from Satoshi. A group of open source developers programmed the Bitcoin software and made it available Bitcoin software is easily obtained, servers can be set up People have set up bitcoin infrastructure Bitcoin exchanges convert national currencies to Bitcoins and vice versa, exchange rates are set by market values. Bitcoin is P2P Yes, it is a mystery, yet it is trusted.

Bitcoin Properties Bitcoin is a digital thing, whose properties are similar to gold. Bitcoin is difficult to create (or mine) In the beginning it was easy Now it is hard It is going to get harder, finite supply. The total number of bitcoins is limited. Just like gold. The value of bitcoin is what people are willing to pay for it. Or sell for it Anyone can “make” a bitcoin. It is like finding gold. Anyone can verify that a bitcoin is genuine. Counterfeiting is impossible

Bitcoin properties Bitcoin is digital Bitcoin is easy to transfer If Alice has 1 BTC, she can give it to Bob Transaction costs are very low Bitcoin can be used to buy things Bitcoin is anonymous (like paper money) Bitcoins are divisible, one bicoin can be divided into 108 smaller units. Converting Bitcoins and other currencies are done via bitcoin exchanges MtGox is the most popular exchange

Bitcoin Prices in USD

Finite Supply The total number of Bitcoins that can be created is 21 million About 10.5 million has already been created New bitcoins will stop being created in 2140 (approx) Current creation rate is 25 bitcoins every 10 mins Bitcoin miners race each other to see who can create the coins. Adding compute power helps but not by much A self regulating protocol, it gets harder to create bitcoin, the more bitcoins are created The control of bitcoin supply is not via policy but via protocol The bitcoin protocol defines a new coin as a hash value of that has a set of 0s and the number of zeros controls the difficulty

Input Data Bits, large number Cryptographic Basics Nonce: A large (>128 bit) random number. No two nonces are equal Cryptographic Hash Not two inputs produce the same output hash! If you know the input, you can easily compute the hash You cannot find ANY input that produces a particular hash Hash Function Input Data Bits, large number 128 bit hash

Plaintext (same as input) Encrypt hash with private key Cryptographic Basics Public Key Encryption Digital Signatures Public key (k1) Input (plaintext) Encrypt Output (ciphertext) Encrypt Plaintext (same as input) Private key (k2) Encrypt hash with private key Hash of input Input Document

What is Bitcoin? Again Bitcoin transaction log Bitcoin A log of all transactions using bitcoints Contains the bitcoin and the originating wallet and the destination wallet A signature (digital signature) from the sending wallet Bitcoin A date, a wallet ID and a segment of a transaction log and a hash value The last k-bits of the hash are all zeros. Changing k makes creating (mining) bitcoins harder

A New Bitcoin A block of the transaction log, a nonce and a hash value The has value must end in k zeros hash + NONCE _ _ _ _ _ _ 0 0 0 0 0 Transaction log block

Transferred Bitcoin Bitcoins are transferred from one wallet to another by adding a chain of transactions, signed by the sender (owner) Senders and receivers have IDs, same as wallet ID

Global Transaction Log Alice sends 1 BTC to Bob Alice creates a log, signs it and this log is sent to Bob, as Bobs bitcoin The log is also sent to a global log Global logs are stored at P2P bitcoin log sites Bob can check if Alice has sent the log to the global log Global log checks if Alice sends the same bitcoin twice Make sure Alice does not cheat Every transaction is known to everyone

Bitcoin Wallets Alice has one or more wallets Wallets store bitcoins Alice’s wallet can be stored on Alice’s computer Every wallet has an ID The ID is the public key of the wallet, the private key is kept securely inside the wallet Private key is used to sign transactions, public key is used to identify No certificate authorities exist “self signed”

Wallet Transaction Log

Anonymity Every bitcoin wallet has an ID Every transaction is globally known Hence it is possible to know the amount of bitcoins in a wallet Everything is public Yet, bitcoins are anonymous? Yes, if bitcoin wallet ID is not traced to a human ID Responsibility of wallet owner

Security Bitcoin is cryptographically secure All actions are public Security is maintained by cryptographic functions, hash, public key encryption All actions are public Bitcoin global logs check for fraudulet transactions and reject them Forging bitcoins and transaction chains are very hard No one has shown any flaws in the protocol Bitcoins can be stolen Bitcoin wallets can be stolen Bitcoins can be lost, if the wallet storage is lost

Bitcoin Acceptance New currency, acceptance is slow Not many buyers and sellers take bitcoins But it is growing Total value of Bitcoins: $1.5 billion USD Transaction volume: About $30 million USD/day Not known: Will bitcoins be a global currency some day? Will bitcoins replace currencies controlled by governments?