Presentation is loading. Please wait.

Presentation is loading. Please wait.

CS 401/601 Computer Network Systems Mehmet Gunes

Similar presentations


Presentation on theme: "CS 401/601 Computer Network Systems Mehmet Gunes"— Presentation transcript:

1 CS 401/601 Computer Network Systems Mehmet Gunes
Bitcoin CS 401/601 Computer Network Systems Mehmet Gunes Modified from Murtuza Jadliwala, Ivan Rubinić, David V Duccini, Amir Houmansadr, Sascha Boehme, Jason Madden

2 Bitcoin Whitepaper –

3 BitCoin It is simply a means of sending and receiving numbers to and from "addresses" Described by Satoshi Nakamoto in 2008 Introduced as open-source software in 2009 An Open-Source Peer-To-Peer Payment Network Payments are recorded in a public ledger Using Digital Signatures & Encryption decentralization is the basis for Bitcoin's security and freedom

4 Bitcoin A protocol that supports a decentralized, pseudo-anonymous, peer-to-peer digital currency A publicly disclosed linked ledger of transactions stored in a blockchain A reward driven system for achieving consensus (mining) based on “Proofs of Work” for helping to secure the network A “scare token” economy with an eventual cap of about 21M bitcoins

5 Bitcoin Governance - an open source community of developers backed by the Bitcoin Foundation. Democratic - if you don't like one of the changes, you are more than welcome to fork the chain and implement your own rules Money Creation - is given to the people, not to the central bankers. Deflationary by design - money supply cannot be manipulated and is fixed at 21 million coins, each divisible up to 8 decimal

6 Features of Bitcoin Is “deflationary” – the reward is cut in half every four years, and tokens can be irrevocably destroyed Nearly infinitely divisible currency units supporting eight decimal places (known as a Satoshi) Nominal transaction fee’s paid to the network Same cost to send $.01 as $1,000,000 Consensus driven – no central authority Counterfeit resilient Cannot add coins arbitrarily Cannot be double-spent No recourse and no one to appeal to return sent tokens

7 Brief history of bitcoin
Bitcoin is registered Bitcoin design paper published The Genesis Block is mined (18:15:05 GMT) First Bitcoin transaction An exchange rate is established A currency exchange is born MtGox is established A vulnerability in the system is exploited to generate 184 billion Bitcoins First collective mining starts Another exploit discovered First short sale 2011 Silk Road opens for business 25% of total Bitcoins generated Bitcoin reaches parity with USD (1:1) First put option sold 25,000 BTC theft reported Major breach at MtGox Creation of physical Bitcoins Second largest Bitcoin exchange shuts down Market cap reaches $ 1 billion Gaming company caught secretly mining Bitcoins from customer computers First Bitcoin ATM (San Diego) Bitcoin ruled currency by Texas judge FBI shuts down Silk Road (3.6 milllion USD seized) Bitcoin goes above $ 1000

8 Number of Transactions per Day

9 Hash Rate

10 Market Price

11 Transaction Fees

12 The Bitcoin Startup Ecosystem: Six Different Bitcoin Company Categories
Exchanges Wallets Universal Payment Processing Financial Services Mining

13 Legality of Bitcoin by country

14 Why Bitcoin became the pioneer in virtual currency
Financial crisis caused meltdown of the economy in Caused a transfer of assets form real-estate and financial sphere to investment into commodities that are traditionally considered as a stable store of values Historically, Gold is best known commodity of that type because quantity of this metal is limited and, therefore, it is great way how to hedge your portfolio in times when usage of expansive monetary policy is highly likely Bitcoin is similar to gold (except there is no intrinsic value) and when the value of gold started to decrease due to the price roof that it had reached and partial recovery of financial market, value of bitcoin soared because it was cleverly designed financial product with finite quantity

15 How it works The block chain is the fundamental data structure of the Bitcoin protocol It's a single data file participants pass around to each other It allows them to know who owns what Anyone can change it to send money to someone else Other users mathematically verify the transaction to ensure it's validity

16 How It Works It's essentially an accounting ledger:
3/3/13 Sally found : $15.00 3/3/13 Sally -> Bob : $10.00 3/4/13 Bob -> Jimmy : $4.00 3/4/13 Sally -> Barb : $4.00 3/4/13 Jimmy -> Sally : $2.00 How much money does Sally have in her wallet? Sally had $15, then gave $10 to Bob, then $4 to Barb, then was given $2 from Jimmy. Sally has $3 as of right now.

17 Decentralized The “digital wallet” operates in a peer to peer mode
When it starts it bootstraps to find other wallets Originally it used the Internet Relay Chat (IRC) network Now based on DNS and “seed nodes” The wallet will synchronize with the network by downloading ALL of the transactions starting from the GENESIS block if necessary 572,061 blocks at time of slide prep Over 210 GB Using a “gossip protocol” the wallets share all transaction information with their peers

18 Coins flow from Inputs to Outputs
A coin owner transfers coins by digitally signing (via ECDSA) a hash digest of the previous transaction and the public key of the next owner. This signature is then appended to the end of the coin.

19 Transactions Input contains
1) A public key that belongs to the redeemer of the output transaction. 2) An ECDSA hash over a hash of the transaction. Output contains 1) The actual amount being sent to the recipient. 2) The change amount being sent back to the original sender (if any) 3) The voluntary transaction fee attached to the output (if any). The block chain prevents the double spend attack by giving other nodes the power to verify that transaction inputs were not already spent somewhere else.

20 Bitcoin Bitcoin blocks Users maintain a chain of blocks.
New block Bi = Ti || H(Bi-1)||R If a transaction t is contained in a block Bi and several new blocks on top of it, then the adversary cannot revert t unless it has more commutating power than half of the Bitcoin network. random salt new transaction list hash of previous block

21 Bitcoin Transaction Tx=(y, B.pk, v, sigA(y, B.pk, v))
Tx is valid only if A.pk was the recipient of Ty The value of Ty was at least v The transaction Ty has not been redeemed earlier The signature of A is correct a transaction from address A.pk to address B.pk input (redeemed) transaction index signature of A amount transferred

22 Pseudo Anonymous Using public key cryptography, specifically Elliptic Curve Cryptography due to its key strength and shorter keys Transactions are sent to public key “addresses” 1AjYPi8qryPCJu6xgdJuQzVnWFXLmxq9s3 1Give4dbry2pyJihnpqV6Urq2SGEhpz3K

23 Addresses are like Accounts
The wallet listens for transactions addressed to any of its public keys and in theory is the only node that is able to decrypt and accept the transfer “Coins” are “sent” by broadcasting the transaction to the network which are verified to be viable and then added to a block Keys can represent a MULTI-SIG address that requires a N of M private keys in order to decrypt the message

24 Identities in a cryptocurrency
How to make a new identity? Create a new, random key-pair (sk, pk) pk is the public “name” you can use [usually better to use H(pk)] sk lets you “speak for” the identity You control the identity pk, because only you know sk Even if pk “looks random” that’s fine, nobody needs to know your real identity for the cryptocurrency application Just like while spending an actually currency note

25 Identities in a cryptocurrency
Decentralized identity management Anybody can make a new identity at any time make as many as you want! No central point of coordination These identities are called “addresses” in Bitcoin Privacy Addresses not directly connected to real-world identity But observer can link together an address’s activity over time, make inferences

26 Privacy Implications No anonymity, only pseudonymity
All transactions remain on the block chain– indefinitely! Retroactive data mining Target used data mining on customer purchases to identify pregnant women and target ads at them (NYT 2012), ended up informing a woman’s father that his teenage daughter was pregnant Imagine what credit card companies could do with the data

27 Arriving at Consensus Although the accepted chain can be considered a list, the block chain is best represented with a tree The longest path represents the accepted chain A participant choosing to extend an existing path in the block chain indicates a vote towards consensus on that path The longer the path, the more computation was expended building it

28 Consensus Process = Mining
Originally the digital wallet could also participate in the consensus process by attempting to secure the network directly This process is known as “mining” Mining involves attempting to find a numerical value, known as a “nonce” that when combined with all open transactions can be “hashed” into a value that satisfies a certain “difficulty” Custom, purpose built-hardware has long since replaced the function such that its no longer productive for simple CPU based systems to compete in the mining process, and thus it was removed

29 Mining Miners collect the transactions on the network into large bundles called blocks like "Alice pays Karim 10 bitcoins" and "Liam pays Sofia 8.3 bitcoins". These blocks are strung together into one continuous, authoritative record called the block chain, which doesn't permit any conflicting transactions lets you know for sure exactly which transactions count and can be trusted (no double spending!)

30 Block Chain Bitcoin makes sure there is only one block chain by making blocks really hard to produce miners have to compute a cryptographic hash of the block that meets certain criteria difficulty of the criteria for the hash is adjusted based on how frequently blocks are appearing also carefully validate all the transactions that go into their blocks Successful miners are rewarded some bitcoins according to a preset schedule

31 Fraud prevention Users can trust the block chain that was most difficult to produce longest chain wins If there was a "fake" blockchain competing with the real ones the fraudster would have to do as much work as the rest of the network to make their block chain look as trustworthy intense work that goes into finding blocks through hashing secures the network against fraud

32 BitCoin Mining Collects transactions from the network
Validates them, and doesn't allow conflicting ones Puts them into large bundles called blocks Computes cryptographic hashes over and over until if finds one "good enough to count" Then submits the block to the network, adding it to the block chain and earning a reward in return

33 Bitcoin Security An attacker with > 50% of hash power can
Bitcoin addresses are RACE Integrity Primitives Evaluation Message Digest RIPEMD-160 of SHA-256 of an Elliptic Curve Digital Signature Algorithm public key any vulnerabilities in the algorithms would constitute a vulnerability in bitcoin itself An attacker with > 50% of hash power can Double spend: Reverse transactions that s/he sends while s/he's in control Prevent some or all transactions from gaining any confirmations Prevent some or all other generators from getting any generations

34 Why 51% Matters “When does 1 + 1 = 3 ?”
When everyone says it does! In the case of Bitcoin “consensus” goes to the chain with the highest number of blocks Not just in theory, but in practice several large mining pools have generated six blocks in a row To date the network has voluntarily shifted its mining power around or faced Distributed Denial of Service attacks

35 Aspects of decentralization in Bitcoin
Peer-to-peer network: Open to anyone, Low barrier to entry Mining: Open to anyone, but inevitable concentration of power often seen as undesirable Updates to software: Core developers trusted by community, have great power

36 Bitcoin Concerns Wallet Vulnerable To Theft Tracing a coin's history
Packet sniffing Sybil attack (cancer nodes) No authentication for IP transfers This attack is likely if you're using VPN/Tor Denial of Service (DoS) attacks Illegal content in the block chain Energy Consumption

37 Issues against bitcoin usage
New and uninvestigated financial product History is full of illegal and questionable activity Absence of relevant theoretical background Highly volatile value and an unknown issuer Undefined legal status Unregulated commodity and absence of consumer protection Anonymity and blurry taxation status Illegal or undefined in most countries of the world

38 Bad Uses for Good Technology
Bitcoin has had its fair share of “bad press” Silk Road An online anonymous marketplace for “censorship-free” commerce Bitinstant Charlie Shrem plead guilty to aiding money laundering MT-GOX aka “Magic The Gathering Online eXchange” 700,000 coins “missing”

39 The Silk Road case Silk Road had an estimated $200 million in sales. 95% of which for drugs. In October 2013 Silk Road was shut down

40 The Mt. Gox case Mt.Gox was the worst scandal in Bitcoin history and precipitated the burst of the bubble in early An estimated $500 million in bitcoins were lost.

41 Price of bitcoin has fluctuated wildly
Extreme volatility deters the mainstream from holding bitcoins as a store of value And makes it unsuitable as a unit of account Merchants instantly exchange bitcoins for fiat

42 USD/Bitcoin Weighted Price (Volatility)
China restricted Bitcoin exchange for local RMB Russia defined Bitcoin as dubios activity MtGox filed for bankruptcy (theft of 477 million USD in BTC) Soaring caused by wide acceptance of Bitcoin

43 Alternates to Bitcoin aka Altcoins
“Good artists copy. Great artists steal.” The first alternate blockchain was Namecoin Early attempts to “re-level the playing field” were made by changing the hashing function from SHA256 to SCRYPT SCRYPT is a “memory intensive” function that was thought to be resistant to customized hardware false

44 Alternates to Bitcoin aka Altcoins
Changes to the block emit time target were also changed from Bitcoins 10 minutes to 2.5 minutes to increase the velocity Newer ALTS incorporate every escalating hash functions chained together in novel ways to resist giving purpose built hardware an advantage over CPU based mining

45 A Babel of Altcoins Now well over 2,000 “alternate” coins to Bitcoin
99.99% of them are simply brands / clones Most tinker with: the total coin supply the hashing functions (SHA256, SCRYPT, X11 et al) block emit time targets Proof of Something (Proof of Work, Proof of Stake) Ethereum, Ripple, Bitcoin Cash, EOS, Litecoin, … Total Market Cap: $177 billion (Bitcoin is $92.7B)


Download ppt "CS 401/601 Computer Network Systems Mehmet Gunes"

Similar presentations


Ads by Google