Cryptocurrencies: Opportunities and Threats

Size: px
Start display at page:

Download "Cryptocurrencies: Opportunities and Threats"

Transcription

1 Cryptocurrencies: Opportunities and Threats Pasquale Forte 1 Giovanni Schmid 2 1 Università degli studi di Salerno 2 Istituto di Calcolo e Reti ad Alte Prestazioni Consiglio Nazionale delle Ricerche

2

3 Cryptocurrency: Foundations An open source project A distribuited peer-to-peer system A distribuited transaction database: the blockchain Anonymous transactions Coins defined as a chain of digital signatures Coins "stored" via a client program (wallet) Fixed amount of total coins to be produced

4 Cryptocurrency: Foundations An open source project A distribuited peer-to-peer system A distribuited transaction database: the blockchain Anonymous transactions Coins defined as a chain of digital signatures Coins "stored" via a client program (wallet) Fixed amount of total coins to be produced

5 Cryptocurrency: Foundations An open source project A distribuited peer-to-peer system A distribuited transaction database: the blockchain Anonymous transactions Coins defined as a chain of digital signatures Coins "stored" via a client program (wallet) Fixed amount of total coins to be produced

6 Cryptocurrency: Foundations An open source project A distribuited peer-to-peer system A distribuited transaction database: the blockchain Anonymous transactions Coins defined as a chain of digital signatures Coins "stored" via a client program (wallet) Fixed amount of total coins to be produced

7 Cryptocurrency: Foundations An open source project A distribuited peer-to-peer system A distribuited transaction database: the blockchain Anonymous transactions Coins defined as a chain of digital signatures Coins "stored" via a client program (wallet) Fixed amount of total coins to be produced

8 Cryptocurrency: Foundations An open source project A distribuited peer-to-peer system A distribuited transaction database: the blockchain Anonymous transactions Coins defined as a chain of digital signatures Coins "stored" via a client program (wallet) Fixed amount of total coins to be produced

9 Cryptocurrency: Foundations An open source project A distribuited peer-to-peer system A distribuited transaction database: the blockchain Anonymous transactions Coins defined as a chain of digital signatures Coins "stored" via a client program (wallet) Fixed amount of total coins to be produced

10 Cryptocurrency: Foundations An open source project A distribuited peer-to-peer system A distribuited transaction database: the blockchain Anonymous transactions Coins defined as a chain of digital signatures Coins "stored" via a client program (wallet) Fixed amount of total coins to be produced

11 History and current diffusion 2008 = Satoshi Nakamoto publishes Bitcoin paper 2009 = Network genesis: first client and first block 2010 = Real Bitcoin transactions Hanyecz pays BTC for two pizzas Market cap = 1 million USD 2011 = Bitcoin buzzes Dollar parity Wikileaks begins accepting Bitcoin for donations Silk Road is launched = Consolidation: Cyprus chooses Bitcoin as safe haven asset Market cap= 1 Billion USD China Central Bank prohibits financial institutions from handling bitcoin transactions FBI closes Silk Road, but one month later it is on-line again 2014 = Global diffusion: About 400 Bitcoin ATMs open (USA, Canada, Germany, Italy...) Microsoft accepts Bitcoin for games and apps FBI operates to definitively shut down Silk Road, but two hours later Silk Road is reloaded

12 History and current diffusion 2008 = Satoshi Nakamoto publishes Bitcoin paper 2009 = Network genesis: first client and first block 2010 = Real Bitcoin transactions Hanyecz pays BTC for two pizzas Market cap = 1 million USD 2011 = Bitcoin buzzes Dollar parity Wikileaks begins accepting Bitcoin for donations Silk Road is launched = Consolidation: Cyprus chooses Bitcoin as safe haven asset Market cap= 1 Billion USD China Central Bank prohibits financial institutions from handling bitcoin transactions FBI closes Silk Road, but one month later it is on-line again 2014 = Global diffusion: About 400 Bitcoin ATMs open (USA, Canada, Germany, Italy...) Microsoft accepts Bitcoin for games and apps FBI operates to definitively shut down Silk Road, but two hours later Silk Road is reloaded

13 History and current diffusion 2008 = Satoshi Nakamoto publishes Bitcoin paper 2009 = Network genesis: first client and first block 2010 = Real Bitcoin transactions Hanyecz pays BTC for two pizzas Market cap = 1 million USD 2011 = Bitcoin buzzes Dollar parity Wikileaks begins accepting Bitcoin for donations Silk Road is launched = Consolidation: Cyprus chooses Bitcoin as safe haven asset Market cap= 1 Billion USD China Central Bank prohibits financial institutions from handling bitcoin transactions FBI closes Silk Road, but one month later it is on-line again 2014 = Global diffusion: About 400 Bitcoin ATMs open (USA, Canada, Germany, Italy...) Microsoft accepts Bitcoin for games and apps FBI operates to definitively shut down Silk Road, but two hours later Silk Road is reloaded

14 History and current diffusion 2008 = Satoshi Nakamoto publishes Bitcoin paper 2009 = Network genesis: first client and first block 2010 = Real Bitcoin transactions Hanyecz pays BTC for two pizzas Market cap = 1 million USD 2011 = Bitcoin buzzes Dollar parity Wikileaks begins accepting Bitcoin for donations Silk Road is launched = Consolidation: Cyprus chooses Bitcoin as safe haven asset Market cap= 1 Billion USD China Central Bank prohibits financial institutions from handling bitcoin transactions FBI closes Silk Road, but one month later it is on-line again 2014 = Global diffusion: About 400 Bitcoin ATMs open (USA, Canada, Germany, Italy...) Microsoft accepts Bitcoin for games and apps FBI operates to definitively shut down Silk Road, but two hours later Silk Road is reloaded

15 History and current diffusion 2008 = Satoshi Nakamoto publishes Bitcoin paper 2009 = Network genesis: first client and first block 2010 = Real Bitcoin transactions Hanyecz pays BTC for two pizzas Market cap = 1 million USD 2011 = Bitcoin buzzes Dollar parity Wikileaks begins accepting Bitcoin for donations Silk Road is launched = Consolidation: Cyprus chooses Bitcoin as safe haven asset Market cap= 1 Billion USD China Central Bank prohibits financial institutions from handling bitcoin transactions FBI closes Silk Road, but one month later it is on-line again 2014 = Global diffusion: About 400 Bitcoin ATMs open (USA, Canada, Germany, Italy...) Microsoft accepts Bitcoin for games and apps FBI operates to definitively shut down Silk Road, but two hours later Silk Road is reloaded

16 History and current diffusion 2008 = Satoshi Nakamoto publishes Bitcoin paper 2009 = Network genesis: first client and first block 2010 = Real Bitcoin transactions Hanyecz pays BTC for two pizzas Market cap = 1 million USD 2011 = Bitcoin buzzes Dollar parity Wikileaks begins accepting Bitcoin for donations Silk Road is launched = Consolidation: Cyprus chooses Bitcoin as safe haven asset Market cap= 1 Billion USD China Central Bank prohibits financial institutions from handling bitcoin transactions FBI closes Silk Road, but one month later it is on-line again 2014 = Global diffusion: About 400 Bitcoin ATMs open (USA, Canada, Germany, Italy...) Microsoft accepts Bitcoin for games and apps FBI operates to definitively shut down Silk Road, but two hours later Silk Road is reloaded

17 History and current diffusion 2008 = Satoshi Nakamoto publishes Bitcoin paper 2009 = Network genesis: first client and first block 2010 = Real Bitcoin transactions Hanyecz pays BTC for two pizzas Market cap = 1 million USD 2011 = Bitcoin buzzes Dollar parity Wikileaks begins accepting Bitcoin for donations Silk Road is launched = Consolidation: Cyprus chooses Bitcoin as safe haven asset Market cap= 1 Billion USD China Central Bank prohibits financial institutions from handling bitcoin transactions FBI closes Silk Road, but one month later it is on-line again 2014 = Global diffusion: About 400 Bitcoin ATMs open (USA, Canada, Germany, Italy...) Microsoft accepts Bitcoin for games and apps FBI operates to definitively shut down Silk Road, but two hours later Silk Road is reloaded

18 History and current diffusion

19 History and current diffusion

20

21 Why is cryptography necessary? Multiparty Timed Challenges Goal: Checking the validity of transactions, making competing users on a problem to be solved within a preset time The problem is computationally difficult and involves a reward What is the problem? Given a computationally hard invertible function, find an input producing an output of assigned type

22 Why is cryptography necessary? Multiparty Timed Challenges Goal: Checking the validity of transactions, making competing users on a problem to be solved within a preset time The problem is computationally difficult and involves a reward What is the problem? Given a computationally hard invertible function, find an input producing an output of assigned type

23 Why is cryptography necessary? Multiparty Timed Challenges Goal: Checking the validity of transactions, making competing users on a problem to be solved within a preset time The problem is computationally difficult and involves a reward What is the problem? Given a computationally hard invertible function, find an input producing an output of assigned type

24 Why is cryptography necessary? Multiparty Timed Challenges Goal: Checking the validity of transactions, making competing users on a problem to be solved within a preset time The problem is computationally difficult and involves a reward What is the problem? Given a computationally hard invertible function, find an input producing an output of assigned type

25 Cryptographic primitives Hash function A pseudo-random way of shrinking data: Input of arbitrary length and output of fixed length One way function (computationally hard to invert) Collision resistance (hard to find more inputs having the same output)

26 Cryptographic primitives Hash function A pseudo-random way of shrinking data: Input of arbitrary length and output of fixed length One way function (computationally hard to invert) Collision resistance (hard to find more inputs having the same output)

27 Cryptographic primitives Hash function A pseudo-random way of shrinking data: Input of arbitrary length and output of fixed length One way function (computationally hard to invert) Collision resistance (hard to find more inputs having the same output)

28 Cryptographic primitives Hash function A pseudo-random way of shrinking data: Input of arbitrary length and output of fixed length One way function (computationally hard to invert) Collision resistance (hard to find more inputs having the same output)

29 Cryptographic primitives Hash function A pseudo-random way of shrinking data: Input of arbitrary length and output of fixed length One way function (computationally hard to invert) Collision resistance (hard to find more inputs having the same output)

30 Cryptographic primitives Digital Signature A way to bind messages to their originators: A key generation algorithm (public-private key pair) A signature generation algorithm (private key, message) A signature verification algorithm (public key, signature, message)

31 Cryptographic primitives Digital Signature A way to bind messages to their originators: A key generation algorithm (public-private key pair) A signature generation algorithm (private key, message) A signature verification algorithm (public key, signature, message)

32 Cryptographic primitives Digital Signature A way to bind messages to their originators: A key generation algorithm (public-private key pair) A signature generation algorithm (private key, message) A signature verification algorithm (public key, signature, message)

33 Cryptographic primitives Digital Signature A way to bind messages to their originators: A key generation algorithm (public-private key pair) A signature generation algorithm (private key, message) A signature verification algorithm (public key, signature, message)

34 Cryptographic primitives Digital Signature A way to bind messages to their originators: A key generation algorithm (public-private key pair) A signature generation algorithm (private key, message) A signature verification algorithm (public key, signature, message)

35

36 Transactions No central autority

37 Double Spending

38 Addresses Privacy preserving approach User transactions are between two pseudo-random addresses An example of cryptocurrency address 1A1zP1eP5QGefi2DMPTfTL5SLmv7DivfNa Note For more privacy you can use many addresses Address generation:

39 Addresses Privacy preserving approach User transactions are between two pseudo-random addresses An example of cryptocurrency address 1A1zP1eP5QGefi2DMPTfTL5SLmv7DivfNa Note For more privacy you can use many addresses Address generation:

40 Addresses Privacy preserving approach User transactions are between two pseudo-random addresses An example of cryptocurrency address 1A1zP1eP5QGefi2DMPTfTL5SLmv7DivfNa Note For more privacy you can use many addresses Address generation:

41 Addresses Privacy preserving approach User transactions are between two pseudo-random addresses An example of cryptocurrency address 1A1zP1eP5QGefi2DMPTfTL5SLmv7DivfNa Note For more privacy you can use many addresses Address generation:

42 Addresses Privacy preserving approach User transactions are between two pseudo-random addresses An example of cryptocurrency address 1A1zP1eP5QGefi2DMPTfTL5SLmv7DivfNa Note For more privacy you can use many addresses Address generation:

43 The Blockchain Making double-spending an hard problem It contains every transaction ever executed in the currency It opens the possibility of finding out how much value belonged to each address at any point in history Every block contains a hash of the previous block. This has the effect of creating a chain of blocks from the genesis block to the current block Each block is computationally impractical to modify

44 The Blockchain Making double-spending an hard problem It contains every transaction ever executed in the currency It opens the possibility of finding out how much value belonged to each address at any point in history Every block contains a hash of the previous block. This has the effect of creating a chain of blocks from the genesis block to the current block Each block is computationally impractical to modify

45 The Blockchain Making double-spending an hard problem It contains every transaction ever executed in the currency It opens the possibility of finding out how much value belonged to each address at any point in history Every block contains a hash of the previous block. This has the effect of creating a chain of blocks from the genesis block to the current block Each block is computationally impractical to modify

46 The Blockchain Making double-spending an hard problem It contains every transaction ever executed in the currency It opens the possibility of finding out how much value belonged to each address at any point in history Every block contains a hash of the previous block. This has the effect of creating a chain of blocks from the genesis block to the current block Each block is computationally impractical to modify

47 The Blockchain Making double-spending an hard problem It contains every transaction ever executed in the currency It opens the possibility of finding out how much value belonged to each address at any point in history Every block contains a hash of the previous block. This has the effect of creating a chain of blocks from the genesis block to the current block Each block is computationally impractical to modify

48 Mining Creating new coins Transactions validation In a decentralized system miners have to check the validity of transactions New coins introduction In order to verify transactions miners have to solve a computational hard problem. The miner who solves the problem is rewarded Nowdays the most adopted Multiparty Timed Challenge systems are: Proof of Work Proof of Stake

49 Mining Creating new coins Transactions validation In a decentralized system miners have to check the validity of transactions New coins introduction In order to verify transactions miners have to solve a computational hard problem. The miner who solves the problem is rewarded Nowdays the most adopted Multiparty Timed Challenge systems are: Proof of Work Proof of Stake

50 Mining Creating new coins Transactions validation In a decentralized system miners have to check the validity of transactions New coins introduction In order to verify transactions miners have to solve a computational hard problem. The miner who solves the problem is rewarded Nowdays the most adopted Multiparty Timed Challenge systems are: Proof of Work Proof of Stake

51 Mining Creating new coins Transactions validation In a decentralized system miners have to check the validity of transactions New coins introduction In order to verify transactions miners have to solve a computational hard problem. The miner who solves the problem is rewarded Nowdays the most adopted Multiparty Timed Challenge systems are: Proof of Work Proof of Stake

52 Mining Creating new coins Transactions validation In a decentralized system miners have to check the validity of transactions New coins introduction In order to verify transactions miners have to solve a computational hard problem. The miner who solves the problem is rewarded Nowdays the most adopted Multiparty Timed Challenge systems are: Proof of Work Proof of Stake

53 Mining Creating new coins Transactions validation In a decentralized system miners have to check the validity of transactions New coins introduction In order to verify transactions miners have to solve a computational hard problem. The miner who solves the problem is rewarded Nowdays the most adopted Multiparty Timed Challenge systems are: Proof of Work Proof of Stake

54 Proof of Work / Stake Getting computational difficulty through hash functions

55 Proof of Work Threshold Hash value Target value i.e. the hash has to be composed by a certain number of leading zeros It requires an increasing amount of computational resources over time Very high energy consumption in order to get the system working Executing an attack could be easy for users who have big computational power

56 Proof of Work Threshold Hash value Target value i.e. the hash has to be composed by a certain number of leading zeros It requires an increasing amount of computational resources over time Very high energy consumption in order to get the system working Executing an attack could be easy for users who have big computational power

57 Proof of Work Threshold Hash value Target value i.e. the hash has to be composed by a certain number of leading zeros It requires an increasing amount of computational resources over time Very high energy consumption in order to get the system working Executing an attack could be easy for users who have big computational power

58 Proof of Work Threshold Hash value Target value i.e. the hash has to be composed by a certain number of leading zeros It requires an increasing amount of computational resources over time Very high energy consumption in order to get the system working Executing an attack could be easy for users who have big computational power

59 Proof of Work Threshold Hash value Target value i.e. the hash has to be composed by a certain number of leading zeros It requires an increasing amount of computational resources over time Very high energy consumption in order to get the system working Executing an attack could be easy for users who have big computational power

60 Proof of Stake Threshold Hash value Stake Time i.e. the probability of mining a block depends on the stake that the user has got over time It does not employ the large computational resources that proof-of-work does Executing an attack would be much more expensive "The rich get richer and the poor get poorer" problem Less incentives for miners

61 Proof of Stake Threshold Hash value Stake Time i.e. the probability of mining a block depends on the stake that the user has got over time It does not employ the large computational resources that proof-of-work does Executing an attack would be much more expensive "The rich get richer and the poor get poorer" problem Less incentives for miners

62 Proof of Stake Threshold Hash value Stake Time i.e. the probability of mining a block depends on the stake that the user has got over time It does not employ the large computational resources that proof-of-work does Executing an attack would be much more expensive "The rich get richer and the poor get poorer" problem Less incentives for miners

63 Proof of Stake Threshold Hash value Stake Time i.e. the probability of mining a block depends on the stake that the user has got over time It does not employ the large computational resources that proof-of-work does Executing an attack would be much more expensive "The rich get richer and the poor get poorer" problem Less incentives for miners

64 Proof of Stake Threshold Hash value Stake Time i.e. the probability of mining a block depends on the stake that the user has got over time It does not employ the large computational resources that proof-of-work does Executing an attack would be much more expensive "The rich get richer and the poor get poorer" problem Less incentives for miners

65 Inside the Blockchain A typical block header

66

67 Mining reward In Proof of Work based cryptocurrencies: The reward consists in a given amount of coins, plus transaction fees The amount of coins is halved at each fixed period of time Bitcoin: 50 initial coins halved every 48 months In Proof of Stake based cryptocurrencies: In the most cases the reward consists of transaction fees only

68 Mining reward In Proof of Work based cryptocurrencies: The reward consists in a given amount of coins, plus transaction fees The amount of coins is halved at each fixed period of time Bitcoin: 50 initial coins halved every 48 months In Proof of Stake based cryptocurrencies: In the most cases the reward consists of transaction fees only

69 Mining reward In Proof of Work based cryptocurrencies: The reward consists in a given amount of coins, plus transaction fees The amount of coins is halved at each fixed period of time Bitcoin: 50 initial coins halved every 48 months In Proof of Stake based cryptocurrencies: In the most cases the reward consists of transaction fees only

70 Mining reward In Proof of Work based cryptocurrencies: The reward consists in a given amount of coins, plus transaction fees The amount of coins is halved at each fixed period of time Bitcoin: 50 initial coins halved every 48 months In Proof of Stake based cryptocurrencies: In the most cases the reward consists of transaction fees only

71 Mining reward In Proof of Work based cryptocurrencies: The reward consists in a given amount of coins, plus transaction fees The amount of coins is halved at each fixed period of time Bitcoin: 50 initial coins halved every 48 months In Proof of Stake based cryptocurrencies: In the most cases the reward consists of transaction fees only

72 Mining reward In Proof of Work based cryptocurrencies: The reward consists in a given amount of coins, plus transaction fees The amount of coins is halved at each fixed period of time Bitcoin: 50 initial coins halved every 48 months In Proof of Stake based cryptocurrencies: In the most cases the reward consists of transaction fees only

73 Mining reward In Proof of Work based cryptocurrencies: The reward consists in a given amount of coins, plus transaction fees The amount of coins is halved at each fixed period of time Bitcoin: 50 initial coins halved every 48 months In Proof of Stake based cryptocurrencies: In the most cases the reward consists of transaction fees only

74 Wallet A software that allows us to handle funds The tasks performed by the wallet software usually include: Querying of the user s blockchain pages Generation of user addresses Tracking of the transaction confirmation status Data backup and restore Note The wallet does not contain coins, but just private keys

75 Wallet A software that allows us to handle funds The tasks performed by the wallet software usually include: Querying of the user s blockchain pages Generation of user addresses Tracking of the transaction confirmation status Data backup and restore Note The wallet does not contain coins, but just private keys

76 Wallet A software that allows us to handle funds The tasks performed by the wallet software usually include: Querying of the user s blockchain pages Generation of user addresses Tracking of the transaction confirmation status Data backup and restore Note The wallet does not contain coins, but just private keys

77 Wallet A software that allows us to handle funds The tasks performed by the wallet software usually include: Querying of the user s blockchain pages Generation of user addresses Tracking of the transaction confirmation status Data backup and restore Note The wallet does not contain coins, but just private keys

78 Wallet A software that allows us to handle funds The tasks performed by the wallet software usually include: Querying of the user s blockchain pages Generation of user addresses Tracking of the transaction confirmation status Data backup and restore Note The wallet does not contain coins, but just private keys

79 Wallet A software that allows us to handle funds The tasks performed by the wallet software usually include: Querying of the user s blockchain pages Generation of user addresses Tracking of the transaction confirmation status Data backup and restore Note The wallet does not contain coins, but just private keys

80 Wallet A software that allows us to handle funds The tasks performed by the wallet software usually include: Querying of the user s blockchain pages Generation of user addresses Tracking of the transaction confirmation status Data backup and restore Note The wallet does not contain coins, but just private keys

81 Caution! The problem of lost coins Any unspent balance in an account for which the private key has been lost results in a loss of coins Another way to lose coins follows from sending them to an incorrect address The absence of a trusted third party makes it difficult the design of mechanisms for coin recovery Lost coins would cause deflation, meaning the other coins have higher value

82 Caution! The problem of lost coins Any unspent balance in an account for which the private key has been lost results in a loss of coins Another way to lose coins follows from sending them to an incorrect address The absence of a trusted third party makes it difficult the design of mechanisms for coin recovery Lost coins would cause deflation, meaning the other coins have higher value

83 Caution! The problem of lost coins Any unspent balance in an account for which the private key has been lost results in a loss of coins Another way to lose coins follows from sending them to an incorrect address The absence of a trusted third party makes it difficult the design of mechanisms for coin recovery Lost coins would cause deflation, meaning the other coins have higher value

84 Caution! The problem of lost coins Any unspent balance in an account for which the private key has been lost results in a loss of coins Another way to lose coins follows from sending them to an incorrect address The absence of a trusted third party makes it difficult the design of mechanisms for coin recovery Lost coins would cause deflation, meaning the other coins have higher value

85 Caution! The problem of lost coins Any unspent balance in an account for which the private key has been lost results in a loss of coins Another way to lose coins follows from sending them to an incorrect address The absence of a trusted third party makes it difficult the design of mechanisms for coin recovery Lost coins would cause deflation, meaning the other coins have higher value

86 Types of wallet Desktop wallet Mobile wallet Recommendation It is highly recommended to back up a wallet regularly and keep several copies of the backup in different safe locations. Web wallet Paper wallet Hardware wallet

87 Types of wallet Desktop wallet Mobile wallet Recommendation It is highly recommended to back up a wallet regularly and keep several copies of the backup in different safe locations. Web wallet Paper wallet Hardware wallet

88 Types of wallet Desktop wallet Mobile wallet Recommendation It is highly recommended to back up a wallet regularly and keep several copies of the backup in different safe locations. Web wallet Paper wallet Hardware wallet

89 Types of wallet Desktop wallet Mobile wallet Recommendation It is highly recommended to back up a wallet regularly and keep several copies of the backup in different safe locations. Web wallet Paper wallet Hardware wallet

90 Types of wallet Desktop wallet Mobile wallet Recommendation It is highly recommended to back up a wallet regularly and keep several copies of the backup in different safe locations. Web wallet Paper wallet Hardware wallet

91 Types of wallet Desktop wallet Mobile wallet Recommendation It is highly recommended to back up a wallet regularly and keep several copies of the backup in different safe locations. Web wallet Paper wallet Hardware wallet

92 Types of wallet Desktop wallet Mobile wallet Recommendation It is highly recommended to back up a wallet regularly and keep several copies of the backup in different safe locations. Web wallet Paper wallet Hardware wallet

93 Mining Hardware From CPUs to ASICs First generation: CPU Second generation: GPU Third generation: FPGA (Field-Programmable Gate Array) Fourth generation: ASIC (Application-Specific Integrated Circuit)

94 Mining Hardware From CPUs to ASICs First generation: CPU Second generation: GPU Third generation: FPGA (Field-Programmable Gate Array) Fourth generation: ASIC (Application-Specific Integrated Circuit)

95 Mining Hardware From CPUs to ASICs First generation: CPU Second generation: GPU Third generation: FPGA (Field-Programmable Gate Array) Fourth generation: ASIC (Application-Specific Integrated Circuit)

96 Mining Hardware From CPUs to ASICs First generation: CPU Second generation: GPU Third generation: FPGA (Field-Programmable Gate Array) Fourth generation: ASIC (Application-Specific Integrated Circuit)

97 Mining Hardware From CPUs to ASICs First generation: CPU Second generation: GPU Third generation: FPGA (Field-Programmable Gate Array) Fourth generation: ASIC (Application-Specific Integrated Circuit)

98 Mining Hardware Hash rate

99

100 Computationally hard invertible functions Recall These functions are used for mining In cryptocurrency world the two most used functions are: SHA-256 Scrypt

101 Computationally hard invertible functions Recall These functions are used for mining In cryptocurrency world the two most used functions are: SHA-256 Scrypt

102 Computationally hard invertible functions Recall These functions are used for mining In cryptocurrency world the two most used functions are: SHA-256 Scrypt

103 Computationally hard invertible functions Recall These functions are used for mining In cryptocurrency world the two most used functions are: SHA-256 Scrypt

104 Computationally hard invertible functions Recall These functions are used for mining In cryptocurrency world the two most used functions are: SHA-256 Scrypt

105 SHA-256 An hash function published as NIST standard It outputs digest of 256 bit from an input of variable length No collision found A dangerous property This algorithm is embarassingly parallel = Parallel hardware has allow for a hash rate gain of in the last five years

106 SHA-256 An hash function published as NIST standard It outputs digest of 256 bit from an input of variable length No collision found A dangerous property This algorithm is embarassingly parallel = Parallel hardware has allow for a hash rate gain of in the last five years

107 SHA-256 An hash function published as NIST standard It outputs digest of 256 bit from an input of variable length No collision found A dangerous property This algorithm is embarassingly parallel = Parallel hardware has allow for a hash rate gain of in the last five years

108 SHA-256 An hash function published as NIST standard It outputs digest of 256 bit from an input of variable length No collision found A dangerous property This algorithm is embarassingly parallel = Parallel hardware has allow for a hash rate gain of in the last five years

109 Scrypt A key derivation function published in 2009 by C. Percival Bytes are much more expensive than Mips Sequential Memory Hard algorithm= Asymptotically requires an amount of memory proportional to the number of operations to perform Innovation Space complexity is tied to computational complexity= based on highly parallelized hardware are much less effective Effect The cost of hardware for mining with Scrypt is out of reach

110 Scrypt A key derivation function published in 2009 by C. Percival Bytes are much more expensive than Mips Sequential Memory Hard algorithm= Asymptotically requires an amount of memory proportional to the number of operations to perform Innovation Space complexity is tied to computational complexity= based on highly parallelized hardware are much less effective Effect The cost of hardware for mining with Scrypt is out of reach

111 Scrypt A key derivation function published in 2009 by C. Percival Bytes are much more expensive than Mips Sequential Memory Hard algorithm= Asymptotically requires an amount of memory proportional to the number of operations to perform Innovation Space complexity is tied to computational complexity= based on highly parallelized hardware are much less effective Effect The cost of hardware for mining with Scrypt is out of reach

112 Scrypt A key derivation function published in 2009 by C. Percival Bytes are much more expensive than Mips Sequential Memory Hard algorithm= Asymptotically requires an amount of memory proportional to the number of operations to perform Innovation Space complexity is tied to computational complexity= based on highly parallelized hardware are much less effective Effect The cost of hardware for mining with Scrypt is out of reach

113 Scrypt A key derivation function published in 2009 by C. Percival Bytes are much more expensive than Mips Sequential Memory Hard algorithm= Asymptotically requires an amount of memory proportional to the number of operations to perform Innovation Space complexity is tied to computational complexity= based on highly parallelized hardware are much less effective Effect The cost of hardware for mining with Scrypt is out of reach

114

115 Wallet theft Wallet is not encrypted by default Many malwares have been created for stealing information from wallets Notice For securing your funds encrypt your wallet!

116 Wallet theft Wallet is not encrypted by default Many malwares have been created for stealing information from wallets Notice For securing your funds encrypt your wallet!

117 Wallet theft Wallet is not encrypted by default Many malwares have been created for stealing information from wallets Notice For securing your funds encrypt your wallet!

118 Wallet theft Wallet is not encrypted by default Many malwares have been created for stealing information from wallets Notice For securing your funds encrypt your wallet!

119 Transaction Spamming Denial of Service An attacker could create many transactions where he sends funds to himself This attack is unlikely because: The amount of each transaction must be above a given threshold ( in Bitcoin) The number of free transactions is limited i.e. mined blocks have a maximum block size of 50kB reserved for priority (free) transactions. Transactions above this limit have to pay fees

120 Transaction Spamming Denial of Service An attacker could create many transactions where he sends funds to himself This attack is unlikely because: The amount of each transaction must be above a given threshold ( in Bitcoin) The number of free transactions is limited i.e. mined blocks have a maximum block size of 50kB reserved for priority (free) transactions. Transactions above this limit have to pay fees

121 Transaction Spamming Denial of Service An attacker could create many transactions where he sends funds to himself This attack is unlikely because: The amount of each transaction must be above a given threshold ( in Bitcoin) The number of free transactions is limited i.e. mined blocks have a maximum block size of 50kB reserved for priority (free) transactions. Transactions above this limit have to pay fees

122 Transaction Spamming Denial of Service An attacker could create many transactions where he sends funds to himself This attack is unlikely because: The amount of each transaction must be above a given threshold ( in Bitcoin) The number of free transactions is limited i.e. mined blocks have a maximum block size of 50kB reserved for priority (free) transactions. Transactions above this limit have to pay fees

123 Transaction Spamming Denial of Service An attacker could create many transactions where he sends funds to himself This attack is unlikely because: The amount of each transaction must be above a given threshold ( in Bitcoin) The number of free transactions is limited i.e. mined blocks have a maximum block size of 50kB reserved for priority (free) transactions. Transactions above this limit have to pay fees

124 51% attack A 51% attacker could: Perform double-spending Remove transactions from the blockchain Prevent other miners from mining new blocks A 51% attacker could not: Alter the transactions Create coins from nothing Modify the amount of transactions in the blockchain

125 51% attack A 51% attacker could: Perform double-spending Remove transactions from the blockchain Prevent other miners from mining new blocks A 51% attacker could not: Alter the transactions Create coins from nothing Modify the amount of transactions in the blockchain

126 51% attack A 51% attacker could: Perform double-spending Remove transactions from the blockchain Prevent other miners from mining new blocks A 51% attacker could not: Alter the transactions Create coins from nothing Modify the amount of transactions in the blockchain

127 51% attack A 51% attacker could: Perform double-spending Remove transactions from the blockchain Prevent other miners from mining new blocks A 51% attacker could not: Alter the transactions Create coins from nothing Modify the amount of transactions in the blockchain

128 51% attack A 51% attacker could: Perform double-spending Remove transactions from the blockchain Prevent other miners from mining new blocks A 51% attacker could not: Alter the transactions Create coins from nothing Modify the amount of transactions in the blockchain

129 51% attack A 51% attacker could: Perform double-spending Remove transactions from the blockchain Prevent other miners from mining new blocks A 51% attacker could not: Alter the transactions Create coins from nothing Modify the amount of transactions in the blockchain

130 51% attack A 51% attacker could: Perform double-spending Remove transactions from the blockchain Prevent other miners from mining new blocks A 51% attacker could not: Alter the transactions Create coins from nothing Modify the amount of transactions in the blockchain

131 51% attack A 51% attacker could: Perform double-spending Remove transactions from the blockchain Prevent other miners from mining new blocks A 51% attacker could not: Alter the transactions Create coins from nothing Modify the amount of transactions in the blockchain

132 51% attack A 51% attacker could: Perform double-spending Remove transactions from the blockchain Prevent other miners from mining new blocks A 51% attacker could not: Alter the transactions Create coins from nothing Modify the amount of transactions in the blockchain

133 Attack to coin exchange Mt.Gox shutdown Mt.Gox suspended withdrawals after coming under attacks that flooded it with malformed transaction records The phantom transactions didn t allow attackers to steal money The malformed records created discrepancies in the effected exchange s accounting systems that caused them to fall out of sync with the network MtGox lost bitcoins belonging to customers and over bitcoins of its own money These DDOS attacks were possible due to the transaction malleability problems

134 Attack to coin exchange Mt.Gox shutdown Mt.Gox suspended withdrawals after coming under attacks that flooded it with malformed transaction records The phantom transactions didn t allow attackers to steal money The malformed records created discrepancies in the effected exchange s accounting systems that caused them to fall out of sync with the network MtGox lost bitcoins belonging to customers and over bitcoins of its own money These DDOS attacks were possible due to the transaction malleability problems

135 Attack to coin exchange Mt.Gox shutdown Mt.Gox suspended withdrawals after coming under attacks that flooded it with malformed transaction records The phantom transactions didn t allow attackers to steal money The malformed records created discrepancies in the effected exchange s accounting systems that caused them to fall out of sync with the network MtGox lost bitcoins belonging to customers and over bitcoins of its own money These DDOS attacks were possible due to the transaction malleability problems

136 Attack to coin exchange Mt.Gox shutdown Mt.Gox suspended withdrawals after coming under attacks that flooded it with malformed transaction records The phantom transactions didn t allow attackers to steal money The malformed records created discrepancies in the effected exchange s accounting systems that caused them to fall out of sync with the network MtGox lost bitcoins belonging to customers and over bitcoins of its own money These DDOS attacks were possible due to the transaction malleability problems

137 Attack to coin exchange Mt.Gox shutdown Mt.Gox suspended withdrawals after coming under attacks that flooded it with malformed transaction records The phantom transactions didn t allow attackers to steal money The malformed records created discrepancies in the effected exchange s accounting systems that caused them to fall out of sync with the network MtGox lost bitcoins belonging to customers and over bitcoins of its own money These DDOS attacks were possible due to the transaction malleability problems

138 Attack to coin exchange Mt.Gox shutdown Mt.Gox suspended withdrawals after coming under attacks that flooded it with malformed transaction records The phantom transactions didn t allow attackers to steal money The malformed records created discrepancies in the effected exchange s accounting systems that caused them to fall out of sync with the network MtGox lost bitcoins belonging to customers and over bitcoins of its own money These DDOS attacks were possible due to the transaction malleability problems

139 Transaction Malleability A transaction could be changed in such a way that its hash changes, but the digital signature is still valid Some openssl implementations misspell the DER encoding of ASN.1 octet strings For every ECDSA signature (r, s), the signature (r, s(modn)) is a valid signature of the same message This transaction could be confirmed and written in the blockchain If that happens, the network will assume that transaction is valid, and won t original record

140 Transaction Malleability A transaction could be changed in such a way that its hash changes, but the digital signature is still valid Some openssl implementations misspell the DER encoding of ASN.1 octet strings For every ECDSA signature (r, s), the signature (r, s(modn)) is a valid signature of the same message This transaction could be confirmed and written in the blockchain If that happens, the network will assume that transaction is valid, and won t original record

141 Transaction Malleability A transaction could be changed in such a way that its hash changes, but the digital signature is still valid Some openssl implementations misspell the DER encoding of ASN.1 octet strings For every ECDSA signature (r, s), the signature (r, s(modn)) is a valid signature of the same message This transaction could be confirmed and written in the blockchain If that happens, the network will assume that transaction is valid, and won t original record

142 Transaction Malleability A transaction could be changed in such a way that its hash changes, but the digital signature is still valid Some openssl implementations misspell the DER encoding of ASN.1 octet strings For every ECDSA signature (r, s), the signature (r, s(modn)) is a valid signature of the same message This transaction could be confirmed and written in the blockchain If that happens, the network will assume that transaction is valid, and won t original record

143

144 Bitcoin evangelism If a bad actor infiltrates a traditional financial network, the network itself and all of its participants are at risk. In contrast, if a bad actor has access to the bitcoin network, they have no power in the network itself and they do not compromise trust in the network. Bitcoin is not unregulated. Rather, several of the bitcoin network and financial system are regulated by mathematical algorithms. The algorithmic regulation in bitcoin offers predictable, objective, measurable outcomes. -Andreas M. Antonopoulos-

145 Bitcoin evangelism If a bad actor infiltrates a traditional financial network, the network itself and all of its participants are at risk. In contrast, if a bad actor has access to the bitcoin network, they have no power in the network itself and they do not compromise trust in the network. Bitcoin is not unregulated. Rather, several of the bitcoin network and financial system are regulated by mathematical algorithms. The algorithmic regulation in bitcoin offers predictable, objective, measurable outcomes. -Andreas M. Antonopoulos-

146 Bitcoin evangelism If a bad actor infiltrates a traditional financial network, the network itself and all of its participants are at risk. In contrast, if a bad actor has access to the bitcoin network, they have no power in the network itself and they do not compromise trust in the network. Bitcoin is not unregulated. Rather, several of the bitcoin network and financial system are regulated by mathematical algorithms. The algorithmic regulation in bitcoin offers predictable, objective, measurable outcomes. -Andreas M. Antonopoulos-

147 Legality of cryptocurrencies The legal status of cryptocurrencies varies from country to country

148 Cryptocurrencies & Cybercrime Bitcoin is used in illegal markets, crime trading, ramsonware...

149 Is mining in Bitcoin feasible? Solo mining is impracticable There are many mining pools The reward is divided according to the work performed

150 Is mining in Bitcoin feasible? Solo mining is impracticable There are many mining pools The reward is divided according to the work performed

151 Is mining in Bitcoin feasible? Solo mining is impracticable There are many mining pools The reward is divided according to the work performed

152 Is mining in Bitcoin feasible? Solo mining is impracticable There are many mining pools The reward is divided according to the work performed

153 Mining is the heart of cryptocurrencies Proof of Work s limits: The difficulty increases exponentially as the reward decreases Computing resources and energy are spent just to make and transfer money In order to have some chance of making money, a user must belong to a big mining pool Memory-hard algorihms can overcome some limitations of PoW-based systems Proof of Stake does not require application specific hardware, but the rich gets richer

154 Mining is the heart of cryptocurrencies Proof of Work s limits: The difficulty increases exponentially as the reward decreases Computing resources and energy are spent just to make and transfer money In order to have some chance of making money, a user must belong to a big mining pool Memory-hard algorihms can overcome some limitations of PoW-based systems Proof of Stake does not require application specific hardware, but the rich gets richer

155 Mining is the heart of cryptocurrencies Proof of Work s limits: The difficulty increases exponentially as the reward decreases Computing resources and energy are spent just to make and transfer money In order to have some chance of making money, a user must belong to a big mining pool Memory-hard algorihms can overcome some limitations of PoW-based systems Proof of Stake does not require application specific hardware, but the rich gets richer

156 Mining is the heart of cryptocurrencies Proof of Work s limits: The difficulty increases exponentially as the reward decreases Computing resources and energy are spent just to make and transfer money In order to have some chance of making money, a user must belong to a big mining pool Memory-hard algorihms can overcome some limitations of PoW-based systems Proof of Stake does not require application specific hardware, but the rich gets richer

157 Thanks for your attention!

MOMENTUM - A MEMORY-HARD PROOF-OF-WORK VIA FINDING BIRTHDAY COLLISIONS. DANIEL LARIMER dlarimer@invictus-innovations.com Invictus Innovations, Inc

MOMENTUM - A MEMORY-HARD PROOF-OF-WORK VIA FINDING BIRTHDAY COLLISIONS. DANIEL LARIMER dlarimer@invictus-innovations.com Invictus Innovations, Inc MOMENTUM - A MEMORY-HARD PROOF-OF-WORK VIA FINDING BIRTHDAY COLLISIONS DANIEL LARIMER dlarimer@invictus-innovations.com Invictus Innovations, Inc ABSTRACT. We introduce the concept of memory-hard proof-of-work

More information

BitIodine: extracting intelligence from the Bitcoin network

BitIodine: extracting intelligence from the Bitcoin network BitIodine: extracting intelligence from the Bitcoin network Michele Spagnuolo http://miki.it michele@spagnuolo.me @mikispag Bitcoin BitIodine About Bitcoin Decentralized, global digital currency A global

More information

Distributed Public Key Infrastructure via the Blockchain. Sean Pearl smp1697@cs.rit.edu April 28, 2015

Distributed Public Key Infrastructure via the Blockchain. Sean Pearl smp1697@cs.rit.edu April 28, 2015 Distributed Public Key Infrastructure via the Blockchain Sean Pearl smp1697@cs.rit.edu April 28, 2015 Overview Motivation: Electronic Money Example TTP: PayPal Bitcoin (BTC) Background Structure Other

More information

Bitcoin Miner Optimization

Bitcoin Miner Optimization Bitcoin Miner Optimization Nicolas T. Courtois - University College London, UK Bitcoin Mining Bottom Line Bitcoin Mining = a high tech race to determine who will own the currency of the 21 century 2 Nicolas

More information

AsicBoost A Speedup for Bitcoin Mining

AsicBoost A Speedup for Bitcoin Mining AsicBoost A Speedup for Bitcoin Mining Dr. Timo Hanke March 31, 2016 (rev. 5) Abstract. AsicBoost is a method to speed up Bitcoin mining by a factor of approximately 20%. The performance gain is achieved

More information

An Analysis of the Bitcoin Electronic Cash System

An Analysis of the Bitcoin Electronic Cash System An Analysis of the Bitcoin Electronic Cash System Danielle Drainville University of Waterloo December 21, 2012 1 Abstract In a world that relies heavily on technology, privacy is sought by many. Privacy,

More information

2. Elections We define an electronic vote as a chain of digital signatures. Each owner transfers the vote to the candidate or legislation by digitally

2. Elections We define an electronic vote as a chain of digital signatures. Each owner transfers the vote to the candidate or legislation by digitally Abstract A purely peer to peer version of electronic vote would allow online votes to be sent directly from one party to another without going through a central voting register. Digital signatures provide

More information

Bitcoin Thief Tutorial

Bitcoin Thief Tutorial The complete Bitcoin Thief Tutorial SESSION ID: HTA-R02 Uri Rivner Head of Cyber Strategy BioCatch Etay Maor PMM Cyber Trusteer, an IBM Company The first few things you should know about Bitcoin Most people

More information

Cryptographic aspects of Bitcoin

Cryptographic aspects of Bitcoin Cryptographic aspects of Bitcoin Stefan Dziembowski University of Warsaw Digital vs. paper currencies Paper: Digital: 16fab13fc6890 Very useful if is also digital. A tradi@onal ways of paying digitally

More information

More information >>> HERE <<<

More information >>> HERE <<< More information >>> HERE http://urlzz.org/bitcoinwa/pdx/ftpl1585/ Tags: review bitcoin wealth alliance, ## download, buy

More information

Introduction to Bitcoin Mining

Introduction to Bitcoin Mining A Guide For Gamers, Geeks, and Everyone Else by David R. Sterry If you find this ebook useful and would like to see it extended, send donations to 1i2mRogbNByFLxuhD7HtjxDut8GDPnmYj For the most recent

More information

Bitcoin: A Peer-to-Peer Electronic Cash System

Bitcoin: A Peer-to-Peer Electronic Cash System Bitcoin: A Peer-to-Peer Electronic Cash System Satoshi Nakamoto satoshin@gmx.com www.bitcoin.org Abstract. A purely peer-to-peer version of electronic cash would allow online payments to be sent directly

More information

Using the Bitcoin Blockchain for secure, independently verifiable, electronic votes. Pierre Noizat - July 2014

Using the Bitcoin Blockchain for secure, independently verifiable, electronic votes. Pierre Noizat - July 2014 Using the Bitcoin Blockchain for secure, independently verifiable, electronic votes. Pierre Noizat - July 2014 The problem with proprietary voting systems Existing electronic voting systems all suffer

More information

The Dark Web. Steven M. Bellovin March 21, 2016 1

The Dark Web. Steven M. Bellovin March 21, 2016 1 The Dark Web Steven M. Bellovin March 21, 2016 1 Tor and the Dark Web There are ways to use the Internet (almost) untraceably This can be used for good purposes or bad purposes Two technologies are necessary,

More information

scalability for Bitcoin Jeremy Clark Concordia Institute for Information Systems Engineering

scalability for Bitcoin Jeremy Clark Concordia Institute for Information Systems Engineering user scalability for Bitcoin Jeremy Clark Concordia Institute for Information Systems Engineering Time Stamping Prediction Markets Anonymity Solvency Usability History & SoK Time Stamping Prediction Markets

More information

Payment systems. Tuomas Aura CSE-C3400 Information security. Aalto University, autumn 2015

Payment systems. Tuomas Aura CSE-C3400 Information security. Aalto University, autumn 2015 Payment systems Tuomas Aura CSE-C3400 Information security Aalto University, autumn 2015 Outline 1. Card payment 2. (Anonymous digital cash) 3. Bitcoin 2 CARD PAYMENT 3 Bank cards Credit or debit card

More information

Orwell. From Bitcoin to secure Domain Name System

Orwell. From Bitcoin to secure Domain Name System Orwell. From Bitcoin to secure Domain Name System Michał Jabczyński, Michał Szychowiak Poznań University of Technology Piotrowo 2, 60-965 Poznań, Poland {Michal.Jabczynski, Michal.Szychowiak}@put.poznan.pl

More information

Peershare does not require any changes to the Peercoin blockchain or protocol (no hard fork).

Peershare does not require any changes to the Peercoin blockchain or protocol (no hard fork). Issue decentralized securities using Peershare The shutdown of BTC Trading Corp and Litecoin Global has caused me to consider if there is a way for businesses to manage publicly held shares in a decentralized

More information

Bitcoin: Regulations and Legal Risks for a New Virtual Currency

Bitcoin: Regulations and Legal Risks for a New Virtual Currency Bitcoin: Regulations and Legal Risks for a New Virtual Currency Presented by: John Casey and Adam Holbrook Copyright 2014 by K&L Gates LLP. All rights reserved. GOALS Learn to speak the Bitcoin language:

More information

Usable Crypto: Introducing minilock. Nadim Kobeissi HOPE X, NYC, 2014

Usable Crypto: Introducing minilock. Nadim Kobeissi HOPE X, NYC, 2014 Usable Crypto: Introducing minilock Nadim Kobeissi HOPE X, NYC, 2014 2012 Browsers are an environment that is hostile to cryptography Malleability of the JavaScript runtime. The lack of low-level (system-level)

More information

Electronic Payments. EITN40 - Advanced Web Security

Electronic Payments. EITN40 - Advanced Web Security Electronic Payments EITN40 - Advanced Web Security 1 Card transactions Card-Present Smart Cards Card-Not-Present SET 3D Secure Untraceable E-Cash Micropayments Payword Electronic Lottery Tickets Peppercoin

More information

Cryptocurrency and Bitcoin: A possible foundation of future currency why it has value, what is its history and its future outlook.

Cryptocurrency and Bitcoin: A possible foundation of future currency why it has value, what is its history and its future outlook. B.Sc. Essay in Business Cryptocurrency and Bitcoin: A possible foundation of future currency why it has value, what is its history and its future outlook. Sindri Leó Árnason Leiðbeinandi: Guðrún Johnsen

More information

CS 393 Network Security. Nasir Memon Polytechnic University Module 11 Secure Email

CS 393 Network Security. Nasir Memon Polytechnic University Module 11 Secure Email CS 393 Network Security Nasir Memon Polytechnic University Module 11 Secure Email Course Logistics HW 5 due Thursday Graded exams returned and discussed. Read Chapter 5 of text 4/2/02 Module 11 - Secure

More information

Security Mechanisms in Bitcoin

Security Mechanisms in Bitcoin Security Mechanisms in Bitcoin Henrik Lovén Joakim Valberg Email: {henlo585, joava054}@student.liu.se Supervisor: Ulf Kargén, {ulf.kargen@liu.se} Project Report for Information Security Course Linköpings

More information

Efficient Framework for Deploying Information in Cloud Virtual Datacenters with Cryptography Algorithms

Efficient Framework for Deploying Information in Cloud Virtual Datacenters with Cryptography Algorithms Efficient Framework for Deploying Information in Cloud Virtual Datacenters with Cryptography Algorithms Radhika G #1, K.V.V. Satyanarayana *2, Tejaswi A #3 1,2,3 Dept of CSE, K L University, Vaddeswaram-522502,

More information

Overview Most of the documentation out there on the transition from SHA-1 certificates to SHA-2 certificates will tell you three things:

Overview Most of the documentation out there on the transition from SHA-1 certificates to SHA-2 certificates will tell you three things: SHA-1 Versus SHA-2 Overview Most of the documentation out there on the transition from SHA-1 certificates to SHA-2 certificates will tell you three things: - Breaking SHA-1 is not yet practical but will

More information

How encryption works to provide confidentiality. How hashing works to provide integrity. How digital signatures work to provide authenticity and

How encryption works to provide confidentiality. How hashing works to provide integrity. How digital signatures work to provide authenticity and How encryption works to provide confidentiality. How hashing works to provide integrity. How digital signatures work to provide authenticity and non-repudiation. How to obtain a digital certificate. Installing

More information

Finance and Economics Discussion Series Divisions of Research & Statistics and Monetary Affairs Federal Reserve Board, Washington, D.C.

Finance and Economics Discussion Series Divisions of Research & Statistics and Monetary Affairs Federal Reserve Board, Washington, D.C. Finance and Economics Discussion Series Divisions of Research & Statistics and Monetary Affairs Federal Reserve Board, Washington, D.C. Bitcoin: Technical Background and Data Analysis Anton Badev and Matthew

More information

Virtual Currencies and their Relevance to Digital Forensics PRESTON MILLER

Virtual Currencies and their Relevance to Digital Forensics PRESTON MILLER Virtual Currencies and their Relevance to Digital Forensics PRESTON MILLER 1 Presentation Overview Virtual Currency Cryptocurrency Bitcoin Basics: Obtaining, Usage, and History Digital Forensics Relevance

More information

IoT Security Platform

IoT Security Platform IoT Security Platform 2 Introduction Wars begin when the costs of attack are low, the benefits for a victor are high, and there is an inability to enforce law. The same is true in cyberwars. Today there

More information

Threats to Bitcoin Software

Threats to Bitcoin Software Threats to Bitcoin Software Christian H Kateraas Master of Science in Informatics Submission date: May 2014 Supervisor: Magnus Lie Hetland, IDI Norwegian University of Science and Technology Department

More information

Randomized Hashing for Digital Signatures

Randomized Hashing for Digital Signatures NIST Special Publication 800-106 Randomized Hashing for Digital Signatures Quynh Dang Computer Security Division Information Technology Laboratory C O M P U T E R S E C U R I T Y February 2009 U.S. Department

More information

SEC 4: Elliptic Curve Qu-Vanstone Implicit Certificate Scheme (ECQV)

SEC 4: Elliptic Curve Qu-Vanstone Implicit Certificate Scheme (ECQV) Standards for Efficient Cryptography SEC 4: Elliptic Curve Qu-Vanstone Implicit Certificate Scheme (ECQV) Contact: Certicom Research Eoin Buckley (mbuckley@blackberry.com) April 3, 2014 Version (Draft)

More information

CPSC 467b: Cryptography and Computer Security

CPSC 467b: Cryptography and Computer Security CPSC 467b: Cryptography and Computer Security Michael J. Fischer Lecture 1 January 9, 2012 CPSC 467b, Lecture 1 1/22 Course Overview Symmetric Cryptography CPSC 467b, Lecture 1 2/22 Course Overview CPSC

More information

Why buy when you can rent? Bribery attacks on Bitcoin-style consensus

Why buy when you can rent? Bribery attacks on Bitcoin-style consensus Why buy when you can rent? Bribery attacks on Bitcoin-style consensus Joseph Bonneau Stanford University & Electronic Frontier Foundation Abstract. The Bitcoin cryptocurrency introduced a novel distributed

More information

Blocks & Chains Decentralized Exchange

Blocks & Chains Decentralized Exchange Blocks & Chains Decentralized Exchange A Peershare for exchanging cryptoassets by Jordan Lee with contributions from Tom Joad and Michael Witrant (aka sigmike) The arrival of a decentralized exchange has

More information

The World of Emerging Payment Systems A Brief Introduction

The World of Emerging Payment Systems A Brief Introduction The World of Emerging Payment Systems A Brief Introduction Joseph M. Vincent Director of Regulatory & Legal Affairs Washington State Department of Financial Institutions Presentation to Financial Management

More information

CoinAMI Coin-Application Mediator Interface

CoinAMI Coin-Application Mediator Interface Bilkent University Department of Computer Engineering CoinAMI Coin-Application Mediator Interface Supervisor Can Alkan Members Ahmet Kerim Şenol Alper Gündoğdu Halil İbrahim Özercan Muhammed Yusuf Özkaya

More information

Overview of Cryptographic Tools for Data Security. Murat Kantarcioglu

Overview of Cryptographic Tools for Data Security. Murat Kantarcioglu UT DALLAS Erik Jonsson School of Engineering & Computer Science Overview of Cryptographic Tools for Data Security Murat Kantarcioglu Pag. 1 Purdue University Cryptographic Primitives We will discuss the

More information

Recipe for Mobile Data Security: TPM, Bitlocker, Windows Vista and Active Directory

Recipe for Mobile Data Security: TPM, Bitlocker, Windows Vista and Active Directory Recipe for Mobile Data Security: TPM, Bitlocker, Windows Vista and Active Directory Tom Olzak October 2007 If your business is like mine, laptops regularly disappear. Until recently, centrally managed

More information

Christoph Sorge. February 12th, 2014 Bitcoin minisymposium at KNAW

Christoph Sorge. February 12th, 2014 Bitcoin minisymposium at KNAW Bitcoin s Peer-to-Peer network Christoph Sorge February 12th, 2014 Bitcoin minisymposium at KNAW Clipart source: http://openclipart.org, users Machovka and Keistutis Department of Computer Science What

More information

High Security Online Backup. A Cyphertite White Paper February, 2013. Cloud-Based Backup Storage Threat Models

High Security Online Backup. A Cyphertite White Paper February, 2013. Cloud-Based Backup Storage Threat Models A Cyphertite White Paper February, 2013 Cloud-Based Backup Storage Threat Models PG. 1 Definition of Terms Secrets Passphrase: The secrets passphrase is the passphrase used to decrypt the 2 encrypted 256-bit

More information

COMP-530 Cryptographic Systems Security *Requires Programming Background. University of Nicosia, Cyprus

COMP-530 Cryptographic Systems Security *Requires Programming Background. University of Nicosia, Cyprus COMP-530 Cryptographic Systems Security *Requires Programming Background University of Nicosia, Cyprus Course Code Course Title ECTS Credits COMP-530 Cryptographic Systems 10 Security Department Semester

More information

bi on Solution white paper

bi on Solution white paper bi on Solution white paper Billon Solution Overview Despite concerted efforts for years, cash has not yet been eliminated. Mostly because not everyone has a bank account and debit card - an estimated 2.5

More information

Neutralus Certification Practices Statement

Neutralus Certification Practices Statement Neutralus Certification Practices Statement Version 2.8 April, 2013 INDEX INDEX...1 1.0 INTRODUCTION...3 1.1 Overview...3 1.2 Policy Identification...3 1.3 Community & Applicability...3 1.4 Contact Details...3

More information

Victor Shoup Avi Rubin. fshoup,rubing@bellcore.com. Abstract

Victor Shoup Avi Rubin. fshoup,rubing@bellcore.com. Abstract Session Key Distribution Using Smart Cards Victor Shoup Avi Rubin Bellcore, 445 South St., Morristown, NJ 07960 fshoup,rubing@bellcore.com Abstract In this paper, we investigate a method by which smart

More information

PGP - Pretty Good Privacy

PGP - Pretty Good Privacy I should be able to whisper something in your ear, even if your ear is 1000 miles away, and the government disagrees with that. -- Philip Zimmermann PGP - Pretty Good Privacy - services - message format

More information

Network Security. Mobin Javed. October 5, 2011

Network Security. Mobin Javed. October 5, 2011 Network Security Mobin Javed October 5, 2011 In this class, we mainly had discussion on threat models w.r.t the class reading, BGP security and defenses against TCP connection hijacking attacks. 1 Takeaways

More information

Fixity Checks: Checksums, Message Digests and Digital Signatures Audrey Novak, ILTS Digital Preservation Committee November 2006

Fixity Checks: Checksums, Message Digests and Digital Signatures Audrey Novak, ILTS Digital Preservation Committee November 2006 Fixity Checks: Checksums, Message Digests and Digital Signatures Audrey Novak, ILTS Digital Preservation Committee November 2006 Introduction: Fixity, in preservation terms, means that the digital object

More information

Building an Anonymous Public Storage Utility Wesley Leggette Cleversafe

Building an Anonymous Public Storage Utility Wesley Leggette Cleversafe Building an Anonymous Public Storage Utility Wesley Leggette Cleversafe Utility Storage r Many different target audiences r Business r Content distribution r Off-site backup r Archival r Consumer r Content

More information

Lecture 9 - Message Authentication Codes

Lecture 9 - Message Authentication Codes Lecture 9 - Message Authentication Codes Boaz Barak March 1, 2010 Reading: Boneh-Shoup chapter 6, Sections 9.1 9.3. Data integrity Until now we ve only been interested in protecting secrecy of data. However,

More information

GADGETCOIN (GDC): SECURE SMART CONTRACTS FOR DECENTRALISED INTERNET-OF-THINGS DEVICES

GADGETCOIN (GDC): SECURE SMART CONTRACTS FOR DECENTRALISED INTERNET-OF-THINGS DEVICES GADGETCOIN (GDC): SECURE SMART CONTRACTS FOR DECENTRALISED INTERNET-OF-THINGS DEVICES developers@gadgetcoin.org Contents Abstract... 3 Background... 3 Security... 3 Data Control... 4 Standards... 4 Payment

More information

WHITE PAPER AUGUST 2014. Preventing Security Breaches by Eliminating the Need to Transmit and Store Passwords

WHITE PAPER AUGUST 2014. Preventing Security Breaches by Eliminating the Need to Transmit and Store Passwords WHITE PAPER AUGUST 2014 Preventing Security Breaches by Eliminating the Need to Transmit and Store Passwords 2 WHITE PAPER: PREVENTING SECURITY BREACHES Table of Contents on t Become the Next Headline

More information

Introduction...3 Terms in this Document...3 Conditions for Secure Operation...3 Requirements...3 Key Generation Requirements...

Introduction...3 Terms in this Document...3 Conditions for Secure Operation...3 Requirements...3 Key Generation Requirements... Hush Encryption Engine White Paper Introduction...3 Terms in this Document...3 Conditions for Secure Operation...3 Requirements...3 Key Generation Requirements...4 Passphrase Requirements...4 Data Requirements...4

More information

Terms of Service and Use

Terms of Service and Use Terms of Service and Use This Website and its related services are owned and operated by Pipchain South Africa You acknowledge that any use of this Website and any use of our Services (except for API services

More information

FACT SHEET: Ransomware and HIPAA

FACT SHEET: Ransomware and HIPAA FACT SHEET: Ransomware and HIPAA A recent U.S. Government interagency report indicates that, on average, there have been 4,000 daily ransomware attacks since early 2016 (a 300% increase over the 1,000

More information

Content Teaching Academy at James Madison University

Content Teaching Academy at James Madison University Content Teaching Academy at James Madison University 1 2 The Battle Field: Computers, LANs & Internetworks 3 Definitions Computer Security - generic name for the collection of tools designed to protect

More information

Network Security (2) CPSC 441 Department of Computer Science University of Calgary

Network Security (2) CPSC 441 Department of Computer Science University of Calgary Network Security (2) CPSC 441 Department of Computer Science University of Calgary 1 Friends and enemies: Alice, Bob, Trudy well-known in network security world Bob, Alice (lovers!) want to communicate

More information

4. Identify the security measures provided by Microsoft Office Access. 5. Identify the methods for securing a DBMS on the Web.

4. Identify the security measures provided by Microsoft Office Access. 5. Identify the methods for securing a DBMS on the Web. Topic 8 Database Security LEARNING OUTCOMES When you have completed this Topic you should be able to: 1. Discuss the important of database security to an organisation. 2. Identify the types of threat that

More information

Profit-Driven Abuses of Virtual Currencies

Profit-Driven Abuses of Virtual Currencies Profit-Driven Abuses of Virtual Currencies Danny Yuxing Huang Department of Computer Science and Engineering University of California, San Diego dhuang@cs.ucsd.edu ABSTRACT This paper traces the rise of

More information

Crypto Lab Public-Key Cryptography and PKI

Crypto Lab Public-Key Cryptography and PKI SEED Labs 1 Crypto Lab Public-Key Cryptography and PKI Copyright c 2006-2014 Wenliang Du, Syracuse University. The development of this document is/was funded by three grants from the US National Science

More information

Network Security. Gaurav Naik Gus Anderson. College of Engineering. Drexel University, Philadelphia, PA. Drexel University. College of Engineering

Network Security. Gaurav Naik Gus Anderson. College of Engineering. Drexel University, Philadelphia, PA. Drexel University. College of Engineering Network Security Gaurav Naik Gus Anderson, Philadelphia, PA Lectures on Network Security Feb 12 (Today!): Public Key Crypto, Hash Functions, Digital Signatures, and the Public Key Infrastructure Feb 14:

More information

Bitcoin: Concepts, Practice, and Research Directions

Bitcoin: Concepts, Practice, and Research Directions Bitcoin: Concepts, Practice, and Research Directions Ittay Eyal, Emin Gün Sirer Computer Science, Cornell University DISC Bitcoin Tutorial, October 2014 Barter Gold Fiat 2 Barter Gold Fiat Bitcoin 2008:

More information

COINSPARK ASSET ISSUE AGREEMENT. Issuer An example retailer Legal name of the issuer.

COINSPARK ASSET ISSUE AGREEMENT. Issuer An example retailer Legal name of the issuer. COINSPARK ASSET ISSUE AGREEMENT ISSUE DETAILS Variable Name Value Explanation CoinSpark Asset Coupons for CoinSpark Asset Demonstration Full display name of the CoinSpark Asset. Issuer An example retailer

More information

Enova X-Wall LX Frequently Asked Questions

Enova X-Wall LX Frequently Asked Questions Enova X-Wall LX Frequently Asked Questions Q: What is X-Wall LX? A: X-Wall LX is the third generation of Enova real-time hard drive cryptographic gateway ASIC (Application Specific Integrated Circuit)

More information

Network Security. Security Attacks. Normal flow: Interruption: 孫 宏 民 hmsun@cs.nthu.edu.tw Phone: 03-5742968 國 立 清 華 大 學 資 訊 工 程 系 資 訊 安 全 實 驗 室

Network Security. Security Attacks. Normal flow: Interruption: 孫 宏 民 hmsun@cs.nthu.edu.tw Phone: 03-5742968 國 立 清 華 大 學 資 訊 工 程 系 資 訊 安 全 實 驗 室 Network Security 孫 宏 民 hmsun@cs.nthu.edu.tw Phone: 03-5742968 國 立 清 華 大 學 資 訊 工 程 系 資 訊 安 全 實 驗 室 Security Attacks Normal flow: sender receiver Interruption: Information source Information destination

More information

Quantitative Analysis of the Full Bitcoin Transaction Graph

Quantitative Analysis of the Full Bitcoin Transaction Graph Quantitative Analysis of the Full Bitcoin Transaction Graph Dorit Ron and Adi Shamir Department of Computer Science and Applied Mathematics, The Weizmann Institute of Science, Israel {dorit.ron,adi.shamir}@weizmann.ac.il

More information

HOW ENCRYPTION WORKS. Introduction to BackupEDGE Data Encryption. Technology Overview. Strong Encryption BackupEDGE

HOW ENCRYPTION WORKS. Introduction to BackupEDGE Data Encryption. Technology Overview. Strong Encryption BackupEDGE HOW ENCRYPTION WORKS Technology Overview Strong Encryption BackupEDGE Introduction to BackupEDGE Data Encryption A major feature of BackupEDGE is the ability to protect archives containing critical client

More information

Filecoin: A Cryptocurrency Operated File Storage Network

Filecoin: A Cryptocurrency Operated File Storage Network Filecoin: A Cryptocurrency Operated File Storage Network 1e96a1b27a6cb85df68d728cf3695b0c46dbd44d filecoin.io July 15, 2014 Abstract Filecoin is a distributed electronic currency similar to Bitcoin. Unlike

More information

Monitoring Data Integrity while using TPA in Cloud Environment

Monitoring Data Integrity while using TPA in Cloud Environment Monitoring Data Integrity while using TPA in Cloud Environment Jaspreet Kaur, Jasmeet Singh Abstract Cloud Computing is the arising technology that delivers software, platform and infrastructure as a service

More information

SAS Data Set Encryption Options

SAS Data Set Encryption Options Technical Paper SAS Data Set Encryption Options SAS product interaction with encrypted data storage Table of Contents Introduction: What Is Encryption?... 1 Test Configuration... 1 Data... 1 Code... 2

More information

BACK OFFICE MANUAL. Version 1.2 - Benjamin Bommhardt DRAGLET GMBH Bergsonstraße 154 81245 München - Germany

BACK OFFICE MANUAL. Version 1.2 - Benjamin Bommhardt DRAGLET GMBH Bergsonstraße 154 81245 München - Germany BACK OFFICE MANUAL Version 1.2 - Benjamin Bommhardt DRAGLET GMBH Bergsonstraße 154 81245 München - Germany Contents Introduction... 3 Overview of cxadmin... 4 Dashboard... 4 Customer overview... 5 Markets...

More information

Recommendation for Applications Using Approved Hash Algorithms

Recommendation for Applications Using Approved Hash Algorithms NIST Special Publication 800-107 Recommendation for Applications Using Approved Hash Algorithms Quynh Dang Computer Security Division Information Technology Laboratory C O M P U T E R S E C U R I T Y February

More information

HASH CODE BASED SECURITY IN CLOUD COMPUTING

HASH CODE BASED SECURITY IN CLOUD COMPUTING ABSTRACT HASH CODE BASED SECURITY IN CLOUD COMPUTING Kaleem Ur Rehman M.Tech student (CSE), College of Engineering, TMU Moradabad (India) The Hash functions describe as a phenomenon of information security

More information

Electronic Cash Payment Protocols and Systems

Electronic Cash Payment Protocols and Systems Electronic Cash Payment Protocols and Systems Speaker: Jerry Gao Ph.D. San Jose State University email: jerrygao@email.sjsu.edu URL: http://www.engr.sjsu.edu/gaojerry May, 2000 Presentation Outline - Overview

More information

CNT5410 - Computer and Network Security Review/Wrapup

CNT5410 - Computer and Network Security Review/Wrapup CNT5410 - Computer and Network Security Review/Wrapup Professor Kevin Butler Fall 2015 Review What did we talk about this semester? Cryptography secret vs public-key key exchange (Diffie-Hellman) symmetric

More information

msigna Getting Started

msigna Getting Started msigna Getting Started Thank you for deciding to try msigna, the most powerful secure cryptocoin storage solution available. We think you will enjoy using msigna as it is, but it is still a product under

More information

With each new release of SQL Server, Microsoft continues to improve

With each new release of SQL Server, Microsoft continues to improve Chapter 1: Configuring In This Chapter configuration tools Adjusting server parameters Generating configuration scripts With each new release of, Microsoft continues to improve and simplify the daily tasks

More information

Bitcoin and Beyond: The Possibilities and Pitfalls of Virtual Currencies

Bitcoin and Beyond: The Possibilities and Pitfalls of Virtual Currencies Bitcoin and Beyond: The Possibilities and Pitfalls of Virtual Currencies David Andolfatto* Vice President Federal Reserve Bank of St. Louis March 31, 2014 *The views and opinions expressed here are my

More information

CRYPTOGRAPHY AS A SERVICE

CRYPTOGRAPHY AS A SERVICE CRYPTOGRAPHY AS A SERVICE Peter Robinson RSA, The Security Division of EMC Session ID: ADS R01 Session Classification: Advanced Introduction Deploying cryptographic keys to end points such as smart phones,

More information

Fighting product clones through digital signatures

Fighting product clones through digital signatures Paul Curtis, Katrin Berkenkopf Embedded Experts Team, SEGGER Microcontroller Fighting product clones through digital signatures Product piracy and forgery are growing problems that not only decrease turnover

More information

Authentication requirement Authentication function MAC Hash function Security of

Authentication requirement Authentication function MAC Hash function Security of UNIT 3 AUTHENTICATION Authentication requirement Authentication function MAC Hash function Security of hash function and MAC SHA HMAC CMAC Digital signature and authentication protocols DSS Slides Courtesy

More information

Key Management Interoperability Protocol (KMIP)

Key Management Interoperability Protocol (KMIP) (KMIP) Addressing the Need for Standardization in Enterprise Key Management Version 1.0, May 20, 2009 Copyright 2009 by the Organization for the Advancement of Structured Information Standards (OASIS).

More information

Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography

Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography What Is Steganography? Steganography Process of hiding the existence of the data within another file Example:

More information

GCM-SIV: Full Nonce Misuse-Resistant Authenticated Encryption at Under One Cycle per Byte. Yehuda Lindell Bar-Ilan University

GCM-SIV: Full Nonce Misuse-Resistant Authenticated Encryption at Under One Cycle per Byte. Yehuda Lindell Bar-Ilan University GCM-SIV: Full Nonce Misuse-Resistant Authenticated Encryption at Under One Cycle per Byte Shay Gueron Haifa Univ. and Intel Yehuda Lindell Bar-Ilan University Appeared at ACM CCS 2015 How to Encrypt with

More information

Namecoin as alternative to the Domain Name System

Namecoin as alternative to the Domain Name System Namecoin as alternative to the Domain Name System Xander Lammertink Author, UvA System and Network Engineering xander.lammertink@os3.nl Marco Davids Supervisor, SIDN Labs Abstract: This paper researches

More information

Cryptography: Authentication, Blind Signatures, and Digital Cash

Cryptography: Authentication, Blind Signatures, and Digital Cash Cryptography: Authentication, Blind Signatures, and Digital Cash Rebecca Bellovin 1 Introduction One of the most exciting ideas in cryptography in the past few decades, with the widest array of applications,

More information

For your consideration Senate Economics References Committee - inquiry into digital currency

For your consideration Senate Economics References Committee - inquiry into digital currency Committee Secretary Senate Economics Committee PO Box 6100 Parliament House CANBERRA ACT 2600 Reply to: GPO Box 9977 MELBOURNE VIC 3001 Contact officer: Jonathan Woodger Phone: 13 28 69 Fax: 03 9285 1943

More information

Chapter 8 Security. IC322 Fall 2014. Computer Networking: A Top Down Approach. 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012

Chapter 8 Security. IC322 Fall 2014. Computer Networking: A Top Down Approach. 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 Chapter 8 Security IC322 Fall 2014 Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 All material copyright 1996-2012 J.F Kurose and K.W. Ross, All

More information

Block encryption. CS-4920: Lecture 7 Secret key cryptography. Determining the plaintext ciphertext mapping. CS4920-Lecture 7 4/1/2015

Block encryption. CS-4920: Lecture 7 Secret key cryptography. Determining the plaintext ciphertext mapping. CS4920-Lecture 7 4/1/2015 CS-4920: Lecture 7 Secret key cryptography Reading Chapter 3 (pp. 59-75, 92-93) Today s Outcomes Discuss block and key length issues related to secret key cryptography Define several terms related to secret

More information

E-commerce. business. technology. society. Kenneth C. Laudon Carol Guercio Traver. Second Edition. Copyright 2007 Pearson Education, Inc.

E-commerce. business. technology. society. Kenneth C. Laudon Carol Guercio Traver. Second Edition. Copyright 2007 Pearson Education, Inc. Copyright 2007 Pearson Education, Inc. Slide 5-1 E-commerce business. technology. society. Second Edition Kenneth C. Laudon Carol Guercio Traver Copyright 2007 Pearson Education, Inc. Slide 5-2 Chapter

More information

As simple as e-mail and as secure as postal mail.

As simple as e-mail and as secure as postal mail. Stay up-to-date Page 1 The advantages of De-Mail for individuals, businesses and Page 2 government agencies Unencrypted, unprotected, unverified what does that mean? Page 3 Encrypted, protected, verified

More information

Sia: Simple Decentralized Storage

Sia: Simple Decentralized Storage Sia: Simple Decentralized Storage David Vorick Nebulous Inc. david@nebulouslabs.com Luke Champine Nebulous Inc. luke@nebulouslabs.com November 29, 2014 Abstract The authors introduce Sia, a platform for

More information

Secure Computation Martin Beck

Secure Computation Martin Beck Institute of Systems Architecture, Chair of Privacy and Data Security Secure Computation Martin Beck Dresden, 05.02.2015 Index Homomorphic Encryption The Cloud problem (overview & example) System properties

More information

FIPS 140-2 Non- Proprietary Security Policy. McAfee SIEM Cryptographic Module, Version 1.0

FIPS 140-2 Non- Proprietary Security Policy. McAfee SIEM Cryptographic Module, Version 1.0 FIPS 40-2 Non- Proprietary Security Policy McAfee SIEM Cryptographic Module, Version.0 Document Version.4 December 2, 203 Document Version.4 McAfee Page of 6 Prepared For: Prepared By: McAfee, Inc. 282

More information

The Encryption Technology of Automatic Teller Machine Networks

The Encryption Technology of Automatic Teller Machine Networks Software Engineering 4C03 Winter 2005 The Encryption Technology of Automatic Teller Machine Networks Researcher: Shun Wong Last revised: April 2nd, 2005 1 Introduction ATM also known as Automatic Teller

More information

True Identity solution

True Identity solution Identify yourself securely. True Identity solution True Identity authentication and authorization for groundbreaking security across multiple applications including all online transactions Biogy Inc. Copyright

More information

Computer Networks. Network Security and Ethics. Week 14. College of Information Science and Engineering Ritsumeikan University

Computer Networks. Network Security and Ethics. Week 14. College of Information Science and Engineering Ritsumeikan University Computer Networks Network Security and Ethics Week 14 College of Information Science and Engineering Ritsumeikan University Security Intro for Admins l Network administrators can break security into two

More information

Blockstack: A Global Naming and Storage System Secured by Blockchains

Blockstack: A Global Naming and Storage System Secured by Blockchains Blockstack: A Global Naming and Storage System Secured by Blockchains Muneeb Ali and Jude Nelson, Princeton University and Blockstack Labs; Ryan Shea, Blockstack Labs; Michael J. Freedman, Princeton University

More information

A Visual Interactive Realtime EXplorer for Bitcoin!

A Visual Interactive Realtime EXplorer for Bitcoin! Scuola Politecnica e delle Scienze di Base Corso di Laurea Magistrale in Ingegneria Informatica Tesi di Laurea Magistrale in sistemi distribuiti A Visual Interactive Realtime EXplorer for Bitcoin Anno

More information