Cryptocurrencies: Opportunities and Threats

Similar documents
MOMENTUM - A MEMORY-HARD PROOF-OF-WORK VIA FINDING BIRTHDAY COLLISIONS. DANIEL LARIMER dlarimer@invictus-innovations.com Invictus Innovations, Inc

BitIodine: extracting intelligence from the Bitcoin network

Distributed Public Key Infrastructure via the Blockchain. Sean Pearl April 28, 2015

Bitcoin Miner Optimization

AsicBoost A Speedup for Bitcoin Mining

An Analysis of the Bitcoin Electronic Cash System

2. Elections We define an electronic vote as a chain of digital signatures. Each owner transfers the vote to the candidate or legislation by digitally

Bitcoin Thief Tutorial

More information >>> HERE <<<

Introduction to Bitcoin Mining

Bitcoin: A Peer-to-Peer Electronic Cash System

Using the Bitcoin Blockchain for secure, independently verifiable, electronic votes. Pierre Noizat - July 2014

The Dark Web. Steven M. Bellovin March 21,

Payment systems. Tuomas Aura CSE-C3400 Information security. Aalto University, autumn 2015

Orwell. From Bitcoin to secure Domain Name System

Peershare does not require any changes to the Peercoin blockchain or protocol (no hard fork).

Bitcoin: Regulations and Legal Risks for a New Virtual Currency

Usable Crypto: Introducing minilock. Nadim Kobeissi HOPE X, NYC, 2014

Electronic Payments. EITN40 - Advanced Web Security

Cryptocurrency and Bitcoin: A possible foundation of future currency why it has value, what is its history and its future outlook.

CS 393 Network Security. Nasir Memon Polytechnic University Module 11 Secure

Security Mechanisms in Bitcoin

Efficient Framework for Deploying Information in Cloud Virtual Datacenters with Cryptography Algorithms

Overview Most of the documentation out there on the transition from SHA-1 certificates to SHA-2 certificates will tell you three things:

How encryption works to provide confidentiality. How hashing works to provide integrity. How digital signatures work to provide authenticity and

Virtual Currencies and their Relevance to Digital Forensics PRESTON MILLER

IoT Security Platform

Threats to Bitcoin Software

Randomized Hashing for Digital Signatures

SEC 4: Elliptic Curve Qu-Vanstone Implicit Certificate Scheme (ECQV)

CPSC 467b: Cryptography and Computer Security

Why buy when you can rent? Bribery attacks on Bitcoin-style consensus

Blocks & Chains Decentralized Exchange

The World of Emerging Payment Systems A Brief Introduction

CoinAMI Coin-Application Mediator Interface

Overview of Cryptographic Tools for Data Security. Murat Kantarcioglu

Recipe for Mobile Data Security: TPM, Bitlocker, Windows Vista and Active Directory

High Security Online Backup. A Cyphertite White Paper February, Cloud-Based Backup Storage Threat Models

COMP-530 Cryptographic Systems Security *Requires Programming Background. University of Nicosia, Cyprus

bi on Solution white paper

Neutralus Certification Practices Statement

Victor Shoup Avi Rubin. Abstract

PGP - Pretty Good Privacy

Network Security. Mobin Javed. October 5, 2011

Fixity Checks: Checksums, Message Digests and Digital Signatures Audrey Novak, ILTS Digital Preservation Committee November 2006

Lecture 9 - Message Authentication Codes

GADGETCOIN (GDC): SECURE SMART CONTRACTS FOR DECENTRALISED INTERNET-OF-THINGS DEVICES

WHITE PAPER AUGUST Preventing Security Breaches by Eliminating the Need to Transmit and Store Passwords

Introduction...3 Terms in this Document...3 Conditions for Secure Operation...3 Requirements...3 Key Generation Requirements...

FACT SHEET: Ransomware and HIPAA

Content Teaching Academy at James Madison University

Network Security (2) CPSC 441 Department of Computer Science University of Calgary

4. Identify the security measures provided by Microsoft Office Access. 5. Identify the methods for securing a DBMS on the Web.

Profit-Driven Abuses of Virtual Currencies

Crypto Lab Public-Key Cryptography and PKI

Network Security. Gaurav Naik Gus Anderson. College of Engineering. Drexel University, Philadelphia, PA. Drexel University. College of Engineering

Bitcoin: Concepts, Practice, and Research Directions

COINSPARK ASSET ISSUE AGREEMENT. Issuer An example retailer Legal name of the issuer.

Enova X-Wall LX Frequently Asked Questions

Network Security. Security Attacks. Normal flow: Interruption: 孫 宏 民 Phone: 國 立 清 華 大 學 資 訊 工 程 系 資 訊 安 全 實 驗 室

Quantitative Analysis of the Full Bitcoin Transaction Graph

HOW ENCRYPTION WORKS. Introduction to BackupEDGE Data Encryption. Technology Overview. Strong Encryption BackupEDGE

Filecoin: A Cryptocurrency Operated File Storage Network

Monitoring Data Integrity while using TPA in Cloud Environment

SAS Data Set Encryption Options

BACK OFFICE MANUAL. Version Benjamin Bommhardt DRAGLET GMBH Bergsonstraße München - Germany

Recommendation for Applications Using Approved Hash Algorithms

HASH CODE BASED SECURITY IN CLOUD COMPUTING

Electronic Cash Payment Protocols and Systems

CNT Computer and Network Security Review/Wrapup

msigna Getting Started

With each new release of SQL Server, Microsoft continues to improve

Bitcoin and Beyond: The Possibilities and Pitfalls of Virtual Currencies

CRYPTOGRAPHY AS A SERVICE

Fighting product clones through digital signatures

Authentication requirement Authentication function MAC Hash function Security of

Key Management Interoperability Protocol (KMIP)

Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography

GCM-SIV: Full Nonce Misuse-Resistant Authenticated Encryption at Under One Cycle per Byte. Yehuda Lindell Bar-Ilan University

Namecoin as alternative to the Domain Name System

Cryptography: Authentication, Blind Signatures, and Digital Cash

For your consideration Senate Economics References Committee - inquiry into digital currency

Chapter 8 Security. IC322 Fall Computer Networking: A Top Down Approach. 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012

Block encryption. CS-4920: Lecture 7 Secret key cryptography. Determining the plaintext ciphertext mapping. CS4920-Lecture 7 4/1/2015

E-commerce. business. technology. society. Kenneth C. Laudon Carol Guercio Traver. Second Edition. Copyright 2007 Pearson Education, Inc.

As simple as and as secure as postal mail.

Sia: Simple Decentralized Storage

Secure Computation Martin Beck

FIPS Non- Proprietary Security Policy. McAfee SIEM Cryptographic Module, Version 1.0

The Encryption Technology of Automatic Teller Machine Networks

True Identity solution

Computer Networks. Network Security and Ethics. Week 14. College of Information Science and Engineering Ritsumeikan University

Blockstack: A Global Naming and Storage System Secured by Blockchains

A Visual Interactive Realtime EXplorer for Bitcoin!

Transcription:

Cryptocurrencies: Opportunities and Threats Pasquale Forte 1 Giovanni Schmid 2 1 Università degli studi di Salerno 2 Istituto di Calcolo e Reti ad Alte Prestazioni Consiglio Nazionale delle Ricerche

Cryptocurrency: Foundations An open source project A distribuited peer-to-peer system A distribuited transaction database: the blockchain Anonymous transactions Coins defined as a chain of digital signatures Coins "stored" via a client program (wallet) Fixed amount of total coins to be produced

Cryptocurrency: Foundations An open source project A distribuited peer-to-peer system A distribuited transaction database: the blockchain Anonymous transactions Coins defined as a chain of digital signatures Coins "stored" via a client program (wallet) Fixed amount of total coins to be produced

Cryptocurrency: Foundations An open source project A distribuited peer-to-peer system A distribuited transaction database: the blockchain Anonymous transactions Coins defined as a chain of digital signatures Coins "stored" via a client program (wallet) Fixed amount of total coins to be produced

Cryptocurrency: Foundations An open source project A distribuited peer-to-peer system A distribuited transaction database: the blockchain Anonymous transactions Coins defined as a chain of digital signatures Coins "stored" via a client program (wallet) Fixed amount of total coins to be produced

Cryptocurrency: Foundations An open source project A distribuited peer-to-peer system A distribuited transaction database: the blockchain Anonymous transactions Coins defined as a chain of digital signatures Coins "stored" via a client program (wallet) Fixed amount of total coins to be produced

Cryptocurrency: Foundations An open source project A distribuited peer-to-peer system A distribuited transaction database: the blockchain Anonymous transactions Coins defined as a chain of digital signatures Coins "stored" via a client program (wallet) Fixed amount of total coins to be produced

Cryptocurrency: Foundations An open source project A distribuited peer-to-peer system A distribuited transaction database: the blockchain Anonymous transactions Coins defined as a chain of digital signatures Coins "stored" via a client program (wallet) Fixed amount of total coins to be produced

Cryptocurrency: Foundations An open source project A distribuited peer-to-peer system A distribuited transaction database: the blockchain Anonymous transactions Coins defined as a chain of digital signatures Coins "stored" via a client program (wallet) Fixed amount of total coins to be produced

History and current diffusion 2008 = Satoshi Nakamoto publishes Bitcoin paper 2009 = Network genesis: first client and first block 2010 = Real Bitcoin transactions Hanyecz pays 10000 BTC for two pizzas Market cap = 1 million USD 2011 = Bitcoin buzzes Dollar parity Wikileaks begins accepting Bitcoin for donations Silk Road is launched 2012-2013 = Consolidation: Cyprus chooses Bitcoin as safe haven asset Market cap= 1 Billion USD China Central Bank prohibits financial institutions from handling bitcoin transactions FBI closes Silk Road, but one month later it is on-line again 2014 = Global diffusion: About 400 Bitcoin ATMs open (USA, Canada, Germany, Italy...) Microsoft accepts Bitcoin for games and apps FBI operates to definitively shut down Silk Road, but two hours later Silk Road is reloaded

History and current diffusion 2008 = Satoshi Nakamoto publishes Bitcoin paper 2009 = Network genesis: first client and first block 2010 = Real Bitcoin transactions Hanyecz pays 10000 BTC for two pizzas Market cap = 1 million USD 2011 = Bitcoin buzzes Dollar parity Wikileaks begins accepting Bitcoin for donations Silk Road is launched 2012-2013 = Consolidation: Cyprus chooses Bitcoin as safe haven asset Market cap= 1 Billion USD China Central Bank prohibits financial institutions from handling bitcoin transactions FBI closes Silk Road, but one month later it is on-line again 2014 = Global diffusion: About 400 Bitcoin ATMs open (USA, Canada, Germany, Italy...) Microsoft accepts Bitcoin for games and apps FBI operates to definitively shut down Silk Road, but two hours later Silk Road is reloaded

History and current diffusion 2008 = Satoshi Nakamoto publishes Bitcoin paper 2009 = Network genesis: first client and first block 2010 = Real Bitcoin transactions Hanyecz pays 10000 BTC for two pizzas Market cap = 1 million USD 2011 = Bitcoin buzzes Dollar parity Wikileaks begins accepting Bitcoin for donations Silk Road is launched 2012-2013 = Consolidation: Cyprus chooses Bitcoin as safe haven asset Market cap= 1 Billion USD China Central Bank prohibits financial institutions from handling bitcoin transactions FBI closes Silk Road, but one month later it is on-line again 2014 = Global diffusion: About 400 Bitcoin ATMs open (USA, Canada, Germany, Italy...) Microsoft accepts Bitcoin for games and apps FBI operates to definitively shut down Silk Road, but two hours later Silk Road is reloaded

History and current diffusion 2008 = Satoshi Nakamoto publishes Bitcoin paper 2009 = Network genesis: first client and first block 2010 = Real Bitcoin transactions Hanyecz pays 10000 BTC for two pizzas Market cap = 1 million USD 2011 = Bitcoin buzzes Dollar parity Wikileaks begins accepting Bitcoin for donations Silk Road is launched 2012-2013 = Consolidation: Cyprus chooses Bitcoin as safe haven asset Market cap= 1 Billion USD China Central Bank prohibits financial institutions from handling bitcoin transactions FBI closes Silk Road, but one month later it is on-line again 2014 = Global diffusion: About 400 Bitcoin ATMs open (USA, Canada, Germany, Italy...) Microsoft accepts Bitcoin for games and apps FBI operates to definitively shut down Silk Road, but two hours later Silk Road is reloaded

History and current diffusion 2008 = Satoshi Nakamoto publishes Bitcoin paper 2009 = Network genesis: first client and first block 2010 = Real Bitcoin transactions Hanyecz pays 10000 BTC for two pizzas Market cap = 1 million USD 2011 = Bitcoin buzzes Dollar parity Wikileaks begins accepting Bitcoin for donations Silk Road is launched 2012-2013 = Consolidation: Cyprus chooses Bitcoin as safe haven asset Market cap= 1 Billion USD China Central Bank prohibits financial institutions from handling bitcoin transactions FBI closes Silk Road, but one month later it is on-line again 2014 = Global diffusion: About 400 Bitcoin ATMs open (USA, Canada, Germany, Italy...) Microsoft accepts Bitcoin for games and apps FBI operates to definitively shut down Silk Road, but two hours later Silk Road is reloaded

History and current diffusion 2008 = Satoshi Nakamoto publishes Bitcoin paper 2009 = Network genesis: first client and first block 2010 = Real Bitcoin transactions Hanyecz pays 10000 BTC for two pizzas Market cap = 1 million USD 2011 = Bitcoin buzzes Dollar parity Wikileaks begins accepting Bitcoin for donations Silk Road is launched 2012-2013 = Consolidation: Cyprus chooses Bitcoin as safe haven asset Market cap= 1 Billion USD China Central Bank prohibits financial institutions from handling bitcoin transactions FBI closes Silk Road, but one month later it is on-line again 2014 = Global diffusion: About 400 Bitcoin ATMs open (USA, Canada, Germany, Italy...) Microsoft accepts Bitcoin for games and apps FBI operates to definitively shut down Silk Road, but two hours later Silk Road is reloaded

History and current diffusion 2008 = Satoshi Nakamoto publishes Bitcoin paper 2009 = Network genesis: first client and first block 2010 = Real Bitcoin transactions Hanyecz pays 10000 BTC for two pizzas Market cap = 1 million USD 2011 = Bitcoin buzzes Dollar parity Wikileaks begins accepting Bitcoin for donations Silk Road is launched 2012-2013 = Consolidation: Cyprus chooses Bitcoin as safe haven asset Market cap= 1 Billion USD China Central Bank prohibits financial institutions from handling bitcoin transactions FBI closes Silk Road, but one month later it is on-line again 2014 = Global diffusion: About 400 Bitcoin ATMs open (USA, Canada, Germany, Italy...) Microsoft accepts Bitcoin for games and apps FBI operates to definitively shut down Silk Road, but two hours later Silk Road is reloaded

History and current diffusion

History and current diffusion

Why is cryptography necessary? Multiparty Timed Challenges Goal: Checking the validity of transactions, making competing users on a problem to be solved within a preset time The problem is computationally difficult and involves a reward What is the problem? Given a computationally hard invertible function, find an input producing an output of assigned type

Why is cryptography necessary? Multiparty Timed Challenges Goal: Checking the validity of transactions, making competing users on a problem to be solved within a preset time The problem is computationally difficult and involves a reward What is the problem? Given a computationally hard invertible function, find an input producing an output of assigned type

Why is cryptography necessary? Multiparty Timed Challenges Goal: Checking the validity of transactions, making competing users on a problem to be solved within a preset time The problem is computationally difficult and involves a reward What is the problem? Given a computationally hard invertible function, find an input producing an output of assigned type

Why is cryptography necessary? Multiparty Timed Challenges Goal: Checking the validity of transactions, making competing users on a problem to be solved within a preset time The problem is computationally difficult and involves a reward What is the problem? Given a computationally hard invertible function, find an input producing an output of assigned type

Cryptographic primitives Hash function A pseudo-random way of shrinking data: Input of arbitrary length and output of fixed length One way function (computationally hard to invert) Collision resistance (hard to find more inputs having the same output)

Cryptographic primitives Hash function A pseudo-random way of shrinking data: Input of arbitrary length and output of fixed length One way function (computationally hard to invert) Collision resistance (hard to find more inputs having the same output)

Cryptographic primitives Hash function A pseudo-random way of shrinking data: Input of arbitrary length and output of fixed length One way function (computationally hard to invert) Collision resistance (hard to find more inputs having the same output)

Cryptographic primitives Hash function A pseudo-random way of shrinking data: Input of arbitrary length and output of fixed length One way function (computationally hard to invert) Collision resistance (hard to find more inputs having the same output)

Cryptographic primitives Hash function A pseudo-random way of shrinking data: Input of arbitrary length and output of fixed length One way function (computationally hard to invert) Collision resistance (hard to find more inputs having the same output)

Cryptographic primitives Digital Signature A way to bind messages to their originators: A key generation algorithm (public-private key pair) A signature generation algorithm (private key, message) A signature verification algorithm (public key, signature, message)

Cryptographic primitives Digital Signature A way to bind messages to their originators: A key generation algorithm (public-private key pair) A signature generation algorithm (private key, message) A signature verification algorithm (public key, signature, message)

Cryptographic primitives Digital Signature A way to bind messages to their originators: A key generation algorithm (public-private key pair) A signature generation algorithm (private key, message) A signature verification algorithm (public key, signature, message)

Cryptographic primitives Digital Signature A way to bind messages to their originators: A key generation algorithm (public-private key pair) A signature generation algorithm (private key, message) A signature verification algorithm (public key, signature, message)

Cryptographic primitives Digital Signature A way to bind messages to their originators: A key generation algorithm (public-private key pair) A signature generation algorithm (private key, message) A signature verification algorithm (public key, signature, message)

Transactions No central autority

Double Spending

Addresses Privacy preserving approach User transactions are between two pseudo-random addresses An example of cryptocurrency address 1A1zP1eP5QGefi2DMPTfTL5SLmv7DivfNa Note For more privacy you can use many addresses Address generation:

Addresses Privacy preserving approach User transactions are between two pseudo-random addresses An example of cryptocurrency address 1A1zP1eP5QGefi2DMPTfTL5SLmv7DivfNa Note For more privacy you can use many addresses Address generation:

Addresses Privacy preserving approach User transactions are between two pseudo-random addresses An example of cryptocurrency address 1A1zP1eP5QGefi2DMPTfTL5SLmv7DivfNa Note For more privacy you can use many addresses Address generation:

Addresses Privacy preserving approach User transactions are between two pseudo-random addresses An example of cryptocurrency address 1A1zP1eP5QGefi2DMPTfTL5SLmv7DivfNa Note For more privacy you can use many addresses Address generation:

Addresses Privacy preserving approach User transactions are between two pseudo-random addresses An example of cryptocurrency address 1A1zP1eP5QGefi2DMPTfTL5SLmv7DivfNa Note For more privacy you can use many addresses Address generation:

The Blockchain Making double-spending an hard problem It contains every transaction ever executed in the currency It opens the possibility of finding out how much value belonged to each address at any point in history Every block contains a hash of the previous block. This has the effect of creating a chain of blocks from the genesis block to the current block Each block is computationally impractical to modify

The Blockchain Making double-spending an hard problem It contains every transaction ever executed in the currency It opens the possibility of finding out how much value belonged to each address at any point in history Every block contains a hash of the previous block. This has the effect of creating a chain of blocks from the genesis block to the current block Each block is computationally impractical to modify

The Blockchain Making double-spending an hard problem It contains every transaction ever executed in the currency It opens the possibility of finding out how much value belonged to each address at any point in history Every block contains a hash of the previous block. This has the effect of creating a chain of blocks from the genesis block to the current block Each block is computationally impractical to modify

The Blockchain Making double-spending an hard problem It contains every transaction ever executed in the currency It opens the possibility of finding out how much value belonged to each address at any point in history Every block contains a hash of the previous block. This has the effect of creating a chain of blocks from the genesis block to the current block Each block is computationally impractical to modify

The Blockchain Making double-spending an hard problem It contains every transaction ever executed in the currency It opens the possibility of finding out how much value belonged to each address at any point in history Every block contains a hash of the previous block. This has the effect of creating a chain of blocks from the genesis block to the current block Each block is computationally impractical to modify

Mining Creating new coins Transactions validation In a decentralized system miners have to check the validity of transactions New coins introduction In order to verify transactions miners have to solve a computational hard problem. The miner who solves the problem is rewarded Nowdays the most adopted Multiparty Timed Challenge systems are: Proof of Work Proof of Stake

Mining Creating new coins Transactions validation In a decentralized system miners have to check the validity of transactions New coins introduction In order to verify transactions miners have to solve a computational hard problem. The miner who solves the problem is rewarded Nowdays the most adopted Multiparty Timed Challenge systems are: Proof of Work Proof of Stake

Mining Creating new coins Transactions validation In a decentralized system miners have to check the validity of transactions New coins introduction In order to verify transactions miners have to solve a computational hard problem. The miner who solves the problem is rewarded Nowdays the most adopted Multiparty Timed Challenge systems are: Proof of Work Proof of Stake

Mining Creating new coins Transactions validation In a decentralized system miners have to check the validity of transactions New coins introduction In order to verify transactions miners have to solve a computational hard problem. The miner who solves the problem is rewarded Nowdays the most adopted Multiparty Timed Challenge systems are: Proof of Work Proof of Stake

Mining Creating new coins Transactions validation In a decentralized system miners have to check the validity of transactions New coins introduction In order to verify transactions miners have to solve a computational hard problem. The miner who solves the problem is rewarded Nowdays the most adopted Multiparty Timed Challenge systems are: Proof of Work Proof of Stake

Mining Creating new coins Transactions validation In a decentralized system miners have to check the validity of transactions New coins introduction In order to verify transactions miners have to solve a computational hard problem. The miner who solves the problem is rewarded Nowdays the most adopted Multiparty Timed Challenge systems are: Proof of Work Proof of Stake

Proof of Work / Stake Getting computational difficulty through hash functions

Proof of Work Threshold Hash value Target value i.e. the hash has to be composed by a certain number of leading zeros It requires an increasing amount of computational resources over time Very high energy consumption in order to get the system working Executing an attack could be easy for users who have big computational power

Proof of Work Threshold Hash value Target value i.e. the hash has to be composed by a certain number of leading zeros It requires an increasing amount of computational resources over time Very high energy consumption in order to get the system working Executing an attack could be easy for users who have big computational power

Proof of Work Threshold Hash value Target value i.e. the hash has to be composed by a certain number of leading zeros It requires an increasing amount of computational resources over time Very high energy consumption in order to get the system working Executing an attack could be easy for users who have big computational power

Proof of Work Threshold Hash value Target value i.e. the hash has to be composed by a certain number of leading zeros It requires an increasing amount of computational resources over time Very high energy consumption in order to get the system working Executing an attack could be easy for users who have big computational power

Proof of Work Threshold Hash value Target value i.e. the hash has to be composed by a certain number of leading zeros It requires an increasing amount of computational resources over time Very high energy consumption in order to get the system working Executing an attack could be easy for users who have big computational power

Proof of Stake Threshold Hash value Stake Time i.e. the probability of mining a block depends on the stake that the user has got over time It does not employ the large computational resources that proof-of-work does Executing an attack would be much more expensive "The rich get richer and the poor get poorer" problem Less incentives for miners

Proof of Stake Threshold Hash value Stake Time i.e. the probability of mining a block depends on the stake that the user has got over time It does not employ the large computational resources that proof-of-work does Executing an attack would be much more expensive "The rich get richer and the poor get poorer" problem Less incentives for miners

Proof of Stake Threshold Hash value Stake Time i.e. the probability of mining a block depends on the stake that the user has got over time It does not employ the large computational resources that proof-of-work does Executing an attack would be much more expensive "The rich get richer and the poor get poorer" problem Less incentives for miners

Proof of Stake Threshold Hash value Stake Time i.e. the probability of mining a block depends on the stake that the user has got over time It does not employ the large computational resources that proof-of-work does Executing an attack would be much more expensive "The rich get richer and the poor get poorer" problem Less incentives for miners

Proof of Stake Threshold Hash value Stake Time i.e. the probability of mining a block depends on the stake that the user has got over time It does not employ the large computational resources that proof-of-work does Executing an attack would be much more expensive "The rich get richer and the poor get poorer" problem Less incentives for miners

Inside the Blockchain A typical block header

Mining reward In Proof of Work based cryptocurrencies: The reward consists in a given amount of coins, plus transaction fees The amount of coins is halved at each fixed period of time Bitcoin: 50 initial coins halved every 48 months In Proof of Stake based cryptocurrencies: In the most cases the reward consists of transaction fees only

Mining reward In Proof of Work based cryptocurrencies: The reward consists in a given amount of coins, plus transaction fees The amount of coins is halved at each fixed period of time Bitcoin: 50 initial coins halved every 48 months In Proof of Stake based cryptocurrencies: In the most cases the reward consists of transaction fees only

Mining reward In Proof of Work based cryptocurrencies: The reward consists in a given amount of coins, plus transaction fees The amount of coins is halved at each fixed period of time Bitcoin: 50 initial coins halved every 48 months In Proof of Stake based cryptocurrencies: In the most cases the reward consists of transaction fees only

Mining reward In Proof of Work based cryptocurrencies: The reward consists in a given amount of coins, plus transaction fees The amount of coins is halved at each fixed period of time Bitcoin: 50 initial coins halved every 48 months In Proof of Stake based cryptocurrencies: In the most cases the reward consists of transaction fees only

Mining reward In Proof of Work based cryptocurrencies: The reward consists in a given amount of coins, plus transaction fees The amount of coins is halved at each fixed period of time Bitcoin: 50 initial coins halved every 48 months In Proof of Stake based cryptocurrencies: In the most cases the reward consists of transaction fees only

Mining reward In Proof of Work based cryptocurrencies: The reward consists in a given amount of coins, plus transaction fees The amount of coins is halved at each fixed period of time Bitcoin: 50 initial coins halved every 48 months In Proof of Stake based cryptocurrencies: In the most cases the reward consists of transaction fees only

Mining reward In Proof of Work based cryptocurrencies: The reward consists in a given amount of coins, plus transaction fees The amount of coins is halved at each fixed period of time Bitcoin: 50 initial coins halved every 48 months In Proof of Stake based cryptocurrencies: In the most cases the reward consists of transaction fees only

Wallet A software that allows us to handle funds The tasks performed by the wallet software usually include: Querying of the user s blockchain pages Generation of user addresses Tracking of the transaction confirmation status Data backup and restore Note The wallet does not contain coins, but just private keys

Wallet A software that allows us to handle funds The tasks performed by the wallet software usually include: Querying of the user s blockchain pages Generation of user addresses Tracking of the transaction confirmation status Data backup and restore Note The wallet does not contain coins, but just private keys

Wallet A software that allows us to handle funds The tasks performed by the wallet software usually include: Querying of the user s blockchain pages Generation of user addresses Tracking of the transaction confirmation status Data backup and restore Note The wallet does not contain coins, but just private keys

Wallet A software that allows us to handle funds The tasks performed by the wallet software usually include: Querying of the user s blockchain pages Generation of user addresses Tracking of the transaction confirmation status Data backup and restore Note The wallet does not contain coins, but just private keys

Wallet A software that allows us to handle funds The tasks performed by the wallet software usually include: Querying of the user s blockchain pages Generation of user addresses Tracking of the transaction confirmation status Data backup and restore Note The wallet does not contain coins, but just private keys

Wallet A software that allows us to handle funds The tasks performed by the wallet software usually include: Querying of the user s blockchain pages Generation of user addresses Tracking of the transaction confirmation status Data backup and restore Note The wallet does not contain coins, but just private keys

Wallet A software that allows us to handle funds The tasks performed by the wallet software usually include: Querying of the user s blockchain pages Generation of user addresses Tracking of the transaction confirmation status Data backup and restore Note The wallet does not contain coins, but just private keys

Caution! The problem of lost coins Any unspent balance in an account for which the private key has been lost results in a loss of coins Another way to lose coins follows from sending them to an incorrect address The absence of a trusted third party makes it difficult the design of mechanisms for coin recovery Lost coins would cause deflation, meaning the other coins have higher value

Caution! The problem of lost coins Any unspent balance in an account for which the private key has been lost results in a loss of coins Another way to lose coins follows from sending them to an incorrect address The absence of a trusted third party makes it difficult the design of mechanisms for coin recovery Lost coins would cause deflation, meaning the other coins have higher value

Caution! The problem of lost coins Any unspent balance in an account for which the private key has been lost results in a loss of coins Another way to lose coins follows from sending them to an incorrect address The absence of a trusted third party makes it difficult the design of mechanisms for coin recovery Lost coins would cause deflation, meaning the other coins have higher value

Caution! The problem of lost coins Any unspent balance in an account for which the private key has been lost results in a loss of coins Another way to lose coins follows from sending them to an incorrect address The absence of a trusted third party makes it difficult the design of mechanisms for coin recovery Lost coins would cause deflation, meaning the other coins have higher value

Caution! The problem of lost coins Any unspent balance in an account for which the private key has been lost results in a loss of coins Another way to lose coins follows from sending them to an incorrect address The absence of a trusted third party makes it difficult the design of mechanisms for coin recovery Lost coins would cause deflation, meaning the other coins have higher value

Types of wallet Desktop wallet Mobile wallet Recommendation It is highly recommended to back up a wallet regularly and keep several copies of the backup in different safe locations. Web wallet Paper wallet Hardware wallet

Types of wallet Desktop wallet Mobile wallet Recommendation It is highly recommended to back up a wallet regularly and keep several copies of the backup in different safe locations. Web wallet Paper wallet Hardware wallet

Types of wallet Desktop wallet Mobile wallet Recommendation It is highly recommended to back up a wallet regularly and keep several copies of the backup in different safe locations. Web wallet Paper wallet Hardware wallet

Types of wallet Desktop wallet Mobile wallet Recommendation It is highly recommended to back up a wallet regularly and keep several copies of the backup in different safe locations. Web wallet Paper wallet Hardware wallet

Types of wallet Desktop wallet Mobile wallet Recommendation It is highly recommended to back up a wallet regularly and keep several copies of the backup in different safe locations. Web wallet Paper wallet Hardware wallet

Types of wallet Desktop wallet Mobile wallet Recommendation It is highly recommended to back up a wallet regularly and keep several copies of the backup in different safe locations. Web wallet Paper wallet Hardware wallet

Types of wallet Desktop wallet Mobile wallet Recommendation It is highly recommended to back up a wallet regularly and keep several copies of the backup in different safe locations. Web wallet Paper wallet Hardware wallet

Mining Hardware From CPUs to ASICs First generation: CPU Second generation: GPU Third generation: FPGA (Field-Programmable Gate Array) Fourth generation: ASIC (Application-Specific Integrated Circuit)

Mining Hardware From CPUs to ASICs First generation: CPU Second generation: GPU Third generation: FPGA (Field-Programmable Gate Array) Fourth generation: ASIC (Application-Specific Integrated Circuit)

Mining Hardware From CPUs to ASICs First generation: CPU Second generation: GPU Third generation: FPGA (Field-Programmable Gate Array) Fourth generation: ASIC (Application-Specific Integrated Circuit)

Mining Hardware From CPUs to ASICs First generation: CPU Second generation: GPU Third generation: FPGA (Field-Programmable Gate Array) Fourth generation: ASIC (Application-Specific Integrated Circuit)

Mining Hardware From CPUs to ASICs First generation: CPU Second generation: GPU Third generation: FPGA (Field-Programmable Gate Array) Fourth generation: ASIC (Application-Specific Integrated Circuit)

Mining Hardware Hash rate

Computationally hard invertible functions Recall These functions are used for mining In cryptocurrency world the two most used functions are: SHA-256 Scrypt

Computationally hard invertible functions Recall These functions are used for mining In cryptocurrency world the two most used functions are: SHA-256 Scrypt

Computationally hard invertible functions Recall These functions are used for mining In cryptocurrency world the two most used functions are: SHA-256 Scrypt

Computationally hard invertible functions Recall These functions are used for mining In cryptocurrency world the two most used functions are: SHA-256 Scrypt

Computationally hard invertible functions Recall These functions are used for mining In cryptocurrency world the two most used functions are: SHA-256 Scrypt

SHA-256 An hash function published as NIST standard It outputs digest of 256 bit from an input of variable length No collision found A dangerous property This algorithm is embarassingly parallel = Parallel hardware has allow for a hash rate gain of 10 10 in the last five years

SHA-256 An hash function published as NIST standard It outputs digest of 256 bit from an input of variable length No collision found A dangerous property This algorithm is embarassingly parallel = Parallel hardware has allow for a hash rate gain of 10 10 in the last five years

SHA-256 An hash function published as NIST standard It outputs digest of 256 bit from an input of variable length No collision found A dangerous property This algorithm is embarassingly parallel = Parallel hardware has allow for a hash rate gain of 10 10 in the last five years

SHA-256 An hash function published as NIST standard It outputs digest of 256 bit from an input of variable length No collision found A dangerous property This algorithm is embarassingly parallel = Parallel hardware has allow for a hash rate gain of 10 10 in the last five years

Scrypt A key derivation function published in 2009 by C. Percival Bytes are much more expensive than Mips Sequential Memory Hard algorithm= Asymptotically requires an amount of memory proportional to the number of operations to perform Innovation Space complexity is tied to computational complexity= based on highly parallelized hardware are much less effective Effect The cost of hardware for mining with Scrypt is out of reach

Scrypt A key derivation function published in 2009 by C. Percival Bytes are much more expensive than Mips Sequential Memory Hard algorithm= Asymptotically requires an amount of memory proportional to the number of operations to perform Innovation Space complexity is tied to computational complexity= based on highly parallelized hardware are much less effective Effect The cost of hardware for mining with Scrypt is out of reach

Scrypt A key derivation function published in 2009 by C. Percival Bytes are much more expensive than Mips Sequential Memory Hard algorithm= Asymptotically requires an amount of memory proportional to the number of operations to perform Innovation Space complexity is tied to computational complexity= based on highly parallelized hardware are much less effective Effect The cost of hardware for mining with Scrypt is out of reach

Scrypt A key derivation function published in 2009 by C. Percival Bytes are much more expensive than Mips Sequential Memory Hard algorithm= Asymptotically requires an amount of memory proportional to the number of operations to perform Innovation Space complexity is tied to computational complexity= based on highly parallelized hardware are much less effective Effect The cost of hardware for mining with Scrypt is out of reach

Scrypt A key derivation function published in 2009 by C. Percival Bytes are much more expensive than Mips Sequential Memory Hard algorithm= Asymptotically requires an amount of memory proportional to the number of operations to perform Innovation Space complexity is tied to computational complexity= based on highly parallelized hardware are much less effective Effect The cost of hardware for mining with Scrypt is out of reach

Wallet theft Wallet is not encrypted by default Many malwares have been created for stealing information from wallets Notice For securing your funds encrypt your wallet!

Wallet theft Wallet is not encrypted by default Many malwares have been created for stealing information from wallets Notice For securing your funds encrypt your wallet!

Wallet theft Wallet is not encrypted by default Many malwares have been created for stealing information from wallets Notice For securing your funds encrypt your wallet!

Wallet theft Wallet is not encrypted by default Many malwares have been created for stealing information from wallets Notice For securing your funds encrypt your wallet!

Transaction Spamming Denial of Service An attacker could create many transactions where he sends funds to himself This attack is unlikely because: The amount of each transaction must be above a given threshold (0.0000054 in Bitcoin) The number of free transactions is limited i.e. mined blocks have a maximum block size of 50kB reserved for priority (free) transactions. Transactions above this limit have to pay fees

Transaction Spamming Denial of Service An attacker could create many transactions where he sends funds to himself This attack is unlikely because: The amount of each transaction must be above a given threshold (0.0000054 in Bitcoin) The number of free transactions is limited i.e. mined blocks have a maximum block size of 50kB reserved for priority (free) transactions. Transactions above this limit have to pay fees

Transaction Spamming Denial of Service An attacker could create many transactions where he sends funds to himself This attack is unlikely because: The amount of each transaction must be above a given threshold (0.0000054 in Bitcoin) The number of free transactions is limited i.e. mined blocks have a maximum block size of 50kB reserved for priority (free) transactions. Transactions above this limit have to pay fees

Transaction Spamming Denial of Service An attacker could create many transactions where he sends funds to himself This attack is unlikely because: The amount of each transaction must be above a given threshold (0.0000054 in Bitcoin) The number of free transactions is limited i.e. mined blocks have a maximum block size of 50kB reserved for priority (free) transactions. Transactions above this limit have to pay fees

Transaction Spamming Denial of Service An attacker could create many transactions where he sends funds to himself This attack is unlikely because: The amount of each transaction must be above a given threshold (0.0000054 in Bitcoin) The number of free transactions is limited i.e. mined blocks have a maximum block size of 50kB reserved for priority (free) transactions. Transactions above this limit have to pay fees

51% attack A 51% attacker could: Perform double-spending Remove transactions from the blockchain Prevent other miners from mining new blocks A 51% attacker could not: Alter the transactions Create coins from nothing Modify the amount of transactions in the blockchain

51% attack A 51% attacker could: Perform double-spending Remove transactions from the blockchain Prevent other miners from mining new blocks A 51% attacker could not: Alter the transactions Create coins from nothing Modify the amount of transactions in the blockchain

51% attack A 51% attacker could: Perform double-spending Remove transactions from the blockchain Prevent other miners from mining new blocks A 51% attacker could not: Alter the transactions Create coins from nothing Modify the amount of transactions in the blockchain

51% attack A 51% attacker could: Perform double-spending Remove transactions from the blockchain Prevent other miners from mining new blocks A 51% attacker could not: Alter the transactions Create coins from nothing Modify the amount of transactions in the blockchain

51% attack A 51% attacker could: Perform double-spending Remove transactions from the blockchain Prevent other miners from mining new blocks A 51% attacker could not: Alter the transactions Create coins from nothing Modify the amount of transactions in the blockchain

51% attack A 51% attacker could: Perform double-spending Remove transactions from the blockchain Prevent other miners from mining new blocks A 51% attacker could not: Alter the transactions Create coins from nothing Modify the amount of transactions in the blockchain

51% attack A 51% attacker could: Perform double-spending Remove transactions from the blockchain Prevent other miners from mining new blocks A 51% attacker could not: Alter the transactions Create coins from nothing Modify the amount of transactions in the blockchain

51% attack A 51% attacker could: Perform double-spending Remove transactions from the blockchain Prevent other miners from mining new blocks A 51% attacker could not: Alter the transactions Create coins from nothing Modify the amount of transactions in the blockchain

51% attack A 51% attacker could: Perform double-spending Remove transactions from the blockchain Prevent other miners from mining new blocks A 51% attacker could not: Alter the transactions Create coins from nothing Modify the amount of transactions in the blockchain

Attack to coin exchange Mt.Gox shutdown Mt.Gox suspended withdrawals after coming under attacks that flooded it with malformed transaction records The phantom transactions didn t allow attackers to steal money The malformed records created discrepancies in the effected exchange s accounting systems that caused them to fall out of sync with the network MtGox lost 750.000 bitcoins belonging to customers and over 100.000 bitcoins of its own money These DDOS attacks were possible due to the transaction malleability problems

Attack to coin exchange Mt.Gox shutdown Mt.Gox suspended withdrawals after coming under attacks that flooded it with malformed transaction records The phantom transactions didn t allow attackers to steal money The malformed records created discrepancies in the effected exchange s accounting systems that caused them to fall out of sync with the network MtGox lost 750.000 bitcoins belonging to customers and over 100.000 bitcoins of its own money These DDOS attacks were possible due to the transaction malleability problems

Attack to coin exchange Mt.Gox shutdown Mt.Gox suspended withdrawals after coming under attacks that flooded it with malformed transaction records The phantom transactions didn t allow attackers to steal money The malformed records created discrepancies in the effected exchange s accounting systems that caused them to fall out of sync with the network MtGox lost 750.000 bitcoins belonging to customers and over 100.000 bitcoins of its own money These DDOS attacks were possible due to the transaction malleability problems

Attack to coin exchange Mt.Gox shutdown Mt.Gox suspended withdrawals after coming under attacks that flooded it with malformed transaction records The phantom transactions didn t allow attackers to steal money The malformed records created discrepancies in the effected exchange s accounting systems that caused them to fall out of sync with the network MtGox lost 750.000 bitcoins belonging to customers and over 100.000 bitcoins of its own money These DDOS attacks were possible due to the transaction malleability problems

Attack to coin exchange Mt.Gox shutdown Mt.Gox suspended withdrawals after coming under attacks that flooded it with malformed transaction records The phantom transactions didn t allow attackers to steal money The malformed records created discrepancies in the effected exchange s accounting systems that caused them to fall out of sync with the network MtGox lost 750.000 bitcoins belonging to customers and over 100.000 bitcoins of its own money These DDOS attacks were possible due to the transaction malleability problems

Attack to coin exchange Mt.Gox shutdown Mt.Gox suspended withdrawals after coming under attacks that flooded it with malformed transaction records The phantom transactions didn t allow attackers to steal money The malformed records created discrepancies in the effected exchange s accounting systems that caused them to fall out of sync with the network MtGox lost 750.000 bitcoins belonging to customers and over 100.000 bitcoins of its own money These DDOS attacks were possible due to the transaction malleability problems

Transaction Malleability A transaction could be changed in such a way that its hash changes, but the digital signature is still valid Some openssl implementations misspell the DER encoding of ASN.1 octet strings For every ECDSA signature (r, s), the signature (r, s(modn)) is a valid signature of the same message This transaction could be confirmed and written in the blockchain If that happens, the network will assume that transaction is valid, and won t original record

Transaction Malleability A transaction could be changed in such a way that its hash changes, but the digital signature is still valid Some openssl implementations misspell the DER encoding of ASN.1 octet strings For every ECDSA signature (r, s), the signature (r, s(modn)) is a valid signature of the same message This transaction could be confirmed and written in the blockchain If that happens, the network will assume that transaction is valid, and won t original record

Transaction Malleability A transaction could be changed in such a way that its hash changes, but the digital signature is still valid Some openssl implementations misspell the DER encoding of ASN.1 octet strings For every ECDSA signature (r, s), the signature (r, s(modn)) is a valid signature of the same message This transaction could be confirmed and written in the blockchain If that happens, the network will assume that transaction is valid, and won t original record

Transaction Malleability A transaction could be changed in such a way that its hash changes, but the digital signature is still valid Some openssl implementations misspell the DER encoding of ASN.1 octet strings For every ECDSA signature (r, s), the signature (r, s(modn)) is a valid signature of the same message This transaction could be confirmed and written in the blockchain If that happens, the network will assume that transaction is valid, and won t original record

Bitcoin evangelism If a bad actor infiltrates a traditional financial network, the network itself and all of its participants are at risk. In contrast, if a bad actor has access to the bitcoin network, they have no power in the network itself and they do not compromise trust in the network. Bitcoin is not unregulated. Rather, several of the bitcoin network and financial system are regulated by mathematical algorithms. The algorithmic regulation in bitcoin offers predictable, objective, measurable outcomes. -Andreas M. Antonopoulos-

Bitcoin evangelism If a bad actor infiltrates a traditional financial network, the network itself and all of its participants are at risk. In contrast, if a bad actor has access to the bitcoin network, they have no power in the network itself and they do not compromise trust in the network. Bitcoin is not unregulated. Rather, several of the bitcoin network and financial system are regulated by mathematical algorithms. The algorithmic regulation in bitcoin offers predictable, objective, measurable outcomes. -Andreas M. Antonopoulos-

Bitcoin evangelism If a bad actor infiltrates a traditional financial network, the network itself and all of its participants are at risk. In contrast, if a bad actor has access to the bitcoin network, they have no power in the network itself and they do not compromise trust in the network. Bitcoin is not unregulated. Rather, several of the bitcoin network and financial system are regulated by mathematical algorithms. The algorithmic regulation in bitcoin offers predictable, objective, measurable outcomes. -Andreas M. Antonopoulos-

Legality of cryptocurrencies The legal status of cryptocurrencies varies from country to country

Cryptocurrencies & Cybercrime Bitcoin is used in illegal markets, crime trading, ramsonware...

Is mining in Bitcoin feasible? Solo mining is impracticable There are many mining pools The reward is divided according to the work performed

Is mining in Bitcoin feasible? Solo mining is impracticable There are many mining pools The reward is divided according to the work performed

Is mining in Bitcoin feasible? Solo mining is impracticable There are many mining pools The reward is divided according to the work performed

Is mining in Bitcoin feasible? Solo mining is impracticable There are many mining pools The reward is divided according to the work performed

Mining is the heart of cryptocurrencies Proof of Work s limits: The difficulty increases exponentially as the reward decreases Computing resources and energy are spent just to make and transfer money In order to have some chance of making money, a user must belong to a big mining pool Memory-hard algorihms can overcome some limitations of PoW-based systems Proof of Stake does not require application specific hardware, but the rich gets richer

Mining is the heart of cryptocurrencies Proof of Work s limits: The difficulty increases exponentially as the reward decreases Computing resources and energy are spent just to make and transfer money In order to have some chance of making money, a user must belong to a big mining pool Memory-hard algorihms can overcome some limitations of PoW-based systems Proof of Stake does not require application specific hardware, but the rich gets richer

Mining is the heart of cryptocurrencies Proof of Work s limits: The difficulty increases exponentially as the reward decreases Computing resources and energy are spent just to make and transfer money In order to have some chance of making money, a user must belong to a big mining pool Memory-hard algorihms can overcome some limitations of PoW-based systems Proof of Stake does not require application specific hardware, but the rich gets richer

Mining is the heart of cryptocurrencies Proof of Work s limits: The difficulty increases exponentially as the reward decreases Computing resources and energy are spent just to make and transfer money In order to have some chance of making money, a user must belong to a big mining pool Memory-hard algorihms can overcome some limitations of PoW-based systems Proof of Stake does not require application specific hardware, but the rich gets richer

Thanks for your attention!