0% found this document useful (0 votes)
3 views

Module2_Lect1_202425

The presentation covers the fundamentals of Bitcoin, including its definition as a digital cryptocurrency, its history, and key concepts such as keys, addresses, and wallets. It explains the process of Bitcoin mining, the Bitcoin protocol, and the importance of asymmetric cryptography in securing transactions. Additionally, it discusses the creation of Bitcoin addresses and the mathematical principles behind elliptic curve cryptography used in Bitcoin transactions.
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
3 views

Module2_Lect1_202425

The presentation covers the fundamentals of Bitcoin, including its definition as a digital cryptocurrency, its history, and key concepts such as keys, addresses, and wallets. It explains the process of Bitcoin mining, the Bitcoin protocol, and the importance of asymmetric cryptography in securing transactions. Additionally, it discusses the creation of Bitcoin addresses and the mathematical principles behind elliptic curve cryptography used in Bitcoin transactions.
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 23

The material in this presentation belongs to St. Francis Institute of Technology and is solely for educational purposes.

Distribution and modifications of the content is prohibited.

Blockchain
and DLT
(BLCH)
ITC801

Subject In-charge
Dr. Joanne Gomes
Professor Dept. of Information Technology SFIT
Room No. 316
email: [email protected]
Module 2
Lecture 1 and 2
Bitcoin

Topics:
• What is Bitcoin?
• The history of Bitcoin
• Bitcoin Concepts: keys, addresses and wallets
What is Bitcoin?
• Bitcoin is set of technologies to create Bitcoin ecosystem.

• Bitcoin is neither a physical coin nor digital coin, but it is digital crypto-currency that is totally
virtual and implied by transactions that transfer value from sender to receiver.

• It can be used to do just everything that conventional currency can do including buying-
selling goods, sending money to people.

• It can be purchased, sold and exchanged for other currencies at specialized currency
exchanges.

• Users of Bitcoin own keys that allow them to prove ownership of transactions in their Bitcoin
networks, to transfer and to spend.

• These keys are stored in a digital wallet.


Bitcoin Mining and Bitcoin Protocol
• Bitcoin is created through process of mining which involves solving mathematical problem.
• Bitcoin protocol includes built-in algorithms that regulates the process of mining.
• Every four years the protocol also halves the rate at which new bitcoins are created and
limits the total number of Bitcoins to a fixed total of 21 million coins by the year 2140.
• Bitcoin can not be inflated by printing new money.
Bitcoin Reward
• Bitcoin Halving
Digital Currencies Before Bitcoin
DigiCash
• Early digital currency projects were backed by
national currency and precious metals like gold.

• Cryptography was used to digitally sign digital assets


in order to answer two questions
– Can I trust that money is authentic and not counterfeit?
– Can I be sure no one else can claim the same money
that I own?

• Double spending and the counterfeiting issues were


solved by clearing all electronic transactions through
central authorities that have global view of currency in
circulation

• These currencies failed and were targeted by worried


governments.
History of Bitcoin
• Bitcoin was invented with publication of white paper titled “Bitcoin: A peer to peer Electronic Cash
System” written by Satoshi Nakamoto.

• He combined many prior inventions such as b-money and hash-cash to create completely decentralize
system without central authority.

• The largest transaction processed by the network is 150 million dollars transmitted instantly without any
fees.

• Satoshi Nakamoto withdrew from public in 2011 .. Since then group of volunteers carried forward the
work.
Using Bitcoin
• To use Bitcoin download desktop or web application
• There are many implementations of Bitcoin client software
– Full Client
– Lightweight Client
– Web Client
Asymmetric Keys
Bitcoin Concepts: keys
• Bitcoin is based on public key cryptography Receive Funds Sign transactions
• Ownership of bitcoin is established through digital
keys, bitcoin addresses, and digital signatures.

• The digital keys are independent of the bitcoin


protocol and are created and stored by users in a
file, or database, called a wallet without reference
to the blockchain or access to the internet.

Wallet
• Keys enables bitcoin, to have properties like
decentralized trust and control, ownership
attestation, & cryptographic-proof security model.

• Bitcoin transactions requires a valid digital


signature (witness) to be included in the
blockchain, which can only be generated with a
secret key; anyone with a copy of that key has
control of the bitcoin.
keys, Wallet, bitcoin address & Digital Sign
Bitcoin Address
Pair of Asymmetric Keys Bank account number and Secret pin

• Keys come in pairs: private (secret) & public key. Keys


Wallet-1
• Public key is like bank account number and the Bitcoin Address Wallet-2
private key as similar to the secret PIN, or sign on
a check, that provides control over the account
and proves ownership of an account

• These keys are managed by wallet software and


user rarely sees them.
Wallet-3
• In the payment portion of a bitcoin transaction,
the recipient’s public key is represented by its
digital fingerprint, called a bitcoin address, similar Bitcoin is implied by the Transaction
to the beneficiary's name on a check.
Key and Key Ring
• Bitcoin address is derived from
– public key or
– Script

Wallet Address & Bitcoin Address


Crypto-Wallet with Multiple Bitcoin Addresses
• A crypto-wallet is a collection of private keys that correspond to bitcoin addresses.
• The wallet is generally a text file on disk
Creating Bitcoin Address from public Key
• Creating one bitcoin account Private Key

secret PIN or bank account Beneficiary


sign number Name
Elliptic Curve
Multiplication

Public
Key
Hashing
&
Encoding

Bitcoin
Address
Why Use Asymmetric or Public key Cryptography?

• Asymmetric cryptography used in Bitcoin because it has ability to generate digital


signatures.

• There is a mathematical relationship between the public and the private key that allows
the private key to be used to generate signatures on messages.

• Through the presentation of the public key and signature, everyone in the bitcoin
network can verify and accept the transaction as valid, confirming that the person
transferring Mathematical
the bitcoin owned them at the
Relation time Way
& One of theFunction
transfer.
Private Key

• Private Key
– used to create signatures required to spend bitcoin by proving ownership of funds used in a transaction
– must remain secret at all times
– should be backed up and protected from accidental loss.

• The private key is generated by picking up a simple random number between 1 and 2256
(between 1 and n - 1, where n = 1.158 * 1077), in such a way that it should not be predictable or
repeatable. Example:

1E99423A4ED27608A15A2616A2B0E9E52CED330AC530EDCC32C8FFC6A526AEDD
Public Keys
• The public key is calculated from the
Private Key
private key using elliptic curve
multiplication, which is irreversible
K=k*G
where k is the private key, G is a
constant point called the
generator point, and K is the resulting Elliptic Curve
public key. Multiplication

• Because the generator point is always


the same for all bitcoin users, a private
key k multiplied with G will always
result in the same public key K.
Public Key
• Compressed and uncompressed Public
key
Elliptic Curve Cryptography
• Elliptic curve cryptography (ECC) is a type of asymmetric or
public key cryptography, evolved from Diffie Hellman,
based on the discrete logarithm problem as expressed by
addition and multiplication on the points of an elliptic curve.

• Elliptic curve is made up of the points satisfying the


equation: y²=x³ + ax + b.
– Any point on the curve can be mirrored over the x-axis and
the curve will stay the same.
– Any non-vertical line will intersect the curve in three places or
Point addition is the addition of two
fewer. points P and Q on an elliptic curve
to obtain another point R on the
same elliptic curve.
• In elliptic curve math, there is a point O called the “point at
infinity,” or “Zero Point” which roughly corresponds to the
role of zero in addition.
Elliptic Curve Cryptography
• In elliptic curve cryptography 0 is additive identity, 0 = -0
• Case-1: Point at infinity
– Adding identity to any point results in that other point,
– For any point P on the curve P + 0 = P
• Case-2: Point Negation
• Point negation is finding such a point, that adding it to itself will
result in point at infinity
• If P and Q have the same x values but different y values
– then the line passing through them will be vertical tangent line
P =(x, y), Q = (x, -y), then P + Q + 0 = 0 which means P = -Q
• Case-3: Point addition
• If two points P and Q on the elliptic curve have different x, y
coordinates,
– then draw a straight line between them and find third point of
intersection R which is also on the elliptic curve -R

P =(x1, y1), Q = (x2, y2), then P + Q + R = 0 which means P + Q = -R


Elliptic Curve Cryptography
• Case-4: Point doubling
• If two points P and Q on the elliptic curve have different x, y coordinates,
– P =(x1, y1), Q = (x2, y2), then P + Q + R = 0 which means P + Q = -R
-P
– If line is tangent to the curve at Q then R = Q, and P + Q + Q = 0 , -P =2Q
– if line is tangent to the curve at P the R = P and P – Q + P = 0, Q = 2P
• If here is only one point P and if line is tangent to the curve at P then
P + P + 0 = 0, 2P = 0, P = 0

Point of Infinity

• If P1 is the “point at infinity,” then P1 + P2 = P2.


• Similarly, if P2 is the point at infinity, then P1 + P2 = P1.
• This shows how the point at infinity plays the role of zero in addition
Diffie Hellman
• Pick up point at infinity G on the curve such that the
smallest value of n, for which nG = 0, be a very large
prime number. Example:
• Bob’s private key is a random number (dB) and the
Bob's public key (QB) will be: QB=dB×G
• Alice will do the same and generate her public key
(QA) from her private key (dA): QA=dA×G
• They then exchange their public keys.
• Alice will then use Bob's public key and her private
key to calculate: SharekeyAlice = dA×QB = dA×dB×G
• Bob will then use Alice's public key and his private
key to calculate : SharekeyBob = dB×QA = dB×dA×G
• The keys will thus match.
• The public key is calculated from the private key using
elliptic curve multiplication, which is irreversible:
• Public key, K = k * G, where k is the private key, G is
a constant point called the generator point,
Bitcoin Address

• Bitcoin address produced from public keys & consist of


a string of numbers & letters beginning with the digit “1”
A = RIPEMD160(SHA256(K))

• Shared with anyone who wants to send you money and it


appears in a transaction as the “recipient” of the funds.

• Bitcoin address is 160 bit (20 byte).


– Example:
1J7mdg5rbQyUHENYdx39WVWK7fsLpEoXZy
• Bitcoin addresses are encoded as “Base58Check” and a
checksum to help human readability, avoid ambiguity, &
protect against errors in address transcription and entry.
Base58Check Encoded Public Hash
Thank You

You might also like