Unit 3 Cyprto
Unit 3 Cyprto
Bitcoin mining is the process of validating and adding new transactions to the Bitcoin
blockchain by solving complex mathematical puzzles. Miners use computational power to
solve these puzzles and are rewarded with new bitcoins and transaction fees.
6. Conclusion
Bitcoin mining is the backbone of the Bitcoin network, ensuring security, decentralization,
and transaction validation. However, it comes with challenges like high costs and energy
consumption. The mining industry continues to evolve with innovations such as energy-
efficient mining and new consensus mechanisms.
Here's a flowchart representing the Bitcoin Mining Process:
Start
↓
Collect Unverified Transactions
↓
Verify Transactions & Group into Block
↓
Attach Previous Block Hash & Set Mining Puzzle
↓
Miner Attempts to Solve the Puzzle
↓
┌───────────────────────────┐
│ Correct Hash Found? │
├───────────┬───────────────┤
│ No │ Yes │
↓ ↓ ↓
Retry with New Broadcast Block to Network
Nonce Value (Validation by Nodes)
↓ ↓
Continue Until Block Added to Blockchain
Solution is Found ↓
Reward Given to Miner
↓
End
Explanation of Flowchart
1. Start: Mining begins with unverified transactions.
2. Transaction Verification: Transactions are checked for validity.
3. Block Creation: A block is formed with valid transactions and linked to the previous
block.
4. Solving the Puzzle: Miners attempt to find the correct hash using trial and error.
5. Verification Check:
o If incorrect, miners adjust the nonce and retry.
o If correct, the block is broadcasted to the network for validation.
6. Block Addition: Once verified, the block is permanently added to the blockchain.
7. Reward Distribution: The successful miner gets Bitcoin rewards and transaction
fees.
8. End: The process repeats for the next block.
This flowchart visually represents how Bitcoin mining works step by step.
Proof of Work (PoW) vs. Proof of Burn (PoB) – Trade-offs and Suitability (16 Marks)
1. Introduction
• Consensus mechanisms are used in blockchain to validate transactions and maintain
security.
• Proof of Work (PoW) and Proof of Burn (PoB) are two such mechanisms with
different economic incentives and energy requirements.
• This answer compares their trade-offs in terms of energy consumption, network
security, and decentralization and determines which is more suitable for large-scale
blockchain networks.
4. Trade-off Comparison
Energy
High due to continuous mining. Low, as no hardware is required.
Consumption
6. Conclusion
• For highly secure and valuable blockchains, PoW remains superior despite its
high energy costs.
• For sustainable and decentralized blockchain ecosystems, PoB is a viable
alternative due to lower energy needs.
• The choice depends on network priorities:
o Security & Stability → PoW (e.g., Bitcoin)
o Sustainability & Decentralization → PoB (e.g., eco-friendly blockchains)
1. 51% Attack
What is it?
• A 51% attack occurs when a single miner or mining pool controls more than 50%
of the network’s hash power.
• This allows the attacker to manipulate the blockchain, enabling double spending and
blocking transactions.
Impact:
• Can reverse transactions, allowing the attacker to spend the same coins multiple
times (double-spending).
• Can prevent new transactions from being confirmed, disrupting the network.
• Damages the trust and value of the cryptocurrency.
Example:
• Bitcoin Gold (2018 & 2020): Attackers gained majority hash power and performed
double-spending, leading to millions in losses.
3. Sybil Attack
What is it?
• An attacker creates multiple fake identities (nodes) to take control of the network.
• In PoW, this attack is difficult but still possible if the attacker controls a large number
of nodes.
Impact:
• Can lead to 51% attacks if the attacker gains enough mining power.
• Spams the network, slowing down transaction validation.
• Reduces decentralization by giving the attacker undue influence.
4. Finney Attack
What is it?
• A miner pre-mines a transaction into a block but does not broadcast it
immediately.
• The attacker then spends the same coins in a new transaction before releasing the
pre-mined block.
Impact:
• Similar to a double-spending attack but requires the attacker to be a miner.
• Merchants accepting transactions with 0 confirmations are vulnerable.
• Can be prevented by waiting for multiple confirmations before accepting
payments.
5. Timejacking Attack
What is it?
• The attacker manipulates the network time by tricking nodes into accepting an
incorrect timestamp.
• This causes nodes to accept blocks that should have been invalid.
Impact:
• Can lead to double-spending or reorganization of the blockchain.
• Reduces network reliability by creating inconsistencies in block timing.
6. Eclipse Attack
What is it?
• The attacker isolates a specific node by controlling its peer connections, preventing it
from seeing the real blockchain.
Impact:
• The isolated node sees a different version of the blockchain and may accept fake
transactions.
• Used as a setup for larger attacks like 51% attacks or double spending.
7. Long-Range Attack
What is it?
• This attack targets PoW blockchains where an attacker tries to rewrite a very old
portion of the blockchain by creating an alternative chain that overtakes the main
chain.
• Unlike a 51% attack, which happens in real-time, a long-range attack involves deep-
chain reorganization.
Impact:
• Can allow double-spending over a long period, leading to major security risks.
• Can make older transactions invalid if an attacker successfully re-writes history.
• Affects lightweight nodes more than full nodes because they do not store the full
blockchain history.
Example & Prevention:
• Ethereum (before PoS upgrade) had concerns about long-range attacks.
• Checkpoints & Finality Rules: Blockchains use finality checkpoints to prevent old
block modifications.
Despite these attacks, PoW remains a strong security model, but improvements are
necessary to enhance long-term resilience.