Blockchain Presentation
Blockchain Presentation
Blockchain Presentation
The Future
History of Blockchain
Pre-Bitcoin Era
● 1991 : A cryptographically secured chain of blocks is described for the first time by Stuart
Haber and W Scott Stornetta
● 1998 : Computer scientist Nick Szabo works on ‘bit gold’, a decentralised digital currency
● 2000 : Stefan Konst publishes his theory of cryptographic secured chains, plus ideas for
implementation
Evolution of Blockchain: Phase 1 - Transactions
● The idea came from Dwork & Naor in 1992 to combat junk emails
● Some work to be done to send a valid email. The attacker would be discouraged to send
junk emails.
● Based on Hashcash PoW system, the miners need to give a PoW that they have done
some work before proposing a new block.
● So the attacker will be discouraged to propose anew block/make changes to the existing
blocks
PoW Contd..
Pow contd..
PoW PoS
● PAXOS-
Make a Proposal , Accept the value, Handling Failures.
● RAFT-
Nodes collectively selects a leader , others become followers
The Leader is responsible for state transition log replication across the followers.
● Byzantine Fault Tolerance (BFT)-
The valid nodes of a network can be guaranteed to agree on the timing and order of
set of transactions.
● Practical Byzantine Fault Tolerance (PBFT)-
It works in Asynchronous Environments.
2015 : Hyperledger
1. 51% Attacks
Computing power is quite crucial for gaining majority control over the Hashrate of a blockchain
through malicious entities. Therefore, compromised blockchains could result in the reversal of
transactions alongside double-spending. In 2018, three renowned cryptocurrency platforms
experienced issues from 51% attacks. The three platforms were Ethereum Classic, ZenCash, and
Verge. Furthermore, enterprises lost around $20 million dollar annually in recent times due to 51%
attacks.
If you have to avoid blockchain security issues due to 51% attacks, then you have to be careful about
certain measures. For example, you can improve monitoring of mining pools and ensure a higher
hashrate alongside refraining from the use of Proof-of-Work (PoW) consensus mechanisms.
51% attack
2. Blockchain Endpoint Vulnerabilities
Another notable instance of security risks in blockchain security explained properly refers to the
vulnerability of blockchain endpoints. The security of the blockchain is the talk of the town. However,
no one cares to address the concerns in the security of endpoints for blockchain transactions. For
example, Bitcoin investment or trading could result in a large amount of Bitcoin stored in a virtual
savings account.
The actual blocks are safe against hackers. On the other hand, the wallet accounts are not safe.
Furthermore, many third-party vendors are also important for facilitating blockchain transactions.
Some of these third-party vendors include blockchain payment platforms, payment processors, and
smart contracts. Such types of third-party blockchain vendors can increase vulnerability to hacking
due to weaker security in apps and websites.
3. Routing Attacks
The next prominent concern for security and privacy issues of blockchain technology refers to routing
attacks. Blockchain networks and applications depend on the massive volume of data transfer in real-
time. Now, hackers could easily intercept data during the course of its transmission to internet
service providers. The dangerous aspect of routing attacks in blockchain security lies in their
anonymity.
The blockchain participants could not find out the threat of routing attacks easily as everything
appears normal. Routing attacks are generally employed for leaking out confidential data or
extracting monetary benefits without alarming network participants. Therefore, it is quite clear that
routing attacks can be detrimental as they could impose considerable damage before detection.
TRANSACTIONS IN BLOCKCHAIN
A consensus mechanism and a reward system are required to maintain the integrity and
functionality of a blockchain. In the Bitcoin blockchain, consensus is achieved by ‘mining’, and
the reward system is a protocol awarding a miner some amount of Bitcoin upon successfully
mining a block. Mining is undertaken by powerful computers solving complex mathematical
puzzles.
Once a transaction verified, and accepted as true by the entire network, miners start working
on the next block.
History of Ethereum
# Initially described
# Formally described
→ It is used to pay for the computational resources and transaction fees on the Ethereum network
→ Apart from paying for transactions ,Ether is also used to buy gas, which is used to pay for computation
(Ether=T x Fees = Gas Limit * Gas Price)
→ Ether can be utilized for building decentralized applications, smart contract and making standard peer
to peer payments
Smart Contract
→ It contains the terms and conditions of a mutually agreed contract between the peers.
→ For the verification process,smart contract is carried out among anonymous parties of the
network without the need of a central authority.
→ It provides the transfer of any asset or currency in a transparent and trustworthy manner.
Traditional system of contract
Vs
Smart Contract
Agreement coded
Agreement in a program
Result is verified by
Third party for execution users of Ethereum
blockchain network
Once a contract is
Data tampering is possible executed ,it cannot
be tampered
Smart Contract Programming
Solidity is a language similar to JavaScript which allows you to develop contracts and
compile to EVM bytecode.It is currently the flagship language of Ethereum and the most
popular.
Serpent is language similar to Python which can be used to develop contracts and
compile to EVM bytecode.It is intended to be maximally clean and simple ,combing many
of the efficiency benefits of a low-level language with ease-of-use in programming
style,and at the same time adding special domain-specific features for contract
programming .Serpent is compiled using LLL.
Ethereum Architecture