Block Chain
Block Chain
Block Chain
Databases
Blockchain branding).
History of
Developer(s) working under the pseudonym Satoshi Nakamoto release a white paper establishing
the model for a
blockchain
Blockchain
2009
Nakamoto implements the first blockchain as the public ledger for transactions made using
bitcoin
2014
Blockchain technology is separated from the currency and its potential for other financial, inter-
organisational
transactions is explored. Blockchain 2.0 is born, referring to applications beyond currency
The Ethereum blockchain system introduces computer programs into the blocks, representing
financial instruments
such as bonds. These become known as smart contracts.
Blockchain is a technology where
multiple parties involved in
communication can perform
different transactions without third-
Blockchain party intervention.
Architecture
Verification and validation of these
transactions are carried out by
special kinds of nodes.
Contd..
Components
1. Header: It is used to identify the particular block in the entire
blockchain. It handles all blocks in the blockchain. A block header
is hashed periodically by miners by changing the nonce value as
part of normal mining activity, also Three sets of block metadata
5. Merkel Root: It is a type of data structure frame of different blocks of data. A Merkle Tree stores all
the transactions in a block by producing a digital fingerprint of the entire transaction. It allows the users to
verify whether a transaction can be included in a block or not.
Decentralization: In centralized transaction
systems, each transaction needs to be validated in
the central trusted agency (e.g., the central bank),
naturally resulting in cost and the performance
jam at the central servers.
Key
Characteristics Persistency: Transactions can be validated
quickly and invalid transactions would not be
of Blockchain admitted by persons or miners who mining the
crypto. It is not possible to delete or roll back
Architecture transactions once they are included in the
blockchain network. Invalid transactions do not
carry forward further.
Transparency: The transparency of blockchain is like cryptocurrency, in bitcoin for tracking every transaction is done by
the address. And for security, it hides the person’s identity between and after the transaction. All the transactions are made by
the owner of the block associated with the address, this process is transparent and there is no loss for anyone who is involved
in this transaction.
Cryptography: The blockchain concept is fully based on security and for that, all the blocks on the blockchain network
want to be secure. And for security, it implements cryptography and secures the data using the cipher text and ciphers.
Types of Blockchain Networks
Transactions are anonymous Transactions are anonymous Transactions are not anonymous Transactions are not anonymous
and transparent. and not read transparent. and are read transparent. and not transparent.
Truly democratic: full equity. Full write equity. Full read equity. Restricted.
Open and decentralized. Open and controlled. Restricted. Closed and restricted.
(Cryptocurrency)
Blockchain 1.0 or Blockchain Version 1.0 aimed to introduce a
– transparent, publicly accessible, completely decentralised, immutable
ledger and distributed system of transactions in the global financial
market.
BlockChain
BlockChain is not just limited to Cryptocurrencies but it will extend
up to Smart Contracts.
2.0 ( Smart Thus, Small Contracts are small Computer’s which live in the Chains
of Blocks. These small Computer’s are free computer programs that
executed automatically, and check the condition defined earlier like
Consistency,
Availability and
Partition Tolerance
Decentralization
A centralized structure implies control of the
central entity by people who have the power to
manage, control and oversee it.
IBM Hyperledger
Ethereum R3 Corda
Blockchain Fabric
ConsenSys
Tezos EOSIO Stellar
Quorum
Consensus Algorithm in
Blockchain
In blockchain, where recorded data
is stored, managed and distributed
across several computers in a peer-
to-peer network scattered across the
Why is it globe, there needs to be a way to
required? resolve disputes when participants in
the network disagree.
A consensus mechanism is a protocol that
brings all nodes of a distributed blockchain
network into agreement on a single data set.
Users that fail to adhere to consensus are often banned from a network.
In the event a node wanted to challenge the record, they would have to request a
network-wide recall.
If more than two thirds of their peer nodes approve, then the transaction is
confirmed, distributed and permanently written into the blockchain.
“Without consensus, I
could spend money in one
place and then spend that
same money again before
the first transaction
settles.”
Types of Blockchain platforms have written
Consensus and rewritten the rules of consensus
Mechanisms in their search for the holy grail — a
perfect equilibrium of
decentralization, scalability and
security.
PROOF OF WORK
PROOF OF STAKE
DELEGATED PROOF OF
STAKE
PROOF OF AUTHORITY
Contd… PROOF OF HISTORY
Proof of work depends on an army of miners, or
validators, to verify transactions through solving
arbitrary mathematical problems in the race for a
block prize.
PROOF OF Essentially, the energy-intensive process hires a
network of specialized computers to solve for x,
WORK with x being a 64-digit hexadecimal number, known
as a hash, which is encoded by cryptography.
Crypto mining, the block generative process
described above that can reap thousands in rewards
in the form of new crypto tokens, is a popular use
case for proof-of-work systems.
In this approach to determining consensus, network participants cast votes via staking
pools for their favored delegate, those who are presumed to be best equipped to protect the
network, based on reputation.
As a result, validating privileges are reserved and awarded at random only to a team of top
tier candidates.
At any point in time, a validator can be surpassed by someone deemed more trustworthy.
Examples: Xodex, JP Morgan (JPMCoin), VeChain (VET) and Ethereum Kovan testnet
During the verification process, timestamps are
embedded into the hash of each generated block,
chronicling a network’s transaction history in a
PROOF OF singular, unbroken chain.
A hash function turns an input (for example text) into a string of bytes with a fixed length and structure. The
output or value created is called a ‘hash value’ or ‘checksum.’ Any hash value created from data using a specific
hashing algorithm is always the same length and one-way - it cannot be reversed.
Purpose of Hash Functions originated from the
Hash need to make content uniform in
Functions length on one hand, and for usage as
singularly unique identifiers on the
other.
Properties of Hash Functions
Although the property is very general, it is really important only in Bitcoin mining.
Here is the formal technical definition of the puzzle friendliness property.
In the above definition, the distribution has high min-entropy means that the
distribution from which k is chosen is hugely distributed so that choosing some
particular random value from the distribution has only a negligible probability.
Cryptography is the process of hiding or
coding information so that only the
Cryptography person a message was intended for can
read it.
Encryption is a way of scrambling data so that
only authorized parties can understand the
Encryption information. In technical terms, it is the
process of converting human-readable
plaintext to incomprehensible text, also known
as ciphertext.
The conversion of encrypted data into its
original form is called Decryption. It is
generally a reverse process of encryption. It
Decryption decodes the encrypted information so that an
authorized user can only decrypt the data
because decryption requires a secret key or
password.
Types of Cryptographic Algorithms
• A Bitcoin fell under the scope of cryptocurrency and became the first and most valuable among
them. It is commonly called decentralized digital currency.
• A bitcoin is a type of digital assets which can be bought, sold, and transfer between the two
parties securely over the internet.
• When you send bitcoin to someone or used bitcoin to buy anything, you don?t need to use a
bank, a credit card, or any other third-party.
• Instead, you can simply send bitcoin directly to another party over the internet with securely
and almost instantly.
How Bitcoin
Works?
DigiCash
Whenever you want to transfer money to
someone over the internet, you need to use a
service of third-party such as banks, a credit card,
a PayPal, or some other type of money transfer
services.
It identifies what the rules of a valid bitcoin, who can be inside bitcoin,
who cannot be inside bitcoin, what is valid, what is not, etc.
• Without cryptography, Bitcoin would simply not be possible. So, we've got that
this software uses cryptography to control the transfer of bitcoin over the internet.
Problem
But with time it was later realized that those
central parties, how much-ever qualified were
still not completely trustworthy as it was so
simple for them to manipulate the data.
Contd..
Centralized systems do not address the Byzantine Generals problem,
which requires that truth be verified in an explicitly transparent way, yet
centralized systems give no transparency, increasing the likelihood of
data corruption.
They forgo transparency in order to attain efficiency easily and prefer to
avoid dealing with the issue entirely.
The fundamental issue of centralized systems, however, is that they are
open to corruption by the central authority, which implies that the data
can be manipulated by anyone who has control of the database itself
because the centralized system concentrates all power on one central
decision maker.
Therefore, Bitcoin was invented to make the system of money decentralized using
blockchain to make money verifiable, counterfeit-resistant, trustless, and separate
from a central agency.
• In the Byzantine Generals Problem, the untampered agreement that
all the loyal generals need to agree to is the blockchain.
• Blockchain is a public, distributed ledger that contains the records
How Bitcoin of all transactions.
• If all users of the Bitcoin network, known as nodes, could agree on
Solves the which transactions occurred and in what order, they could verify
the ownership and create a functioning, trustless money system
Byzantine without the need for a centralized authority.
General’s
Due to its decentralized nature, blockchain relies heavily on a
Problem? consensus technique to validate transactions. It is a peer-to-peer
network that offers its users transparency as well as trust. Its
distributed ledger is what sets it apart from other systems.
Blockchain technology can be applied to any system that requires
proper verification.
Byzantine Fault Tolerance (BFT)
• The Byzantine Fault Tolerance was developed as inspiration in order
to address the Byzantine General’s Problem. The Byzantine General’s
Problem, a logical thought experiment where multiple generals must
attack a city, is where the idea for BFT originated.
• Byzantine Fault Tolerance is one of the core characteristics of
developing trustworthy blockchain rules or features is tolerance.
• When two-thirds of the network can agree or reach a consensus and
the system still continues to operate properly, it is said to have BFT.
• Blockchain networks’ most popular consensus protocols, such as
proof-of-work, proof-of-stake, and proof-of-authority, all have some
BFT characteristics.
• In order to create a decentralized network, the BFT is essential.
Cryptocurrencies are digital tokens. They are a
type of digital currency that allows people to
Cryptocurrencies make payments directly to each other through
an online system. Cryptocurrencies have no
legislated or intrinsic value; they are simply
worth what people are willing to pay for them
in the market.
How Does a Cryptocurrency Transaction
Work?
Means of payment Accepted by a small number of retailers Universally accepted, legal tender
Store of value Tend to be volatile, depends on market price Stable, consistent with central bank price stability
mandate
Unit of account Own unit of account Flat Currency (e.g. Indian Rupee)
Transaction verification Typically a large number of competing entities Small number of trusted entities
• Crypto wallets store your private keys,
allowing you to store your crypto safely
while keeping it accessible. You can send and
receive currencies like Bitcoin, Ethereum,
What is a Doge, etc. Crypto wallets could be in the
form of a Ledger (similar to a USB drive) or
crypto a mobile app.
wallet?
• Unlike normal cash wallets, you don’t
technically store your crypto coins within
your wallet. It is more like a key or code
used to access your crypto holdings on the
blockchain.
Anonymous crypto wallets allow users to sell
and trade using their wallets without
revealing private information about the users
What is an or transactions made.
anonymous It is also referred to as a dark crypto wallet or
a stealth crypto wallet.
crypto Most users prefer anonymous crypto wallets
wallet? that do not require any private user
information to be added. Some anonymous
crypto wallets offer IP address obfuscation and
VPN masking support.
Wallets in the Market
Ledger
Zengo Uphold
Nano X
Ledger Prime
Electrum
Nano S XBT
• Lack of Understanding of What
Cryptocurrency is and How it
Works
• Volatility
Challenges of • Lack of Regulatory Frameworks
Cryptocurrency • Uncertainty Regarding Taxation
• Security Risks
• Scalability Issues
• Lack of Merchant Adoption
• Network Congestion
What is expected?