Browse Source

first draft

Karathan 5 years ago
parent
commit
12b314d392

+ 33
- 0
bitcoin-prediction.md View File

@@ -0,0 +1,33 @@
1
+# Notefile for the future predictions of the Bitcoin/Blockchain TA Project (WS 18/19)
2
+
3
+Those are just some collected thoughts I came accross while reading the paper (Note the different headings...) - We should definitely talk about those together once more.
4
+
5
+## Disk Space
6
+
7
+The author of Bitcoin already noticed, that this will someday be a huge issue, because, in order to sustain the chain of trust, and chain of custody, the whole blockchain has to be stored across every participating node. In order to somewhat compensate this, the specification allows for old transactions to be removed from the network, without losing the integrity. This is done so using Merkle Trees (See <[1]> chapter seven and references for more information)
8
+
9
+Still, the chain will grow, block headers must be saved in order to preserve integrity (About 80 bytes per block) which may become a problem iff the technology sets foot. A possible solution attempt would be to cut of parts of the blockchain, and only use archived strips in order to keep verifying the integrity of the chain. Those archived versions would need to be stored at multiple locations, so instead of a central authority we would have again a decentralized version, just with less nodes, therefore requireing less space. (E.g. each state stores its copy of the archived blockchain)
10
+
11
+It is also possible to check the integrity of a transaction without running a full-blown network node, by just obtaining a copy of all the block headers from the bitcoin network. He/She can then verify, that the transaction was accepted by a (hopefully trustworthy) node, and confirm this by seeing, that all further nodes were also accepted by the network.
12
+
13
+## Privacy
14
+
15
+Currently we trust authorities to keep our bank information in secret. Without trust into a central authority, we only have the network, and furthermore, we have to make each and every transaction publicly available for the whole contraption to work. Privacy is gone!
16
+
17
+The paper states that, in order to reclaim the privacy one would have to break the chain of information at another place, and since every participant is identified by his public key, we could anonymize the public keys, in order to preserve privacy. (See figure \ref{ref:privacy})
18
+
19
+The problem, in a large scale, is, that once a public key can be linked to a real identity (i.e. a person or an organization/government) you could essentially follow the chain of custody up to its root and know every transaction taking, as well as have the currency balance of said identity. On the one hand this might add transparency into the transactions of governments, on the otherhand, if used on the public, would essentially lay the foundation for financial mass surveilance.
20
+
21
+![Standard vs. Bitcoin privacy models\label{ref:privacy}](image/bitcoin-privacy.png)
22
+
23
+\pagebreak
24
+
25
+## Power
26
+
27
+The proof of work costs a lot of computational resources. Currently that results in prices for Graphical Processing units rising, as well as opening a market for blockchain-specific mining ASICs (Application-specific integrated circuit) - It is, however also a problem for the power grid. Already the bitcoin network alone costs around 53.29TWh a year. <[1] as of Nov 27, 2018> Iff used on a global scale, those numbers will rise, and we need to find ways to circumvent the large power-consumption.
28
+
29
+## Digital Grid
30
+
31
+We discussed that we would just assume that the foundations for our scenarios would be given at time, but I just wanted to mention that iff one of our non-trivial scenarios happens, it has to be clear, that all participating parties need a stable connection to the currency network, which for simplycity shall be the internet, in some form. (Be it global players and governments, or actually every person inhabiting the planet!)
32
+
33
+[1]: https://digiconomist.net/bitcoin-energy-consumption

BIN
bitcoin-prediction.pdf View File


+ 88
- 0
bitcoin-technical.md View File

@@ -0,0 +1,88 @@
1
+# Notefile for the technical background of the Bitcoin/Blockchain TA Project (WS 18/19)
2
+
3
+Note: The information presented here is specifically for the Bitcoin Blockchain technology, as well as some general terms from computer science. The source for any bitcoin related stuff is the original whitepaper: [Satoshi Nakamoto - Bitcoin: A Peer-to-Peer Electronic Cash System](https://bitcoin.org/bitcoin.pdf) - Please also note that Satosho Nakamoto is most likely a pseudonym, nevertheless, the paper is the exact specification for the technology, and therefore relevant!
4
+
5
+## A few terms important to understand the technology
6
+
7
+### (Cryptographic) Hash <[1]>
8
+
9
+A hash function is basically a function, in mathematical terms, i.e. it translate a set of inputs into a set of outputs. For example, the mathematical modulo (division with rest classes) would be a hash function. In order to do cryptographic stuff, we need the hash functions to fulfill certain properties. We call those functions cryptographic hash functions, respectively:
10
+
11
+ * It is deterministic: The same message always will result in the same hash
12
+ * It is relatively quick to compute the hash value for a single message.
13
+ * It is infeasable to generate a message from its hash value except by trying all possible messages (brute force)
14
+ * It is chaotic: A small change to the input message should change the hash value so extensively, that the new hash value appears uncorrelated with the old hash value
15
+ * Collision resistant: It is infeasable to find two different messages with the same hash value.
16
+
17
+ For all we understand, hash functions are surjective, in a mathematical sense, but in reality we don't know, just because of the properties given, it is infeasable to find a message that has a very specific hash. See figure \ref{ref:hash} for an example visualization of the SHA-1 function, a cryptographic hash function. Other viable crypto hashes include: The SHA family (Secure Hash Algorithm) - whereas SHA-3("Keccak") is the most recent one, and one should avoid using SHA-1, since some flaws have been found, that made it easier to find collisions in the algorithm.
18
+
19
+![Hash function in action: SHA-1 to be specific\label{ref:hash}](image/hash-example.png)
20
+
21
+\pagebreak
22
+
23
+### Symmetric Encryption
24
+
25
+Symmetric encryption, is a type of data/text encryption, that makes use of a Symmetric-key algorithm <[2]>, very easy historic examples include: Caesar (Where the key is just the amount of letters you shift your message around the alphabet) or Vigenére <[3]>, but those are vulnerable to a few very basic attacks. Mainly those legacy encryptions are vulnerable to so-called known-plaintext attacks. If you can decrypt single messages, or parts of it, you can recover the key used to encrypt other messages. This is also the reason why Alan Turing was able to crack the Enigma machine <[4]>, used the WW2 Wehrmacht to encrypt their messages. (Common messages always included a small summary of the daily weather, as well as the common salute to the Nazi Führer Adolf Hitler). See figure \ref{ref:symkey} for a basic illustration.
26
+
27
+Another important property, that goes for every primitive security related function (Hash functions as well as (a)symmetric key encryptions), is, that security through obscurity is not an option. That means, the "how to do stuff" should always be publicly available, and encryption functions should not rely on secrecy in the algorithm itself, but rather on mathematically difficult problems. (NP-Hard <[5]> ones to be exact)
28
+
29
+The most common symmetric encryption algorithm currently is AES <[6]>, the advanced encryption standard. For the sake of simplicity, let's just assume, it is secure and fulfills all the properties required.
30
+
31
+\pagebreak
32
+
33
+![Symmetric Key Encryption\label{ref:symkey}](image/symm-key-example.png)
34
+
35
+### Asymmetric Encryption
36
+
37
+Whereas with symmetric key encryption uses a single key to do its deeds, asymmetric encryption relies on a key-pair <[7]>. The idea is, that everyone owns two keys, a public one, shared with the world, and a private one, kept in secret. The public one can be used for encryption, but not decryption. Messages can only be decrypted using the corresponding private key. So you can send messages using one's, which the receiver can then decrypt with his/her own key. In addition, data can be signed with the private key, and later this signature can be verified with a public key. Without going too much into detail, how all of that works, you can see a visualisation on figure \ref{ref:pkey-encrypt} (Encryption) and figure \ref{ref:pkey-sign} (Signation)
38
+
39
+Common algorithms used today are: RSA (based on large prime numbers) and ECC (based on elliptic curves) - Both rely on NP-Hard Problems, namely the factorization of prime numbers, and the ability to find discrete logarithms in the group of points of an elliptic curve (Which is not that hard for all curves, so not all curves can be used for ECC!)
40
+
41
+\pagebreak
42
+
43
+![Public Key Encryption\label{ref:pkey-encrypt}](image/asymm-key-encrypt.png)
44
+
45
+![Public Key Signing\label{ref:pkey-sign}](image/asymm-key-sign.png)
46
+
47
+\pagebreak
48
+
49
+## Bitcoin basics
50
+
51
+This section is to elaborate a few of the basic concepts we already discussed.
52
+
53
+### Transactions
54
+
55
+As we are talking about bitcoin mainly as a currency (And are therefore ignoring the other implications of blockchain technology, good or bad, because they would more than just blow the boundaries) - Here is how basic transactions work:
56
+
57
+A digital currency is defined as a list of transactions, and in this case, a list of digital signatures. A transaction is made by signing a hash of the previous transaction, and the public key of the next owner. This "block" is added to the end of the currency ("Blockchain") Now a payee can verify the signatures in order to verify the chain of ownership.
58
+
59
+It is now very hard, without central authority, to verify that a spender actually owned the currency, before taking a transaction. We already established a chain of ownership, but we also need to save the time of transaction. For this, we use a technology called timestamp server. That is, a service that spits out hashed, unfakeable timestamps of the current date. (Kind of like holding a newspaper in a fotograph, in order to prove you shot it at a given day, but far more accurate) The basic point is: You have some kind of data, which you could not possibly have gotten your hands on, at a point in time, before stated. See figure \ref{ref:btc-chain} for a visualization.
60
+
61
+#### Proof of Work
62
+
63
+In order to implement a distributed timestamp service (Remember: We don't want central authority, at all!) a proof-of-work is used. Each block contains a number, called Nonce (Short for number only used once!) which can be increased, until the hash of the block starts, or ends with a required set of fixed zero bits (Or any fixed number, though the implementation requires zeroes)
64
+
65
+This also solves the problem of voting for which block to attach to the chain, because the majority is just determined by the group of nodes with the longest chain (i.e. they put the most effort in) - As long as the majority of the processing power is controlled by honest nodes, this will be fine, since frauding the chain will require to redo all of the proof-of-work challenges before, in order to restore the chain of trust, which is just not possible (alone that is!) See figure \ref{ref:btc-hash} for a visualization.
66
+
67
+\pagebreak
68
+
69
+#### Incentive
70
+
71
+"By convention, the first transaction in a block is a special transaction that starts a new coin owned by the creator of the block. This adds an incentive for nodes to support the network, and provides a way to initially distribute coins into circulation, since there is no central authority to issue them."
72
+
73
+This is often compared with how gold mining works, and it is true, because the bitcoin network regulates itself in the difficulty of solving the proof-of-work challenges:
74
+
75
+"To compensate for increasing hardware speed and varying interest in running nodes over time, the proof-of-work difficulty is determined by a moving average targeting an average number of blocks per hour. If they're generated too fast, the difficulty increases."
76
+
77
+![Visualization of the blockchain\label{ref:btc-chain}](image/bitcoin-chain.png)
78
+
79
+![Visualization of a blockchain transaction header\label{ref:btc-hash}](image/bitcoin-hash.png)
80
+
81
+
82
+[1]: https://en.wikipedia.org/wiki/Cryptographic_hash_function
83
+[2]: https://en.wikipedia.org/wiki/Symmetric-key_algorithm
84
+[3]: https://en.wikipedia.org/wiki/Vigen%C3%A8re_cipher
85
+[4]: https://en.wikipedia.org/wiki/Enigma_machine
86
+[5]: https://en.wikipedia.org/wiki/NP-hardness
87
+[6]: https://de.wikipedia.org/wiki/Advanced_Encryption_Standard
88
+[7]: https://en.wikipedia.org/wiki/Public-key_cryptography

BIN
bitcoin-technical.pdf View File


+ 2
- 0
build.sh View File

@@ -0,0 +1,2 @@
1
+#!/bin/sh
2
+pandoc -o bitcoin-technical.pdf bitcoin-technical.md && pandoc -o bitcoin-prediction.pdf bitcoin-prediction.md

BIN
image/asymm-key-encrypt.png View File


BIN
image/asymm-key-sign.png View File


BIN
image/bitcoin-chain.png View File


BIN
image/bitcoin-hash.png View File


BIN
image/bitcoin-privacy.png View File


BIN
image/hash-example.png View File


BIN
image/symm-key-example.png View File


+ 4
- 0
show.sh View File

@@ -0,0 +1,4 @@
1
+#!/bin/sh
2
+sh ./build.sh
3
+xdg-open bitcoin-technical.pdf
4
+xdg-open bitcoin-prediction.pdf