You are on page 1of 4

f

Student Names:
Talent Mahlangu H190409H
Owen Shumba H190718H
Panashe Chaita H190840E
Gift Tandare H190833E
Deon Chawaguta H190650Y
Eric Shumba H190161M
Tanyaradzwa Kavumbura H190204J

Degree Program: B.Tech in Information Security and Assurance

Assignment Number: One

Lecturer: Mrs Gondo

Due Date: 27 March 2020


Security in Blockchain Cryptocurrencies
Deon Chawaguta, Gift Tandare, Talent Mahlangu, Panashe Chaita, Eric Shumba, Tanyaradzwa Kavumbura
Information Security and Assurance Department,
Harare Institute of Technology, P.O. Box BE277 Belvedere, Harare, Zimbabwe
Abstract— Blockchain cryptocurrencies have been gaining blockchain technology applies to the application of
prevalence for the last half decade and with this they present an cryptocurrency.
entirely novel means of interacting with money for both Technically speaking the system is not built on the transfer
businesses and the average consumer. In this report we discuss the
of physical value or any digital model of such tangible value,
benefits and potential drawbacks of this digital currency system
instead cryptocurrencies rely on vast records of transactions
from a security standpoint. We’ll mainly look at it with the
consumer or end user in mind and what it may entail for future to maintain the integrity of data relating to each individual
generations as adoption of the system increases. transaction. By design, a blockchain is resistant to
modification of the data. It is "an open, distributed ledger
that can record transactions between two parties efficiently
Keywords— Altcoin (Alternative Digital Currencies, and in a verifiable and permanent way. It operates on a
Mining, Blockchain, Psuedonymity, Ledger system of mutual distrust in the sense that every transaction
has to be validated by member of the aforementioned peer-
I. INTRODUCTION TO CRYPTOCURRENCIES
to-peer network.
Cryptocurrencies are a form of digital assets designed to This process of confirmation of transactions is critical to
function as a medium of exchange that uses strong cryptocurrency security since an unconfirmed transaction is
cryptography to secure financial transactions, control the pending and can be forged. Once it is confirmed it can no
creation of additional units, and verify the transfer of assets. longer be altered and is irreversible, and it’s place in the
The main feature of cryptocurrencies is that they are blockchain is immutable.
inherently decentralized meaning no governing body dictates In the process of recording these transactions a unique
the creation of new units of currency and as such the value of code called a hash is created and included in the block to be
cryptocurrency cannot be controlled by any single entity. added to the chain. These hash functions connect the blocks
together in a specific order.
II. HOW CRYPTOCURRENCIES WORK
This hash is created using a hash function which a
To understand how cryptocurrencies work we must look at mathematical function which takes digital information and
the unnderlying mechanism which causes all this to be produces a string of letter and numbers from it. Hash
possible. functions generate codes of fixed length regardless of what
When one wants to make a transaction with a size the input data is, for example, a hash function generated
cryptocurrency they following a sequence of steps. from the single word “Pie” will be the same length as one
created from all the works of Shakespeare combined.
1. They request said transaction Additionally any changes to the input would alter the hash
2. The requested transaction is broadcast to a Peer-to-Peer generated.
network consisting of computers known as nodes These hash functions work in such a way that to restore a
3. The Peer-to-peer network validates the transaction and previous record one has to recalculate the next has and so on
the user’s status using known algorithms and so on until they reach the block they want. Recalculating
4. Once the transaction is validated the transaction is all of that while not impossible would be incredibly difficult
combined with other transactions to create a new block of requiring vast amounts of computing power.
data for the ledger.
5. The transaction is then complete!
IV. WHAT MAKES CRYPTOCURRENCIES SO SECURE?
Are cryptocurrencies safe? Can cryptocurrencies be
hacked? These and other questions are on the minds of
traders, investors, supporters, opponents and regulators the
world over. Bottom line is that yes, a cryptocurrency can be
hacked. Let’s face it, it’s just another technological puzzle
that is attracting the attention of technogeeks and criminals
alike; sooner or later someone will figure out how to do it. Of
course, it’s already been done. Blockchains and
cryptocurrencies are attacked every day if for no other
reason than it’s possible. The real reason though is because
blockchains represent value and money and where there is
III. BLOCKCHAIN AND CRYPTOCURRENCY EXPLAINED
money there is motivation.
One of the most common questions brought up within The strength of a blockchain lies not in its ability to repel
conversations on cryptocurrency is how a currency can be attack because it can’t. The strength of a blockchain lies in
created out of nothing, and that is where the core of the redundant nature of the DLT, the distributed ledger
technology. It’s pretty easy for a black hat to hack into a
mining node and falsify a transaction. It’s hard for a black hat
to hack into every mining simultaneously and impossible to
do that and alter the enter blockchain up to that point and
believe me, that is what you’d have to do to fake a Bitcoin.
Blockchains are distributed ledgers. A ledger is a record of
transactions, a distributed ledger is one that is shared with a
community or the public in order for audit and verification.
The analogy that best sums up how a blockchain works is the
box of checks. Each check represents a transaction akin to a
Bitcoin or other altcoin exchange. As the number of
transactions and checks grows you will eventually fill a book
and then a box. The box is like a block in the blockchain. The
block is a set number of transactions that have been bundled
up and added to the chain.
Before the block can be added to the chain however it gets
distributed to all the mining nodes on the network. This is so
that they can each verify that the transactions contained
within the block are all valid. This audit means that each unit
of cryptocurrency can be traced back through the chain from
transaction to transaction to the very point it was mined. It
exists in every block from the point of its mining forward and
has been verified by the network. Each node on the network
is an independent operator and third party auditor, if even
one of them rejects a block – it is invalidated.

V. CONCLUSIONS
Cryptocurrencies while at the moment are still in their
infancy they stand to provide a wide range of Security
benefits for individuals, corporations and even institutions
such as governments. The future can only tell how far they’ll
go but they have almost infinite potential and utility.

ACKNOWLEDGMENT
We wish to acknowledge Deon and other contributors for
compiling this report.

REFERENCES
[1] https://blockgeeks.com/guides/what-is-
cryptocurrency/#What_is_cryptocurrency
[2] https://en.wikipedia.org/wiki/Cryptocurrency
[3] http://graphics.reuters.com/TECHNOLOGY-
BLOCKCHAIN/010070P11GN/index.html

You might also like