Professional Documents
Culture Documents
Technologies Course
Lecture 3
Cryptography & Blockchain Basics
Prof. Tumennast Erdenebold
Spring 2022
Disclaimer:
❑ Part 1: Cryptography
❑ About Cryptography
❑ Encryption & Decryption
❑ Public Key Cryptography
❑ PGP, Lab Demo
❑ Hashing
❑ Digital Signature
❑ Part 2: Blockchain
❑ Hype cycle
❑ Blockchain Evolution
❑ Different Networks
❑ Ledger
❑ Brief overview
❑ How it works
Image Source: [4] 3
Part 1: Cryptography
About Cryptography
5
Source [1, 2]
About Cryptography
6
Source [2]
About Cryptography
Example:
7
Source [2, 3]
About Cryptography
Also, protects data that travels over internet.
8
Source [2, 5]
About Cryptography
Example: https -> Stands for secure
9
Source [6]
Encryption and Decryption
❑Encryption
❑Converting human readable Plaintext to Cyphertext
❑Decryption
❑Converting coded Cyphertext to Plaintext human
readable
Snoopers can’t
understand it 10
Source [2], Image Source: [7]
Encryption and Decryption
Example:
Symmetric encryption
(Same key)
Sender: A Receiver: B
Encrypt Decrypt
11
Public Key Cryptography
Example:
Asymmetric cypher
(Different keys)
Sender: A Receiver: B
Encrypt Decrypt
12
Public Key Cryptography: PGP
One Scheme: PGP – Pretty Good Privacy (1990s)
Sender: A Receiver: B
xm8EYFK+kBMFK4EEACIDAwQMtmrELqrSan/92RfjPMJ9vwdLt8mnuM/Z4QswtHddIEAl5Z8QrzUOHVtCiCdhvhIzz6f7qY5
g9v81R9spUczPYN6i2vV2iAyRJ8+tzyGwd52F86kcD/hrtqvrMi3zcP/NE2Zzc2QgPGZzZEBmZHNmLmNvbT7CkgQTEwoAGg
UCYFK+kAIbLwMLCQcDFQoIAh4BAheAAhkBAAoJEDxhHOtdRSd0x0wBfiwDQZZ1zEH06qaQNiZ5GbazkY6gvOcrN8ROVPZ
XKiV5E0k1LJcs/MqD3uTAW6kErgF/XsjxOqH0Kq2vZITdtUJh5VVkKGt8FHPTR0M66DOkhBt6M+LxwzLbnN+E2y7l6AJxzlIEY
FK+kBMIKoZIzj0DAQcCAwQQA1xzrIQ+1jLFBpNFBbYM4pn5Tz3Yixx0XZ3XtUsANrA5buDLFYeWYBJqkJRBkqbIH6Ccq2y2w
RnMB7NTCsSdwsAnBBgTCgAPBQJgUr6QBQkPCZwAAhsuAGoJEDxhHOtdRSd0XyAEGRMKAAYFAmBSvpAACgkQTvR0eCO
qr3x8kQEAzNEtQScwq4Ac07iTRKGSRnavRD/bCedqUR54rfFMunwBAL2uhBJzQCNRLe9F8NMIUyG/tFnrB/cwx2pP28+5o
RcsK2YBgN15i5ZxRuma7ChkqxpL4WvNp8/JIvLBA74+tcZl3GDWvvpVKOtZ3U+5HFJVJV721gGA7+RDP5hmrRe5jMGeS2Lg
Yzouq+8PQLl7eiEoHGc1FY7Fj6I14ivMJ5Sq1wj1/6qwzlIEYFK+kBMIKoZIzj0DAQcCAwQQkvWwgfbu6lHZWHlxV++RwC2f3
qSuWsEW6ICr0NLLB3EjQg5lcONU8QeN3kT3jPxUNrru8NXg+W65g5uVcTm9wsAnBBgTCgAPBQJgUr6QBQkPCZwAAhsuA
GoJEDxhHOtdRSd0XyAEGRMKAAYFAmBSvpAACgkQWDl5PqUYq8SsTQD/RUDHeuRuEbzJVjw44bLd5antOfJmd4ccXzdt/jL
kA0UBAKy92Dfmd9XbmjD8yF7nEvIoETPfpExRSi8a0iDRpoliadEBfRhDUYhKPUdWiIh7YMzSndoUZVboOQXNGtVJuOB2Ay
uUIo5GsUGT9bggfg0Fit9qPAF9EOX+KoYETYO8ShMoyV/LDO4nSiuNwnv60DskNWtS3Ewxn0Xhtrd1VjUg
DLn9D6sJ
=MiU+
-----END PGP PUBLIC KEY BLOCK-----
Public Key Cryptography: PGP
PGP: Private Key Example
-----BEGIN PGP PRIVATE KEY BLOCK-----
Version: Keybase OpenPGP v2.0.9
Comment:https://keybase.io/crypto
xcFGBGBSupUBBADHsUH/iSSFk2QL4ZARG6cJ3wswLs48bgk32gGr0uWx2AUEaS/FoE+NhAdiOP8JfQbpsm1lIUvWHeus4t5GItG4qORCXZwErePYsmupr9on2+Ymjw
Yq6WAuWns3ph45KmQV74k4Um9J5Zw9QbZtzFjO6BTWJsOFWwL0AQzWGSW92wARAQAB/gkDCAWxeIHkSd78YG147S2x4bbqhxsk9Cq6MLIOuEg97lA649QiVp
ioXvvjoocQideHX+BDdVF8ZuTctiEYRORPplKEA8hbvWj3QEU1uwfN4BlR0bkNVq2WU88TXZybpl2KQBw7vXVWezyzUF3ZuecsVuej01rMm5VW/8LagX7PJ9zNdTuX
BfUeWVpdXcvZNhEFcxKpbD5UCydeJOEu320jbV44Pd5RsqtygXp20j92lB2avKT05ZfIzI/LrL8mGIIFHIOumWx1fX5SFR2J3AJIH+tigBFUNZjzJb4qRmvny0Gllz3yViG4F
C8AFOGcoUKvkFXXV/N7JXrhLzw+Ji+VYh3cAV7dDd2hGbz4mN5Gsbh6gRl7ZTuHdqSmuquk4s1fnJs6IcFtEnapo5EmU0MbCoC8DCJ4oyi/Z0L3/jQ+I+mU5j/0NP7jcK
wZyCkjv0xtoCpANbHUSq2FO+pA0EFoLpZ6Op/48+cerqUAkLzzF78rlj0xQnXNIVR1bWVubmFzdCA8dHVtZW5uYXN0MjFAZ21haWwuY29tPsKwBBMBCgAaBQJgUr
qVAhsvAwsJBwMVCggCHgECF4ACGQEACgkQW5OpZsxDeUzfNwP/ZcUyRGaGCA8s78T9BsdMlJb75usvmKcyOc75E7eHVO2AiOikkSwkc3QwBpvQETwntvwBcloU
8irKDDxwi9P4sQb7QMj+2l2lITmUHRKaB0ocIIBrA8/GRcHfmjF/86c3GzfeUbFN4wBHMkgHdHaGQahlXtQCfNekL54xhBMB/BfHwUYEYFK6lQEEALXtdxqhMAxU316
YMiKcsPFRa5jM3PRXZLd45XtQAGopsL4dS9/z1aVVPwNNMloOLnrrzVopehS862JCdqfaOZTYH+i/yJF4AFwGxSY/Z6uSAvfxEqzuelcESB4UCHlz1/JdECfTJYk9WOatOk
yW5DJIxHVwZ0wwKED2ARmqlbKfABEBAAH+CQMIKDXcMkcnWG5gB4k9N2faDQ6iPiMoEiwIDB/Lnbh5nQm74SPOvH+pmzJfhFxNWGXgekK5qZBs6TvpG4xrtk0O
tZUC0IWqQbSQ32JW63Vl4oZCStbLmCp+iKPTCfN8w13YNKcz5LLeRFUqLnpl7jOIhQvoMuC9m5dxmLOc6VMWcXdE/8QNqipaW2XMX2Vsca1HBnOjUulbFBsGaTW
VAl84TmKG9cSvkXvjAqDwUepTAdP7r93PA3Ozuib8Ba7H3esR5HSVlu7AlYzualYsGkIS6yajPWbL8l2bNQ1UDBfDQI98mIGTx5HWQSsGF4f5C1AqEnVcLzKS0D45+e8
0yL9uyhXl3B8jVkDvwGffdvANUSenahwpJKNlD3EHRyCFEecC5a39NH52+riYgR/kS6HBXCXxaLIQbQU3czsacFyuwAkH31a6vXVn7IWrdEarUC6Hgmu/kC1V9md/21
pc9QgGu7zmvW2O8CCXjwpiFMJIOjcJJx9zwMLAgwQYAQoADwUCYFK6lQUJDwmcAAIbLgCoCRBbk6lmzEN5TJ0gBBkBCgAGBQJgUrqVAAoJEH7h8iP9VJR8OU0EAI
Bd5BlY0yRH8Hl4/AT3NId9ogT83MMQj1wuVd63+uw5t4Fj7zqMAubJ/zkGOdd2OX10kj4/qcexTfR7dVYZ4Y0+3yyEX1hgzg6+OYRugyf/6R4iMsgxAxrEORxWUjBMh
XMJGS/go6hVsTDx8jGoOvbiVCOOWZruSeENyWNMm8OwmiED/2+bc6fO4WH21kJGZVOmxtn3eMKpMuIwwqBHlbtOF3woBxfIR2dmPwWjBCaGmSo8O/ZAZRfd
tFjxklLgmGL+v5SzuaCYrZMWm2rZrEBFNIUH/DKPqG7tU4ilF4r/5GVy25+fe0PN7giuEk1MiP6ZAkSirInt5HmOpcakQfkxpak/x8FGBGBSupUBBAC8fuz8GMkyk0MC4
bd7sYIXzuQLt3V1BWh2Jl6rNFGzUS/GslIl4QmgsSKFpsdLWrvYjb+0cT9UvCnxQr3kiWCxgjK81boDXILhtTViia0ynxJ30c2nb9IY35JIlKXgCg2pNhyqj+KzW6pRf1JpPoCq
81hps2ffp+G/K/IQnhgf7wARAQAB/gkDCP+T9CC3iP53YBle11QpngSOKYr/VZFEFhYC0jOAujwBWeLznfM3q87zg1n1eIE87UfiXu48B7zG3h7AGMkt/DfFI0YlTYe+bp
RiZkMyV/MVDa2ksk9S1JAPdG0BVDqsl0YZDxIRomuJlbQLjam66vl6PS1maDhqbJPZ7PoDkHvgW+sAZ/Bj2006aHpTFieAjxcRjCNaKMVyfLxDpBZQ8fpifpHB74+QiE6
641qx5aCSG6MDTU4sym7RUpXC6ZRNwF00/lC6vXXigLI5GY1D3CZ94OnBTjh8u+fbaf3Crp+9IQc4vKpbxKYpKzNMWU/QdM8BffJbg6WIk21xlFdYLm2AzaBNd8Td2
gnEq1dw7mlq4N1foiaLjvcuRMpbwjKZihrc7+8KYXe4Iop4Ij+PTnrdMpJ+7zQJlC/9czwPiqpK/jWnsvG77vJpnTuGn9wEbU7ORY1GBP0bdgP8RAbxXFs9X800T/Z1bWa
1CXzI6588bm+z8wjCwIMEGAEKAA8FAmBSupUFCQ8JnAACGy4AqAkQW5OpZsxDeUydIAQZAQoABgUCYFK6lQAKCRBvQp6nUpK2yphwBACWLeWvYAd7mrlzES+
6CQDhnK5hTPLqe7wjR1L4mNsiACyoBN98weD81U0SyJZDX0j+S7NMYJWwVudrD2lF4bErEMXeTgeNx0Nj36OmB/vi4+/su6iC81TnJg5PTg1BmeGZYdKcFDwmvYN/
Nz1F4t19cbtokDAsSBh2Jw5qjjHgRfYUA/4pU2CIhbRYt2YE5PSe45SalJNFcDrfeGjfRbDBLm1AHzFqWSqDChxKfSuMxUK7vWBG9I6u8j2ScdtgDtXn6j+xXOkZ/XCQBp
kPwKh8rtAA30h04cPhQSI35rpuivD6UGSLOOTr5f60HxMRp9R07zb0wSd/ZSoK8cgESL3B56vW5A
===wnLr
-----END PGP PRIVATE KEY BLOCK-----
Public Key Cryptography: PGP
PGP: Encoded Message (Cyphertext) Example
Message: Cryptocurrency Class
wYwDfuHyI/1UlHwBA/45rAgpKtmkh6kQ5b5+AE/eYP
H00769r6HKQc1Gz+Va717k
yqDVU6Ex6JbGLRe+hdsxodKIsvFcTnEYXltqqJ+ygM2n
nVt3KeyKr1CboEVd9Wyw
C4fXQ21Q4qgUucdZeBO/JLPyCrwza1Ez0PtWuYQ4LX
BrV4MokOynTVegm7lJC9JQ
AblTTMeZLjDHgb8PpRV8MT4p5k4CFjrj0u9sQ82Zs/Gl
kX5ovDlx5FIEjddyv7vB
v1VKoJMaoSFEHPFgelVyu0zC8xZHKwvMHG9FtEUqtu
0=
=2CSO
-----END PGP MESSAGE-----
Public Key Cryptography: PGP Demo
Lab Practice Exercise: PGP – Pretty Good Privacy (Open PGP
standard) https://smartninja-pgp.appspot.com/#
Public Key Cryptography: Cryptocurrency
Example: Bitcoin uses schema called ECDSA – Elliptic Curve Digital
Signature Algorithm
❑ Pick Random number between 0 and 2265-1, (Private Key)
❑ Do some ECDSA math conversion (algorithm), and generate a Public
Key
To verify using private key: https://www.bitaddress.org/ -> click on menu Wallet Detail
Source [2, 8]
Hashing
Lab Tool Practice:
https://www.fileformat.info/tool/hash.htm
2) File hash -> click Choose file -> select any file on your
computer -> click Hash
Check result:
SHA-1 21912d3dc4356e4f4db1ced3683411288ccb16d2
Hashing: Blockchain
Hash function, example: in Bitcoin
❑ In the mining process
❑ As identifiers for transaction
❑ As identifiers for blocks, in order to link them in a chain
❑ Ensuring that data tampering is immediately evident
Source [2, 9]
Digital Signature
Signature/Seal
is code
Simply
❑ Message + Private Key -> Digital Signature
❑ Message + Digital signature + Public key -> Valid/Invalid
VS
1. No proof tampered paper after 1. Only valid for that exact piece of
signature data, Cannot copy or re-use it
2. Signature can easily be copied, and 2. Any tampering with message will be
re-used with other document, result invalidated
without your knowledge
3. One time proof with private key
Source [12]
Cryptocurrency & Blockchain Same?
Source [13]
Blockchain Evolution: Market Adoption
Source [14]
Blockchain Evolution: Technology
Source [14]
Different Networks
Source [15]
Centralized vs Decentralized
Source [16]
Ledger
Source [14]
Blockchain
Source [18]
Blockchain
Notebook =
Blockchain
Page
Laminate Page =
Content/Record =
Hashing Block
Data <transaction
data>
Page Number
Order 1,2,3.. =
Hash #, Previous
block Hash #
address
Page# = Block#
Source [17]
Q&A (Cryptography)
❑ What is Cryptography?
❑ What is Encryption & Decryption?
❑ What is plaintext, cyphertext?
❑ What is difference between Symmetric & Asymmetric?
❑ What is Hash?
❑ What is electronic signature?
❑ What is digital signature?
❑ Ink-paper signature vs Digital signature?
❑ Why Cryptography & Digital signature in Cryptocurrency &
Blockchain important?
41
Q&A (Blockchain)
❑ What is ledger?
❑ What are different network architectures?
❑ What is difference between centralized vs decentralized
network?
❑ What is P2P?
❑ What is Blockchain?
❑ What is node?
❑ How does blockchain works?
42
References
[1] Lewis, A. (2018). The basics of bitcoins and blockchains: an introduction to cryptocurrencies and the technology
that powers them. Mango Media Inc..
[2] Image source: https://www.edureka.co/blog/what-is-cryptography/
[3] Image source: https://www.inviul.com/cryptosystem-and-its-types/
[4] This Photo by Unknown Author is licensed under CC BY-SA-NC
[5] Image source: https://www.aureon.com/services/it-management/it-services/security/data-encryption-why-you-
should-protect-your-business/
[6] Image source: https://www.truegossiper.com/internet-security-secure-websites-with-ssl-and-https/
[7] Image source: https://www.thesslstore.com/blog/difference-encryption-hashing-salting/
[8] Image source: https://sectigostore.com/blog/hash-function-in-cryptography-how-does-it-work/
[9] Image source: https://medium.com/swlh/blockchain-characteristics-and-its-suitability-as-a-technical-solution-
bd65fc2c1ad1
[10] Image source: https://triforce92.wordpress.com/2014/03/16/
[11] Image source: https://wizardforcel.gitbooks.io/practical-cryptography-for-developers-book/content/digital-
signatures.html
[12] https://pages.chainstack.com/hype-cycle-for-blockchain-technologies-2020
[13] Image source: https://lawyer4u.ca/the-unpleasant-truth/
[14] Image source: https://twitter.com/chugunov_igor80/status/1159542561276649472?lang=da
[15] Image source: https://twitter.com/cyrus_moody/status/1033026906856271877
[16] Image source: https://data-flair.training/blogs/basics-of-blockchain-technology/
[17] Image source: https://www.digitalpulse.pwc.com.au/pwc-blockchain-infographic/
[18] Image source: https://www.livehoppy.com/laminated-baby-book-page-ideas-fun-cute/
[19] Image source: https://en.wikipedia.org/wiki/File:Ledger.png
[20] https://www.freshbooks.com/hub/accounting/what-is-a-ledger
[21] https://www.researchgate.net/figure/Mined-blocks-in-a-blockchain-Hash-in-each-block-now-starts-with-five-
zeros_fig2_332139853
43