Professional Documents
Culture Documents
Blockchain and Cryptocurrencies
Blockchain and Cryptocurrencies
BLOCKCHAIN AND
CRYPTOCURRENCIES
- Sweta Chheda
WHAT IS A BLOCKCHAIN?
2
• The technique is intended to timestamp digital documents so that it’s not possible to
backdate them or tamper them.
• The purpose of blockchain is to solve the double records problem without the need for a
central server.
• The blockchain is used for the secure transfer of items like money, property, contracts, etc.,
without requiring a third-party intermediary like a bank or government.
• Once data is recorded inside a blockchain, it is very difficult to change it.
• The blockchain is a software protocol (like SMTP is for email). However, Blockchains could
not be run without the Internet. It is also called meta-technology as it affects other
technologies.
• It is comprised of several pieces: a database, software application, some connected
computers, etc.
• Sometimes the term is used for Bitcoin Blockchain or The Ethereum Blockchain, and
sometimes, it’s other virtual currencies or digital tokens. However, most of them are talking
about distributed ledgers.
Prepared by: Prof.Sweta Chheda
5
Genesis Block
The first block in the chain is called the Genesis block. Each new block in the
chain is linked to the previous block.
• For Example: A Bitcoin Block contains information about the Sender, Receiver,
number of bitcoins to be transferred.
Therefore, the Hash is very useful when you want to detect changes to
intersections. If the fingerprint of a block changes, it does not remain the
same block.
Each Block has
1.Data
2.Hash
3.Hash of the previous block
• Consider the following example, where we have a chain of 3 blocks. The 1st block has no
predecessor. Hence, it does not contain the previous block. Block 2 contains a hash of block
1. While block 3 contains Hash of block 2.
• Assume an attacker can change the data present in Block 2. Correspondingly, the Hash of the
Block also changes. But Block 3 still contains the old Hash of Block 2. This makes Block 3,
and all succeeding blocks invalid as they do not have the correct Hash of the previous block.
Therefore, changing a single block can quickly make all following blocks invalid.
• While transactions take place on a blockchain, there are nodes on the network that
validate these transactions.
• In Bitcoin blockchain, these nodes are called as miners and they use the concept
of proof-of-work in order to process and validate transactions on the network.
• In order for a transaction to be valid, each block must refer to the hash of its
preceding block.
• The transaction will take place only and only if the hash is correct. If a hacker
tries to attack the network and change information of any specific block, the hash
attached to the block will also get modified.
• The breach will be detected as the modified hash will not match with the original
one. This ensures that the blockchain is unalterable as if any change which is
made to the chain of blocks will be reflected throughout the entire network and
will be detected easily.
Proof of Work
• Hashes are an excellent mechanism to prevent tempering, but computers
these days are high-speed and can calculate hundreds of thousands of
hashes per second.
• In a matter of a few minutes, an attacker can tamper with a block and then
recalculate all the hashes of other blocks to make the blockchain valid
again.
• To avoid the issue, blockchains use the concept of Proof-of-Work. It is a
mechanism that slows down the creation of the new blocks.
• A proof-of-work is a computational problem that takes a certain effort to
solve. But the time required to verify the results of the computational
problem is very less compared to the effort it takes to solve the
computational problem itself.
• In the case of Bitcoin, it takes almost 10 minutes to calculate the required proof-of-
work to add a new block to the chain. Considering our example, if a hacker would
like to change data in Block 2, he would need to perform proof of work (which would
take 10 minutes) and only then make changes in Block 3 and all the succeeding
blocks.
• This kind of mechanism makes it quite tough to tamper with the blocks, so even if
you tamper with even a single block, you will need to recalculate the proof-of-work
for all the following blocks. Thus, hashing and proof-of-work mechanisms make a
blockchain secure.
• What is a Blockchain
• https://youtu.be/SSo_EIwHSd4
1.A blockchain network makes use of public and private keys in order to
form a digital signature ensuring security and consent.
2.Once the authentication is ensured through these keys, the need for
authorization arises.
3.Blockchain allows participants of the network to perform mathematical
verification and reach a consensus to agree on any particular value.
4.While making a transfer, the sender uses their private key and announces
the transaction information over the network. A block is created
containing information such as digital signature, timestamp, and the
receiver’s public key.
5.This block of information is broadcasted through the network and the
validation process starts.
Prepared by: Prof.Sweta Chheda
21
6.Miners all over the network start solving the mathematical puzzle related
to the transaction in order to process it. Solving this puzzle requires the
miners to invest their computing power.
7. Upon solving the puzzle first, the miner receives rewards in the form of
bitcoins. Such kind of problems is referred to as proof-of-work
mathematical problems.
8.Once the majority of nodes in the network come to a consensus and agree
to a common solution, the block is time stamped and added to the existing
blockchain. This block can contain anything from money to data to
messages.
9.After the new block is added to the chain, the existing copies of
blockchain are updated for all the nodes on the network.
Prepared by: Prof.Sweta Chheda
22
• Bitcoin Mining
Bitcoin mining is the process of adding transaction records to Bitcoin's public
ledger of past transactions. This ledger of past transactions is called the
blockchain as it is a chain of blocks. Bitcoin mining is used to secure and verify
transactions to the rest of the network.
• Role of Bitcoin Miners
Within the bitcoin networks, there are a group of people known as Miners. In
miners, there is a process to confirm transactions. Anybody can apply for a
minor, and you could run the client yourself. However, these minors use very
powerful computers that are specifically designed to mine bitcoin transaction.
They do this by actually solving math problems and resolving cryptographic
issues because every transaction needs to be cryptographically encoded and
secured. These mathematical problems ensure that nobody is tampering with that
data.
Prepared by: Prof.Sweta Chheda
23
FEATURES OF BLOCKCHAIN
• 1. Decentralized: No single person or group holds the authority of the overall
network. While everybody in the network has the copy of the distributed ledger
with them, no one can modify it on his or her own.
• 2. Peer-to-Peer Network: The interaction between two parties through a peer-to-
peer model is easily accomplished without the requirement of any third party.
• 3. Immutable: The immutability property of a blockchain refers to the fact that
any data once written on the blockchain cannot be changed.
• 4.Tamper-Proof: Blockchains are considered tamper-proof as any change in
even one single block can be detected and addressed smoothly. There are two key
ways of detecting tampering namely, hashes and blocks.
Peer-to-Peer Network
1. Smart Contracts
• Blockchain smart contracts can be used in healthcare to manage drug supply.
• Once the name and quantity of a drug is shipped from a manufacturing company to
be delivered ahead to the pharmacist, a smart contract with all the valid data like the
information of the drug, the quantity of supply etc. can be created.
• This smart contract will be responsible for managing the entries throughout the entire
supply chain between different intermediaries.
• Since the smart contract works on certain defined conditions, no one can alter them
or make any changes in the contract thus, ensuring trust and authenticity of the
drugs.
• 2. Government Elections
• No matter how secure government elections are made, the chances of
frauds through anti-social elements always persists.
• The current voting system relies on manual processing and trust. Even if
security breaches and frauds are eliminated, the chances of manual errors
cannot be ignored.
• In such cases, the best solution is to automate the overall process with
the help of smart contracts.
• Blockchain smart contracts provide a modern system through which
these common issues can be easily eliminated.
• Entries in the smart contracts will allow transparency and security while
maintaining the privacy of the voters thus, enabling fair elections.
Prepared by: Prof.Sweta Chheda
28
• 3. Identity Management
• The need of the hour is to have a system that manages individual identification on the
web.
• The distributed ledger technology used in blockchains offers you advanced methods
of public-private encryption using which, you can prove your identity and digitize
your documents.
• This unique secure identity can work as a saviour for you while conducting any
financial transactions or any online interactions on a shared economy.
• Moreover, the gap between different government bodies and private organizations can
be filled through a universal online identity solution that blockchain can provide.
BLOCKCHAIN VERSIONS
1. Blockchain 1.0: Currency
• The implementation of DLT (distributed ledger technology) led to its first and obvious
application: cryptocurrencies. This allows financial transactions based on blockchain
technology. It is used in currency and payments. Bitcoin is the most prominent example in
this segment.
2. Blockchain 2.0: Smart Contracts
• The new key concepts are Smart Contracts, small computer programs that “live” in the
blockchain. They are free computer programs that execute automatically and check
conditions defined earlier like facilitation, verification, or enforcement. It is used as a
replacement for traditional contracts.
3. Blockchain 3.0: DApps:
• DApps is an abbreviation of decentralized application. It has its backend code running on a
decentralized peer-to-peer network. A DApp can have frontend Blockchain example code
and user interfaces written in any language that can make a call to its backend, like a
traditional App.
Prepared by: Prof.Sweta Chheda
31
BLOCKCHAIN VARIANTS
1. Public:
• In this type of blockchain, ledgers are visible to everyone on the internet.
It allows anyone to verify and add a block of transactions to the
blockchain. Public networks have incentives for people to join and are
free for use. Anyone can use a public blockchain network.
2. Private:
• The private blockchain is within a single organization. It allows only
specific people of the organization to verify and add transaction blocks.
However, everyone on the internet is generally allowed to view it.
CRYPTOCURRENCY
• Cryptocurrency, also known as crypto, is a type of online payment method that can
be exchanged online to purchase goods and services.
• It is much similar to real-world currency, but it does not have any physical
appearance.
• It is encrypted, transparent, and decentralized digital money, which is based
on blockchain technology.
• There are approximately 5000 different types of cryptocurrencies, among
which Bitcoin and Ethereum are the popular ones.
• The most important feature of cryptocurrency is that it is a decentralized currency.
Decentralized means it is not issued by the central authorities, the user owns it, and
neither government nor the bank controls it. It is also known as the money of the
future.
Prepared by: Prof.Sweta Chheda
37
FEATURES OF CRYPTOCURRENCY
• It has a limit to how many units can exist, such that bitcoin has 21
million limits.
• It performs easy verification of transfer of funds with the help of hashing
algorithms that verify each transaction.
• It is independent of any central authority or a bank.
• The new units can only be added after certain conditions are met.
• 1. Bitcoin : Bitcoin is the most recognizable type of cryptocurrency system. As per the
studies, there are approximately more than 18.5 million bitcoin tokens available for
circulation, with a capped limit of 21 million.
• 2. Bitcoin Cash: Bitcoin cash was introduced in the year 2017, and it is one of the
most popular types of cryptocurrencies available in the market.
• 3. Litecoin: Litecoin is gaining popularity day by day, and it works the same as
bitcoin. It was developed by Charlie Lee(former employee of Google) in the year
2011.
• 4. Ethereum: Ethereum is heard in the same context as Bitcoin, but itself, it is not a
cryptocurrency. Instead, it is an online programmable platform that uses blockchain
technology. It helps the developer to develop and run DAapps within the system.
Ethereum can be understood as an app store.
• 5. Ripple: Ripple is also a type of cryptocurrency, but it does not use Blockchain
technology. It is not for the particular user; rather, it mainly works for large companies
or corporations to move a huge amount of money across the world.
ADVANTAGES OF CRYPTOCURRENCY
1. Fraud Proof: When a cryptocurrency is created, all the user's confirmed
transactions are saved in the public ledger. The identity of coin owners is kept
encrypted. Hence there is no chance for a fraudulent transaction.
2. User Ownership: Since the cryptocurrency is decentralized, the user owns it. No,
any government or bank has any control over it. There is also not any electronic
cash system.
3. Easy Transaction: In the traditional economy system, for doing any type of
business or deal, there is always a lot of transaction fees applicable that we need to
pay for each transaction. Apart from this, there are also various paper works,
brokerage fees, commissions, etc., users need to pay. But when we use
cryptocurrency, all these things are removed; as for any transaction, there is no
middle man. Every transaction is performed between one to one within a secured
network. This one-to-one transaction makes it easier and more transparent than the
traditional one.
Prepared by: Prof.Sweta Chheda
42
• Accessibility
• Transparency
• Cost savings
• Automation
• Data Integrity