Introduction to Crypto and Cryptocurrencies

Week 1: Introduction

Cryptographic Hash Functions

A cryptographic function is a mathematical function which can take any string as input, it produces a fixed sized output and it can be computed efficiently.

Properties required:

  • It should be collision-free
  • hiding property
  • puzzle-free

Hash Property 1: Collision Free

Nobody can find x and y such that and . When we say collision free, we don’t mean there exists 0 collisions but instead we want it such that nobody can find it.

Why collisions exists?

The possible inputs are a very big set while the possible outputs are a quite small set. If we are dealing with 256-bit crypto functions then the input can be anywhere from 1 byte to 1 gigabyte or even more but the output has to be in 256-bits. Thus it gets crowded and there will be collisions, we just have to make sure that it is super difficult to find them.

How to find a collision?

Try random chosen inputs and 99.8% chance that two of them will collide. So no matter what the hash function is, it any which takes too longer. Just to give a sense of the numbers, if all current computers in the universe were computing this with combined power right from the start of the universe, then the probability of finding a collision would be around 1% . It is more likely probable that the earth will be hit by a meteor rather than finding a collision.

Is there a faster way to find collisions?

For some possible hash functions, yes. For others, we don’t know of one

No hash function has been proved collision-free.

Application: Hash as a message digest

If we know , it’s safe to assume that .

That means, to recognize a file that we saw before, just remember the its hash.

This is useful because the hash is small and can be compared more easily.

Hash Property 2: Hiding

We want something like this: Given , it is infeasible to find .

This property fails when the inputs can be really less, for eg. a coin toss.

Hiding Property:

If r is chosen from a probability distribution that has high min-entropy, then given , it is infeasible to find x.

High min-entropy means that the distribution is “very spread out”, so that no particular value is chosen with more than negligible probability.

Application: Commitment

Want to “seal a value in an envelope”, and “open the envelope” later.

Commit to a value, reveal it later.

Commitment API

To seal in envelope:

To open envelope:

publish ,

anyone can use to check validity

Security Properties:

Hiding: Given , infeasible to find .

Binding: Infeasible to find such that

where key is a random 256-bit value

Security Properties:

Hiding: Given , infeasible to find .

Binding: Infeasible to find such that

Hash Property 3: Puzzle-friendly:

For every possible output value y, if k is chosen from a distribution with high min-entropy, then it is infeasible to find x such that .

Application: Search Puzzle

Given a “puzzle ID” id (from high min-entropy distribution), and a target set Y:

Try to find a “solution” x such that

Puzzle-friendly property implies that no solving strategy is much better than trying random values of x.

SHA-256 hash function

Theorem: If c is collision free then the hash function is also collision free.

Week 1_1

Hash Pointers and Data Structures

Hash Pointer is:

  • pointer to where some info is stored
  • (cryptographic) hash of the info

If we have a hash, we can:

  • ask to get the info back
  • verify that it hasn’t changed

Week 1_2

We can take any data structure and build it with the help of a hash pointer.

Let’s take an example of building a linked list. We can build a linked list with the help of a hash pointer like this:

Week 1_3

In this kind of a data structure one can add things at the end of the list but if somebody wants to modify a previously stored list, then it is not possible. This is because let’s say, you change the data of one element, now the hash that is stored in the pointer will mis-match to the one actually stored and thus we can get notified of any tampering. Well we can technically change the hash pointer to which it points but then the hash of that particular element and thus a chain reaction will change and then at the end head of the list would need to be changed which is not possible.

We can also bring a binary tree with the help of a hash pointer. This is commonly known as “Merkele Tree”.

Week 1_4

It is very easy to even verify the data that we have and the time complexity of the algorithm will be

Advantages of Merkle Tree

  • Tree holds many items but just need to remember the root hash
  • Can verify membership in time/space

Variant: sorted Merkle Tree

  • Can verify non-membership in time/space

More generally, we can use hash pointers in any pointer-based data structure that has no cycles.

Digital Signatures

We want digital signatures such that only one person can sign but anyone can verify. Signature is tied to a particular document and can’t be cut-and-pasted to another doc.

API for Digital Signatures

where,

: secret signing key

: public verification key

Requirements

  • Signatures should be able to be verified:
  • Signatures should not be forged. A person who knows you public key should not be able to produce a verifiable signature on another message.

Practical things which need to be taken care of

  • Algorithms are randomized so we need a good source of randomness
  • limit on message size. fix: use Hash(message) rather than message
  • fun trick: sign a hash pointer, signature “covers” the whole structure

Bitcoin things

Bitcoin uses ECDSA standard. ECSDA stands for Elliptic Curve Digital Signature Algorithm which relies on hairy math.

Good randomness is essential for the proper functioning of ECDSA or one will probably leak your private key.

Public Keys as Identities

One useful trick out of this is that a public key is considered as equivalent as an identity. If we see a signature that we can verify with a public key then that particular individual is saying that message. If we know the secret key along with the private key, then one can sign messages on behalf of that person.

How to make a new identity

Create a new, random key-pair (sk, pk) where is the public “name” you can use (usually better to use ). lets you “speak for” the identity

You can control the identity, because only you know if “looks random”, nobody needs to know who you are

This brings us to the idea of decentralized identity management

Decentralized identity management

Anybody can make a new identity at any time and one can make as many as desired! And the best part is there is no central point of cooridination.

These identities are called “addresses” in Bitcoin.

Privacy

Addresses not directly connected to real-world identity. But observer can link together an address’s activity over time, make inferences.

A Simple Cryptocurrency

Goofy Coin

Let’s take the simple example of Goofy coin.

Goofy can create new coins. When Goofy creates a coin, it belongs to him. Now that coin will be signed by Goofy by the method CreateCoin[uniqueID].

A coin’s owner can spend it. Now Goofy has to give it to Alice so it creates a data structure pointing to Alice’s public key and Goofy signs it. Now Alice is able to present the whole data structure and prove that Goofy gave it to her. Now Alice can pass it again to Bob.

Week 1_5

Goofy coin is insecure in the way that it doesn’t take care of the double spending problem. Now in this Goofy can give the coin to many people and the other person won’t ever know whether that coin has been given to someone else or not. This is the main design challenge in digital currency.

Week 1_6

Scrooge Coin

Scrooge publishes a history of all transactions (a block chain, signed by Scrooge).

Week 1_7

transaction creates new coins. This is valid because Scrooge said so. In the transaction type, there is a table of coins created which have the id, value and a recipient address. If Scrooge puts it into history then it is valid and we don’t need to worry.

Week 1_8

transaction consumes (and destroys) some coins, and creates new coins of the same total value. This is valid if:

Week 1_9

  • consumed coins valid
  • not already consumed
  • total value out = total value in
  • signed by owners of all consumed coins

Immutable coins

Coins can’t be transferred, subdivided into smaller pieces, or combined into a bigger one.

But: you can get the same effect by using transactions to subdivide: create new trans. You can consume your coin or pay out two new coins to yourself.

Scrooge coins is still centralized.

Week 2: How Bitcoin achieves decentralization

Centralization vs Decentralization

They way bitcoin achieves decentralization is by combination of technical and clever incentive engineering.

Decentralization is not all-or-nothing. Best example is e-mail which is a decentralized protocol, but dominated by centralized webmail services.

Aspects of decentralization

  1. Who maintains the ledger?
  2. Who has authority over which transactions are valid?
  3. Who creates new bitcoins?
  4. Who determines how the rules of the system change?
  5. How do bitcoins acquire exchange value?

Beyond the protocol:

exchanges, wallet software, service providers …

Aspects of decentralization in Bitcoin

Peer-to-Peer network:

  • open to anyone, low barrier to entry

Mining:

  • open to anyone, but inevitable concentration of power
  • often seen as undesirable

Updates to software:

  • core developers trusted by community, have great power

Distributed Consensus

Bitcoin’s key challenge:

Key technical challenge of decentralized e-cash: distributed consensus, or how to decentralize ScroogeCoin.

Why consensus protocols?

Traditional motivation: reliability in distributed system

Distributed key-value store enables various applications like DNS, public key directory, stock trades, … which are all good for altcoins.

Altcoins: They are systems built on bitcoins like principles to achieve slightly different role, sometimes currency systems sometimes not currency systems.

Defining distributed consensus

  • The protocol terminates and all correct nodes decide on the same value
  • This value must have been proposed by some correct node

How distributed consensus works in bitcoin

When Alice wants to pay Bob: she broadcasts the transaction to all Bitcoin nodes. The transaction has Alice’s signature which other nodes need in order to know that it came from Alice, it will also contain Bob’s public key which is his address at where he wants to receive the bitcoin and further it contains a hash. This hash is a way for Alice to link together this transaction or this coin to her receipt of this coin from someone else.

Week 2_1

Note: In this, Bob is not in this picture. If Bob wants to be notified that this transaction has in fact happened then he might want to run a peer-to-peer node on the network in order to listen and be sure that he has received the bitcoins but it is not required since the bitcoins will be his whether he is notified or not.

What do the nodes want to reach a consensus on?

Given that a variety of users are broadcasting these transactions to the network, what everybody wants to reach consensus on is exactly which transactions were broadcast and the order in which they happened.

How consensus could work in Bitcoin?

At any given time:

  • All nodes have a sequence of blocks of transactions they have reached consensus on
  • Each node has a set of outstanding transactions it’s heard about

Week 2_2

Although this has things similar to bitcoins, this is not how bitcoins exactly work. This is because, doing things in this way is a really hard technical problem for a variety of reason.

Why consensus is hard?

  • Nodes may crash
  • Nodes may be malicious
  • Network is imperfect
    • Not all pairs of nodes connected
    • Faults in network
    • Latency

One particular consequence of high latency is that there is no notion of global time. Not all nodes can agree with a particular order of events just on basis of timestamps.

Many impossibility result:

  1. Byzantine generals problem
  2. Fischer-Lynch-Paterson (deterministic nodes): consensus impossible with a single faulty node

Despite of these, there are still some well known protocols like Paxos which can never give inconsistant result but can (rarely) get stuck.

Understanding impossibility results

  • These results say more about the model than about the problem
  • The models were developed to study systems like distributed databases.

Bitcoin consensus works better in practice than in theory. Theory is still catching up. BUT theory is important as it can help predict unforeseen attacks.

Some things Bitcoin does differently:

  • Introduces incentives: Possible only because it’s a currency!
  • Embraces randomness:
    • Does away with the notion of a specific end-point
    • Consensus happens over long time scales - about 1 hour
    • Gives a probabilistic model about the verification of transaction over time with exponential growth.

Consensus without identity: The Block Chain

Why identity?

Pragmatic: some protocols need node IDs

Security: assume less than 50% malicious

Why don’t Bitcoins nodes have identities?

  • Identity is hard in a P2P sytem - Sybil attack
  • Pseudonymity is a goal of Bitcoin

Key Idea: Implicit Consensus

In each round, random node is picked. This node proposes the next block in the chain.

Other nodes implicitly accept/reject this block:

  • by either extending it
  • or ignoring it and extending chain from earlier block

Every block contains hash of the block it extends.

Consensus Algorithm (simplified)

  1. New transactions are broadcast to all nodes
  2. Each node collects new transactions into a block
  3. In each round a random node gets to broadcast its block
  4. Other nodes accept the block only if all transactions in it are valid (unspent, valid signatures)
  5. Nodes express their acceptance of the block by including its hash in the next block they create

What can a malicious node do?

What can’t an attacker not do?

  • It can’t forge a signature thus it can’t spend the Bitcoin on behalf of the original owner
  • While it can purposely choose to ignore verifying a transaction which can cause delays but then that transaction will be taken up by some other node and thus it can be signed.

Double Spending Attack:

When Alice pays Bob a Bitcoin, that means she will create a transaction from her address to Bob’s public address. She broadcasts it to the network and let’s say some honest node creates this block, listens to the transaction and includes it in that block.

Week 2_3

Week 2_4

Summarizing:

  • Protection against invalid transactions is cryptographic, but enforced by consensus
  • Protection against double-spending is purely by consensus
  • You’re never 100% sure a transaction is in consensus branch. Guarantee is probabilistic

Incentives and Proof of Work

Assumption of honesty is problematic.

Can we give nodes incentives for behaving honestly?

Week 2_5

Incentive 1: block reward

Creator of block gets to

  • include special coin-created transaction in the block
  • choose recipient address of this transaction

Value is fixed: current 25 BTC, halves every 4 years

Block creator gets to “collect” the reward only if the block ends up on long-term consensus branch!

There’s a finite supply of Bitcoins

Week 2_6

Incentive 2: transaction fees

  • Creator of transaction can choose to make output value less than input value
  • Remainder is a transaction fee and goes to the block creator
  • Purely voluntary, like a tip

Remaining Problems

  1. How to pick a random node?
  2. How to avoid a free-for-all due to rewards?
  3. How to prevent Sybil attacks?

The solution to the problems is Proof of Work.

Proof of Work

To approximate selecting a random node: select nodes in proportion to a resource that no one can monopolize (we hope)

  • In proportion to computing power: proof-of-work
  • In proportion to ownership: proof-of-stake

Equivalent views of proof of work

  1. Select nodes in proportion to computing power
  2. Let nodes compete for right to create block
  3. Make it moderately hard to create new identities

Proof of work in Bitcoin

Hash Puzzles

Week 2_7

PoW property 1: difficult to compute

It takes around hashes/block

PoW property 2: parameterizable cost

Nodes automatically re-calculate the target every two weeks

Goal: average time between blocks = 10 mins

This means that the next time one tries to hash a block is not just dependent on it’s own computing power but it mainly depends on the computing power of other people. To tell it more subtly:

Prob(Alice wins next block) = fraction of global hash power she controls

Key security assumption:

Attacks infeasible if majority of miners weighted by hash power follow the protocol.

Solving hash puzzles is probabilistic:

Week 2_8

PoW property 3: trivial to verify

Nonce must be published as part of block.

Other miners simply verify that

Putting It All Together

Mining Economics

Complications:

  • fixed vs. variable costs
  • reward depends on global hash rate

Summary:

  • Identities
  • Transactions
  • P2P network
  • Block chain & consensus
  • Hash Puzzles & Mining

Bitcoin is bootstrapped

There is a circle of dependency between security of block chain, health of mining ecosystem, and value of currency.

Week 2_9

It is a very tricky process as to how all of these three things were acquired by the Bitcoin system in an interdependent manner. It was of course fueled by media.

What can a “51% attacker” can do?

Steal coins from existing address? NO

Suppress some transactions?

  • From the block chain, yes
  • From the P2P network, no

Change the block reward? No

Destroy confidence in Bitcoin? YES

Week 3

Bitcoin Transactions

An account-based Ledger (not Bitcoin)

If we use an account based ledger wherein we store all the trades that can happen then we have something like this:

Week 3_1

Although the problem with this is that to verify that when the person who promises to pay is a big pain because for that we would have to traverse the whole history of all transactions. In this system there is no way of storing the amount of money a person owns and thus calculating the whole list every time a transaction is made is just too much computationally intensive. If we try to maintain an account of each person, then it would be a sophisticated data structure which would be different from the original block chain.

A transaction-based Ledger

Bitcoin uses something like this.

Week 3_2

The first transaction depicts the creation of a new currency. In the second transaction, the coins are split into two, Bob is given 17 coins while Alice is given 8 coins by herself where, . So this is called as change address because the address of the transactions owned by Alice have changed. The point is that the transaction totally consumes the full money of the previous block. Thus it is easy to maintain the transactions as well as the amount of money owned by each person.

A real deal: A Bitcoin Transaction

Week 3_3

Three parts:

  • Metadata
  • Inputs
  • Outputs

Metadata: Some housekeeping information like size of the transactions, number of inputs and the number of outputs. There is the hash of the entire transaction, and there is a lock-time parameter.

Input: It is an array that have inputs of the same form. The inputs specify a previous transaction specifically so they have the hash or hash pointer to it and the index of which transaction which you are actually claiming and after that there is a signature.

Outputs: They have a value of a coin and then there is a recipient address.

Bitcoin Scripts

Each transaction output doesn’t just specify a simple public key, but instead it specifies a script.

An Example

Output “addresses” are really scripts. The most common script in bitcoin is to redeem a previous transaction by signing with the correct public key. This is what an output address would look like in a script:

OP_DUP
OP_HASH160
69e02e18...
OP_EQUALVERIFY OP_CHECKSIG

Input “address” is also a script. So that’s a bit of a script that you combine with the output script by concatenation and that gets you a script that you have to run successfully to claim a bitcoin.

To Verify: Concatenated script must execute completely with no errors.

Bitcoin Scripting Language

Design goals:

  • Built for Bitcoin (inspired by Forth)
  • Simple, compact
  • Support for cryptography
  • Stack-based
  • Limits on time/memory
  • No looping

This is not a turing complete language. No looping is there to protect the miner from infinite looping submitted by malicious nodes.

Bitcoin Script Execution Example

A stack based data structure is the most suitable when you have to perform operations on data. Bitcoin scripting also uses the same. When it sees a data value, it pushes it on top of the stack. When it sees an operation, then it pops the top value of the stack performs the operation and then pushes the output on the top of the stack back.

Let’s say you want to execute this script:

<sig> <pubKey> OP_DUP OP_HASH160 <pubKeyHash?> OP_EQUALVERIFY OP_CHECKSIG

So the execution will start with pushing <sig> into the stack and then <pubKey>.

Stack
<pubKey>
<sig>

After that, the operation is OP_DUP which is to duplicate the top of the stack. So after this operation the stack looks like,

Stack
<pubKey>
<pubKey>
<sig>

Then the operation is OP_HASH160 which means to hash the top value of the stack. The stack therefore is,

Stack
<pubKeyHash>
<pubKey>
<sig>

Then the data value <pubKeyHash?>,

Stack
<pubKeyHash?>
<pubKeyHash>
<pubKey>
<sig>

Then the operation OP_EQUALVERIFY which pops the two topmost elements and then verifies whether the both are equal, if equal then it removes both the values from the stack, otherwise it terminates the execution of the script with a negative response for verification.

Stack
<pubKey>
<sig>

Now OP_CHECKSIG checks whether the signature is valid. It can verify signatures without calling special libraries. The input to the signature function is the entire transaction. After this the remaining things will be popped out and nothing is left. If we didn’t have any errors, then the output is a “yes” which means the transaction is valid.

Bitcoin Script Instructions

256 opcodes total (15 disabled, 75 reserved)

  • Arithmetic
  • If/then
  • Logic/data handling
  • Crypto!
    • Hashes
    • Signature Verification
    • Multi-Signature verification

OP_CHECKMULTISIG:

  • Built-in support for joint signatures
  • Specify n public keys
  • Specify t
  • Verification requires t signatures
Bitcoin scripts in practice (as of 2014)
  • Most nodes whitelist known scripts
  • 99.9% are simple signature checks
  • ~0.01% are MULTSIG
  • ~0.01% are Pay-to-Script-Hash
  • Remainders are errors, proof-of-burn
Proof-of-Burn

It is a script that can never be redeemed. It is provable that those coins have been destroyed and they can’t be spent again. One can use OP_RETURN with any arbitrary data and no matter what values you put in before, they get permanently stored in the chain.

Should Sender specify scripts?

Ideally all senders have to send scripts, but this creates a lot of confusion for the user. So a simple hack is to use the hash of a redemption script. The sender doesn’t need to specify the entire script but the sender can specify the hash of the script needed to be redeem those coins.

Application of Bitcoin Scripts

Escrow Transactions

Problem

Let’s say Alice sells a big order for apples to Bob. Now Alice doesn’t want to pay until Bob delivers the apples and Bob doesn’t want to deliver the apples until Alice pays for it.

Solution

To solve this problem, we introduce a third party. Alice can create a MULTISIG transaction that requires two or three people to sign to redeem the transaction. So now Alice pays 2-of-3 of Alice, Bob and Judy (MULTISIG) and in this point the coins are held in the escrow and the two can specify where the coins should go. Bob will be satisfied that he is safe sending the goods to Alice, thus he will deliver the apples. Then Alice wants to pay Bob for his services, so to release the money from the escrow and pay to Bob, they both can sign a transaction releasing redeeming the coins from escrow and sending them to Bob and the great thing is that Judy had to never get involved. This requires one extra transaction on the block chain.

What if Bob didn’t send or sent faulty goods? Now Alice doesn’t want to pay Bob. In this case, Bob won’t sign the transaction because he wants to defy the claim. So in this case Judy involves and helps in settling the dispute. Judy can sign the transaction in whichever direction she wants and thus after obtaining 2 signatures, the coins can be transferred easily.

Green Addresses

Problem

Alice wants to pay Bob. Bob can’t wait 6 verifications to guard against double spends, or is offline completely. So Bob can’t go to the block chain and verify the transaction.

Solution

To solve this, we need to introduce one bank. Alice pays the bank with the coins. Now this bank has the trust of the people that it never double spends and in return it takes a small part of the transaction. Now when Bob comes online, it can immediately ask the bank to pay him the coins. This idea puts too much trust on the bank and they have historically failed.

Efficient micro-payments

Problem

Alice wants to pay Bob for each minute of phone service. She doesn’t want to incur a transaction fee every minute. Since the fees are quite low, the transaction costs would seem quite high in comparison.

Solution

We can club together many small payments into one payment. We start with a MULTISIG transaction with an amount which is the highest Alice is going to pay which will be signed by Alice and Bob. The first payment is then done by Alice to Bob while returning the rest remaining coins to herself. After next service Alice signs another transaction in which she signs coins for both of the services while paying rest to her. Alice will keep sending these transaction to Bob as long as she is using the service. These aren’t getting published in the block chain but is there with Bob. When Alice stop using the service, Bob will take the last transaction (which has the highest coins). So technically all of those transactions are double-spend.

22

What is Bob never signs the last transaction?

Now the coins won’t move but Alice will be out of coins she initially deposited. To avoid this, we use lock time. Alice can put up a transaction saying “Pay 100 to Alice, LOCK until time t” which is to be signed by Alice and Bob. The metadata parameter lock_time is used to specify this, and if contains a non-zero value then the transaction can’t be published until some time specified by that value in future.

23

More Advanced Scripts
  • Multiplayer Lotteries
  • Hash pre-image challenges
  • Coin Swapping protocols

The name for these kind of things is called “smart contracts”.

Bitcoin Blocks

Why bundle transactions together?

  • Single unit of work for miners
  • Limit length of hash-chain of blocks
    • Faster to verify history

24

The real deal

25

26

The Bitcoin Network

The Bitcoin P2P Network
  • Ad-hoc protocol (runs on TCP port 83330)
  • Ad-hoc network with random topology
  • All nodes are equal
  • New nodes can join at any time
  • Forget non-responding nodes after 3 hr
Joining the Bitcoin P2P network

When you launch a new node and try to connect to a network, you start with a simple message to one node that you know about. This node is usually called as seed node. Once you find your seed node, you send a special message getaddr() asking to know which all nodes in that node connected to and then you can perform his task iteratively and finally choose the nodes you want to pair up with.

27

28

Transaction Propogation (flooding)

This is also called as the gossip protocol. If one node gets to hear about a new transaction from a wallet or an exchange, then that node tries to tell as many people as it can to whom it is connected to and thus this message spreads on the entire network just like people gossiping in the real world.

Should I relay a proposed transaction?
  • Transaction valid with current block chain
  • (default) script matches a whitelist
    • avoid unusual scripts
  • Haven’t seen before
    • avoid infinite loops
  • Doesn’t conflict with others I’ve relayed
    • avoid double-spends

Well behaving nodes implement this, while some nodes might forward transactions without validating as well.

Race Conditions

Transactions or blocks may conflict

  • Default behaviour: accept what you hear first
  • Network position matters
  • Miners may implement other logic!
Block Propogation

Relay a new block when you hear it if:

  • Block meets the hash target
  • Block has all valid transactions
    • Runs all scripts, even if you wouldn’t relay
  • Block builds on current longest chain
    • Avoid forks
Block Propagation Times

29

How big is the network?
  • Impossible to measure exactly
  • Estimates-up to 1M IP addresses/month
  • Only about 5k-10k “full nodes”
    • Permanently connected
    • Fully-validate
  • This number may be dropping!
Fully-Validating Nodes
  • Permanently connected
  • Store entire block chain
  • Hear and forward every node/transaction
Tracking the UTXO set
  • Unspent Transaction Output
    • Everything else can be stored on disk
  • Currently ~12 M UTXOs
    • Out of 44M transactions
  • Can easily fit into RAM
Thin/SVP clients (not fully-validating)

Idea: don’t store everything

  • Store block headers only
  • Request transactions as needed
    • To verify incoming payment
  • Trust fully-validating nodes

1000x cost savings! (20Gb - 23Mb)

Limitations & Improvements

Hard-Coded limits in Bitcoin
  • 10 min average creation time per block
  • 1 M bytes in a block
  • 20,000 signature operations per block
  • 100 M satoshis per bitcoin
  • 21 M total bitcoins maximum
  • 50, 25, 12.5 … bitcoin mining reward
Thoroughput limits in Bitcoin
  • 1 bytes/block (10 min)
  • 250 bytes/transaction

  • 7 transactions/sec

Compare to:

  • VISA: 2,000 - 10,000 transactions/sec
  • PayPal: 50-100 transaction/sec
Cryptographic Limits in Bitcoin
  • Only 1 signature algorithm (ECDSA/P256)
  • Hard-coded hash functions

Crypto primitives might break by 2040 …

comments powered by Disqus