6/27/2017 1
Distributed Ledgers
Blockchain Technology
Michael B. Spring School of Information Sciences University of Pittsburgh spring@pitt.edu
The Big Picture
June 27, 2017 Distributed Ledger Technology 2
Distributed Ledgers Blockchain Technology Michael B. Spring School - - PDF document
6/27/2017 Distributed Ledgers Blockchain Technology Michael B. Spring School of Information Sciences University of Pittsburgh spring@pitt.edu The Big Picture Asymmetric Cryptography A Perfect World POW / POS Cryptographic Hashes
Michael B. Spring School of Information Sciences University of Pittsburgh spring@pitt.edu
June 27, 2017 Distributed Ledger Technology 2
June 27, 2017 Distributed Ledger Technology 3
June 27, 2017 Distributed Ledger Technology 4
June 27, 2017 Distributed Ledger Technology 5
It should be noted that there is no definitive identity for the author. Despite significant efforts to determine the identity of the individual or group responsible, no one has as yet been identified.
To read the original paper on bitcoin, see https://bitcoin.org/bitcoin.pdf
http://www.michaelnielsen.org/ddi/how-the-bitcoin-protocol-actually-works/
June 27, 2017 Distributed Ledger Technology 6
June 27, 2017 Distributed Ledger Technology 7
June 27, 2017 Distributed Ledger Technology 8
June 27, 2017 Distributed Ledger Technology 9
June 27, 2017 Distributed Ledger Technology 10
http://www.xorbin.com/tools/sha256-hash-calculator
June 27, 2017 Distributed Ledger Technology 11
June 27, 2017 Distributed Ledger Technology 12
June 27, 2017 Distributed Ledger Technology 13
June 27, 2017 Distributed Ledger Technology 14
June 27, 2017 Distributed Ledger Technology 15
Text Hash BlockChainHash c799bf416f8303fcb0370f231ab97d… BlockChainHash1 beda7b6bf8ca5b9c98ca1c5ecf46a… BlockChainHash3 05ea628ed8d7fa552636eb9e1998…
June 27, 2017 Distributed Ledger Technology 16
June 27, 2017 Distributed Ledger Technology 17
June 27, 2017 Distributed Ledger Technology 18
June 27, 2017 Distributed Ledger Technology 19
June 27, 2017 Distributed Ledger Technology 20
June 27, 2017 Distributed Ledger Technology 21
Public Permissioned (Sovrin, Hyperledger) Public Permissionedless (Bitcoin, Ethereum) Private Permissioned (R3 Corda, Swirlds) Private Permissionless
June 27, 2017 Distributed Ledger Technology 22
June 27, 2017 Distributed Ledger Technology 23
June 27, 2017 Distributed Ledger Technology 24
June 27, 2017 Distributed Ledger Technology 25
June 27, 2017 Distributed Ledger Technology 26
June 27, 2017 Distributed Ledger Technology 27
June 27, 2017 Distributed Ledger Technology 28
June 27, 2017 Distributed Ledger Technology 29
June 27, 2017 Distributed Ledger Technology 30
June 27, 2017 Distributed Ledger Technology 31
June 27, 2017 Distributed Ledger Technology 32
June 27, 2017 Distributed Ledger Technology 33
June 27, 2017 Distributed Ledger Technology 34
June 27, 2017 Distributed Ledger Technology 35
June 27, 2017 Distributed Ledger Technology 36
June 27, 2017 Distributed Ledger Technology 37
June 27, 2017 Distributed Ledger Technology 38
June 27, 2017 Distributed Ledger Technology 39
June 27, 2017 Distributed Ledger Technology 40
June 27, 2017 Distributed Ledger Technology 41
June 27, 2017 Distributed Ledger Technology 42
June 27, 2017 Distributed Ledger Technology 43
June 27, 2017 Distributed Ledger Technology 44
normally between 128-256 bits.
input bit, there is a 50% chance of each output bit changing.
inefficient or flawed in some way
SHA-1 is thought to be secure. SHA-256 was designed for use with AES
June 27, 2017 Distributed Ledger Technology 45
June 27, 2017 Distributed Ledger Technology 46
June 27, 2017 Distributed Ledger Technology 47
June 27, 2017 Distributed Ledger Technology 48
June 27, 2017 Distributed Ledger Technology 49
June 27, 2017 Distributed Ledger Technology 50
June 27, 2017 Distributed Ledger Technology 51
June 27, 2017 Distributed Ledger Technology 52
June 27, 2017 Distributed Ledger Technology 53
June 27, 2017 Distributed Ledger Technology 54
June 27, 2017 Distributed Ledger Technology 55