Blockchain Technology: Challenges and Applications

 
BARTS
B
lockchain 
ART
 
S
imulation
Sean P Sanders
Department of Computer Science
G. Lawrence Sanders
Department of Management Science and Systems
SUNY-Buffalo
This material is in part supported by the NSF under grant No. DGE-
1754085
undefined
 
“I find it hard to grasp the concept of
blockchain in general. Not that I don't
understand what it is but to put things
together to make a decentralized ledger is
quiet (sic) a challenge.”
 
 “…I hate the fact that the concepts are (sic)
not relatable. Especially blockchain that
requires whole knowledge of web
programming, network, business, economics,
system analysis .. much more. It’s on another
level. I don’t find machine learning or deep
learning to be this challenging. Although all
these concepts (sic) take a good amount of
time to grasp, the blockchain is still harder to
grasp and implement.
 
https://www.reddit.com/r/ethereum/comments/92z4ok/how_difficult_is_bloc
kchain_technology_to/
undefined
 
Technology & Innovation Management
 
Develop business plans and application prototypes.
https://marvelapp.com/9c3aa9g
Added 12 hours of blockchain concepts.
BARTS: Blockchain Art Simulation
Four exercises using hashing concepts
Harvard 
BITFURY
 case: Bitfury: Blockchain for Government
Harvard case : 
Snapper Future Tech
: Land Records and Registration using Blockchain.
Brief overview of 
Ethereum 
smart contract programming using 
solidity
.
Overview of an Android application using Java and Ethereum blockchain.
Some students develop prototypes of blockchain applications for final
projects.
https://marvelapp.com/5dj1f6e
undefined
 
Where Material Has Been Used
 
 Material used in graduate MIS technology course, middle school and
high school GenCyber camp , and an undergraduate business course.
 
BARTS simulation and introduction to blockchain concepts are the
foundation. The purpose of this exercise is to illustrate how
blockchain concepts can be illustrated using an imaginary digital
currency called BARTS, to buy and sell drawings.
 
 
undefined
Distributed peer-to-peer 
append only database
Transactions  are secured  and authenticated using private and public keys,
hashing, and consensus protocols (proof -of-work and proof of stake).
B1
B2
B3
B4
B5
B1
B2
B3
B4
B5
B1
B2
B3
B4
B5
B1
B2
B3
B4
B5
Sean
Jody
Gives 2 Coins to
undefined
 
Inside The Cryptocurrency Revolution | VICE
on HBO
 
Published on Dec 27, 2019
Bitcoin’s emergence as a global digital currency has been as
revolutionary as it has been erratic. But while fledgling investors
obsess over every fluctuation in the cryptocurrency market, nation-
states are more interested in the underlying blockchain technology
and its ability to revolutionize how business is done on the internet
and beyond. VICE's Michael Moynihan travels to Russia with Vitalik
Buterin, inventor of the ethereum blockchain, to get a front-row seat
to the geopolitical tug of war over Internet 3.0.
https://www.youtube.com/watch?v=u-vrdPtZVXc&feature=youtu.be
 
Topics of Discusison
 
Introduction: What is a blockchain?
Where blockchain is used
What is Mining and Hashing?
BARTS Exercise
Summary
 
Blockchain BARTS
Introduction
Satoshi Nakamoto developed the digital currency
Bitcoin
Blockchain serves as the public ledger. It is
managed autonomously through the use of a
peer-to-peer network of miners, along with a
timestamp server.
The miners assist in validating Bitcoin
transactions between two parties that are to be
added to the blockchain.
The miners get paid for validating transaction
from fees, and by receiving newly created
Bitcoins
 
Where the blockchain is used?
 
Stores
 
 
Supply Chain
 
 
 
 
Healthcare
 
Government
 
 
 
Financial
 
Institutions
 
 
 
Automated Governance
Benefits of blockchain
1.
Eliminates the middle person or third party.
2.
Solves the double spending issue.
3.
Creates an immutable ledger that cannot be modified.
 
Hashing is a key concept
 
Hashing algorithms are used to verify digital currency transactions
and then to add them to the distributed blockchain ledger. This
process of validation is applicable to a variety of applications, not just
cryptocurrency applications.
undefined
 
A hash is like a fingerprint of the data
 
Fingerprints are used to authenticate identification.
They are unique and the patterns do not change over ones lifetime.
Once the fingerprint is captured, the raw data is processed to extract the
essential data called minutia.
Minutia consist of ridges, valleys, curvature and thickness.
https://semiengineering.com/fingerprint-senor-technology-and-security-requirements/
https://www.fingertec.com/companyprofile/development/wp-fingerprint.html
undefined
 
H
a
s
h
i
n
g
 
H
a
s
h
 
f
u
n
c
t
i
o
n
s
 
t
a
k
e
 
t
e
x
t
,
 
c
o
n
v
e
r
t
 
i
t
 
i
n
t
o
 
b
i
n
a
r
y
 
d
i
g
i
t
s
 
a
n
d
 
r
u
n
m
a
t
h
e
m
a
t
i
c
a
l
 
o
p
e
r
a
t
i
o
n
s
 
o
n
 
t
h
e
 
d
i
g
i
t
a
l
 
d
a
t
a
,
 
a
n
d
 
t
r
a
n
s
f
o
r
m
 
i
t
i
n
t
o
 
a
 
f
i
x
e
d
 
l
e
n
g
t
h
 
n
u
m
b
e
r
 
o
f
 
b
i
n
a
r
y
 
d
i
g
i
t
s
.
 
H
a
s
h
i
n
g
 
i
s
 
t
h
e
p
r
o
c
e
s
s
 
o
f
 
c
o
n
v
e
r
t
i
n
g
 
a
 
s
t
r
i
n
g
 
o
f
 
c
h
a
r
a
c
t
e
r
s
 
i
n
t
o
 
a
 
s
h
o
r
t
 
f
i
x
e
d
-
l
e
n
g
t
h
 
v
a
l
u
e
.
A
 
h
a
s
h
 
i
s
 
i
m
p
l
e
m
e
n
t
e
d
 
b
y
 
u
s
i
n
g
 
a
 
S
e
c
u
r
e
 
H
a
s
h
i
n
g
 
A
l
g
o
r
i
t
h
m
s
(
S
H
A
)
 
i
n
 
a
 
c
o
m
p
u
t
e
r
 
p
r
o
g
r
a
m
,
 
a
 
p
r
o
g
r
a
m
m
i
n
g
 
f
u
n
c
t
i
o
n
 
o
r
 
a
s
u
b
r
o
u
t
i
n
e
.
E
x
a
m
p
l
e
s
 
o
f
 
h
a
s
h
 
f
u
n
c
t
i
o
n
s
 
a
r
e
 
S
H
A
-
2
2
4
,
 
S
H
A
-
2
5
6
,
 
S
H
A
-
3
8
4
,
S
H
A
-
5
1
2
,
 
S
H
A
-
5
1
2
/
2
2
4
,
 
a
n
d
 
S
H
A
-
5
1
2
/
2
5
6
.
T
h
e
 
n
u
m
b
e
r
 
o
f
 
f
i
x
e
d
 
b
i
n
a
r
y
 
d
i
g
i
t
s
 
o
u
t
p
u
t
 
f
o
r
 
t
h
e
 
h
a
s
h
e
s
 
r
a
n
g
e
f
r
o
m
 
1
6
0
 
b
i
t
s
 
f
o
r
 
S
H
A
-
2
2
4
 
t
o
 
5
1
2
 
b
i
t
s
 
f
o
r
 
t
h
e
 
S
H
A
-
5
1
2
.
undefined
 
H
a
s
h
 
E
x
a
m
p
l
e
 
A
 
h
e
x
a
d
e
c
i
m
a
l
 
r
e
p
r
e
s
e
n
t
a
t
i
o
n
 
o
f
 
d
a
t
a
.
undefined
A
g
a
i
n
,
 
t
h
e
 
h
a
s
h
 
i
s
 
l
i
k
e
 
a
 
f
i
n
g
e
r
p
r
i
n
t
 
o
f
 
t
h
e
d
a
t
a
:
 
D
a
t
a
 
g
o
e
s
 
i
n
 
a
n
d
 
h
a
s
h
 
c
o
m
e
s
 
o
u
t
SHA 256
Hash
algorithm
 
b08022d315cf1eb12d2665bded0e6af40653c0a0be975232fb49bcbd021cfc
36
 
Hello
World
The data
fingerprint
undefined
Jody 3 BARTS to Sean
c2608a6a1f62e75cb87e4f9bdff4bfc6afb54f886c2c9848a4a1ca044250ed39
Notice the hash
 value is different after processing
two data stings through the 
SHA 256
6341a2308b516ba386a8290d14d82fd82eb25b4ed0ecbb7eecc8ff9ff9f80f0c
Jodi 3 BARTS to Sean
undefined
 
S
H
A
 
2
5
6
 
D
e
t
a
i
l
s
 
o
n
 
t
h
e
 
S
H
A
2
5
6
 
H
a
s
h
A
l
g
o
r
i
t
h
m
 
P
r
o
c
e
s
s
undefined
 
S
H
A
 
2
5
6
 
D
e
t
a
i
l
s
 
o
n
 
t
h
e
 
S
H
A
2
5
6
 
H
a
s
h
A
l
g
o
r
i
t
h
m
 
P
r
o
c
e
s
s
undefined
SHA 256
Hash
algorithm
 
1. 
Buffalo is always warm
 
4
.
45a2254a1a738db3b789c2b6d57e871e75ed8d6c3ee76b5022875a419b1a8ab5
 
1.
Text is input into the SHA256 algorithm
2.
Converts text into binary
3.
Does a number of transformations
4.
Outputs a 256 bit number in hexadecimal format
 
3.
0001011010001000100101010010100001101001110011100011000000000
0000000000000000000000000000000000000000000000000000000000000
0000000000000000000000000000000000000000000000000000000000000
0000000000000000000000000000000000000000000000000000000000000
0000000000
 
2
. 
01000010 01110101 01100110 01100110 01100001
01101100 01101111 00100000 01101001 01110011 00100000
01100001 01101100 01110111 01100001 01111001 01110011
00100000 01110111 01100001 01110010 01101101 00001010
undefined
SHA 256
Hash
algorithm
 
Four score and seven years ago our fathers brought forth on this continent, a new nation, conceived in
Liberty, and dedicated to the proposition that all men are created equal.
Now we are engaged in a great civil war, testing whether that nation, or any nation so conceived and so
dedicated, can long endure. We are met on a great battle-field of that war. We have come to dedicate a
portion of that field, as a final resting place for those who here gave their lives that that nation might live. It
is altogether fitting and proper that we should do this.
But, in a larger sense, we can not dedicate -- we can not consecrate -- we can not hallow -- this ground. The
brave men, living and dead, who struggled here, have consecrated it, far above our poor power to add or
detract. The world will little note, nor long remember what we say here, but it can never forget what they
did here. It is for us the living, rather, to be dedicated here to the unfinished work which they who fought
here have thus far so nobly advanced. It is rather for us to be here dedicated to the great task remaining
before us -- that from these honored dead we take increased devotion to that cause for which they gave the
last full measure of devotion -- that we here highly resolve that these dead shall not have died in vain -- that
this nation, under God, shall have a new birth of freedom -- and that government of the people, by the
people, for the people, shall not perish from the earth.
Abraham Lincoln
November 19, 1863
 
4f23fe7c74321509282780d70627bb9b537411855beb823ee52a0cfd7a1c76d9
NOTE: 
It does not matter how large the text is; the hash
function only outputs a 256 bit string in hexadecimal
format.
 
Great overview of why you cant
cheat at Bitcoin. From a twitter
feed at:
https://twitter.com/JacBurns_Comext/status/8
78587756431233024
 
ARTBARTS Inc. at 
https://artbarts.com/
The 
B
lockchain 
ART
 
S
imulation (
BARTS
)
Blockchains help solve problems in both the public and private sectors involving government, business,
medical, security, food processing, and transportation applications. To aid in the process of understanding
blockchain concepts, we are introducing the Blockchain ART Simulation (BARTS). The simulation is used to
illustrate the interrelationship of blockchain mining, cryptocurrency, and hashing concepts. The hash
algorithm, SHA3, is used in cryptocurrency mining to make sure that there is no cheating, double spending,
and to eliminate denial of service attacks. To participate as a miner, please bring a laptop, tablet or smartphone
that is wifi enabled.
ARTBARTS
 Inc. is a blockchain-based network for buying and selling pencil drawing and sketches (Figure 1). The
initial coin offering for the 200 million BARTS tokens took place in July of 2018.  Two hundred famous pencil
artists received from 1,000 to 20,000 BARTS tokens if they agreed only to sell their pencil drawings through the
ARTBARTS network for two years. Over 10,000 gallery owners, investors, dealers, collectors and even artists
purchased 60 million BARTS for approximately $100 million in US funds. There are now over 60,000 artists and
buyers participating in the marketplace. BARTS miners must use the interactive online mining software for
solving a hash problem.
 
https://marvelapp.com/43gbd1f
 
The BARTS Simulation
 
An example of a BARTS Wallet
https://marvelapp.com/43gbd1f
 
BARTS Players
 
Coordinator or instructor
3 Artists
3 Gallery Owners
At least 3 Mining Pools
with two  miners in each
pool. One of the miners
will be the spokesperson
for the mining pool.
Artist  Drawgud creates a picture and sells  to Flipflop
Mining pools try to find a nonce with a leading
zero for the transaction
Transaction is added to ledger after 50% of mining
pools agree that it is a valid transaction
 
Artists use this sheet to draw. The Gallery owners
enter Sender name, amount and receiver.
 
BARTS Simulation Process
 
Instructor: Is like the core blockchain coordinating software
Announces the transaction to everyone in the room. I.e. Sean 2 Matt
Mining Pools: 
Placer Kings, Gold Gulch and Spider Miners
, etc.
Each member of mining pool will use the BART Mining Program at 
www.artbarts.com
Start the nonce at 1 and keep incrementing until there is a leading zero on SHA 256
hash.
Yells “Eureka” when a leading zero is found.
Instructor
Asks the individual that yelled eureka what nonce value generated the leading zero.
Instructor announces the nonce value to the miners.
If three or more mining pools can generate a hash with the same leading zero, then
the transaction is added to the blockchain using
https://tinyurl.com/BARTSBlockchain
 
 
 
 
undefined
 
Lets practice
 
Go to 
https://artbarts.com/
Click on 
BARTS Mining Process
Enter in Sender Name: 
Sean
Enter in Amount: 
2
Enter in Receiver Name: 
Matt
Enter in Nonce: 
1
 
Hash Program for each miner
at 
https://tinyurl.com/BARTSMining
undefined
 
Lets begin the simulation
 
Who wants to draw?
Who wants to buy the drawings?
The remaining individuals are miners and will be in one of the eight
mining pools.
 
Debriefing
 
Lets go over additional details
 
This is a simulation:
Many similarities and several differences. Contd…
 
Bitcoin 
blocks
 usually contains 1,000 to 3,000 transactions.
Miners also receive 
transaction fees 
for Bitcoin.
The instructor is a centralized validator of the transactions and the
participants. Digital currencies use many 
nodes
 in a peer-to-peer
network to 
verify
 transactions.
undefined
 
Consensus approaches differ
 
Proof of work (Bitcoin and BARTS): Miners try to solve hash problem.
The first miner to solve the hash problem will get a reward, (12.5
bitcoins) their transaction will be added to the blockchain after it has
been validated by other 
miners
.
Proof of stake 
(Ethereum): One miner (actually called validator) is
sort-of-randomly elected or selected to mint or forge new blocks. The
minter or forger node with the highest number of coins in possession
has a higher probability of being elected as the forger for the block.
51% Attack is supposedly harder with proof of stake. Problem with
proof of stake is that rich can get richer.
undefined
 
Gas in Ethereum-type blockchains
 
In Ethereum-type ledgers, you can pay additional cryptocurrency to
have your transaction added to the blockchain faster.  This is called
gas and it can be used to reduce transaction times.
undefined
 
Research and Development
 
The BARTS simulation can illustrate how R&D can be used to reduce
the time to find a hash with a leading zero and increase mining
performance. For example, process innovation would occur when
miners in a mining pool start at different numbers for the nonce. For
example, if there were three miners, one miner could start at 1, the
second at 11, and the third at 20. Another way to increase mining
performance is to find or develop a program to automatically
generate a hash with a leading zero.  Of course, the instructor could
then have the miners generate a hash with more leading zeros.
undefined
 
Mining complexity is controlled by number of
leading zeros
 
The number of leading zeros required for a transaction can be used to
control the speed of the mining process.
If we had a room with 200 miners, we could have them generate a
hash with two leading zeros. That would on average take 16
2 
or 256
attempts to find a text with two leading zeros.
undefined
 
Digital currency market demand concepts
 
Drawings can only be bought and sold through the BARTS market
using the BARTS transaction paper.
Before the simulation was started, 50 out of the 200 million BARTS
cryptos were sold at an initial coin offering. People purchased the
original  BARTS using a credit card or direct deposit.
Demand is created, if people had to turn to the BARTS environment
to purchase the lovely drawings you saw today.
undefined
 
Names of BARTS participants would be
encrypted in an actual crypto application
 
The name of the parties participating in the BARTS transactions would
be hashed encrypted signatures. Names are typically not  used with
cryptos.
The process of authentication and validation would involve something
like the 
elliptic curve cryptography
. This is a very technical topic that
could be covered in more technical courses. It is essentially a secure
user-id/password-type validation procedure.
 
More on the Bitcoin Address
 
We use names such as Matt, Sean, Drawgud, or Crafty instead of a
160 bit hashed public key as the 
Bitcoin
 destination address. A Bitcoin
address is a virtual location. It is the public half of the asymmetric
public and private key pair.
“A new keypair is generated for each receiving address (with newer 
HD wallets
, this is done deterministically).
The public key and their associated private keys (or the seed needed to generate them) are stored in
the 
wallet
 data file. This is the only file users should need to 
backup
. A "send" transaction to a specific Bitcoin
address requires that the corresponding wallet knows the private key implementing it. This has the
implication that if you create an address and receive coins to that address, then restore the wallet from an
earlier backup, before the address was generated, then the coins received with that address are lost; this is
not an issue for HD wallets where all addresses are generated from a single seed. Addresses are added to an
address 
key pool
 prior to being used for receiving coins. If you lose your wallet entirely, all of your coins are
lost and can never be recovered.We do not use a private key, which is like a password, to make sure that the
sender is a valid owner of BARTS tokens.”
https://en.bitcoin.it/wiki/Technical_background_of_version_1_Bitcoin_addresses
undefined
 
The 5 Dollar wrench Attack
undefined
 
Survey of Blockchain Content
 
Surveyed MS Students last year and this year about the blockchain
concepts.
This year had 76 out of 120 students completed the survey after the
December 31 2019.
The results last year and this year are surprisingly similar.
 
The material covered in the blockchain teaching
module helped me gain a clearer understanding of
blockchain concepts
 
1 Strongly Disagree to
5 Strongly Agree
 
What is the percentage of new understanding of
blockchain concepts did you get from the teaching
module?
 
I would like the following additional material
presented in the course ?
 
2018
 
2019
 
How many addition hours of blockchain and
cryptocurrency concepts would you like to have?
 
I liked the BITFURY case
 
I liked the Snapper Future Tech case
 
 I messed up this question and left off the Strongly
Agree anchor on the survey.
However 67 out of 76 Agreed that they liked the case.
 
Questions?
undefined
 
Additional Technical material on Hashing:
Not required but useful for understanding
 
A set of four exercises were developed to illustrate hashing concepts .
The four exercise takes about an additional hour or two of class time
depending upon the level of detail need to discuss the concepts. They
can be introduced before or after the BARTS simulation and present
additional insight into the hashing concepts.
These exercises were first introduced at the 2018 North Eastern
conference for the CSCC in Arlington Virginia. The paper received the
best student paper award ("A-Nonce the Use and Performance of
Hashing Algorithms), but the paper and content has not published in
any proceedings or journal.
undefined
 
Exercise 1: Generate a nonce that will result
in a leading zero for a hash.
 
Students enter their name with the number 1 right after their name.
If the first character is not a zero, they keep incrementing the number
following their name by one more unit until a hash with one leading
zero is generated. This program is available at
https://tinyurl.com/ZeroHashMining
.
undefined
 
Exercise 2: A Hashing program that
automatically searches for a nonce.
 
This algorithm is quite complex because the program has to keep
searching until it finds a hash with the correct number of leading
zeros. This is what miners do for a living using specialized hardware
using hash speeds of hashes to find a hash with 17 leading zeros. This
program is written in PHP and is available at
https://tinyurl.com/ZeroHashMining2
.
undefined
 
E
x
e
r
c
i
s
e
 
3
:
 
M
i
n
i
n
g
 
C
o
m
p
u
t
a
t
i
o
n
 
I
s
s
u
e
s
 
The purpose of this exercise is to illustrate in greater detail the
computational demand that is required for using hashing for proof of
work.
It requires participants to enter the text to be hashed, along with the
number of leading zeros, then to click on the hashing algorithm
desired and the number of times to run the simulation. The program
will find the hash by adding a nonce, or random number, to the string
until it generates a hash with the appropriate number of leading
zeros. This program is available at
https://tinyurl.com/ZeroHashMining3
.
undefined
 
Exercise 4: Birthday Paradox and cracking
secure hash algorithms
 
The safety of secure hash algorithms is always an issue of interest.
The 
Birthday Paradox
 can be used as an approximation of the amount
of brute force computing necessary to find a hash collision. The
program used to illustrate the number of years to find a hash Collison
for various SHA bit sizes and hash rates can be found at
https://tinyurl.com/BirthdyaParadoxExample
.
For example, the number of years needed to find a collision for the
lowly 160 bit SHA1 algorithm using 5,000 ASICS computers each
capable of 13TH/s with a total hashing rate of 65,000 TH/s, is 0.74
years. This is in contrast to the 208.06 trillion years to find a collision
with the SHA256 algorithm using the brute force approach.
undefined
 
Just for interest:
Potential Hash Computations
 
Number of possible hashes with SHA256 is a 64 digit long hexadecimal number
16^64.
 
Number of possible hashes when current hash must contain 1 leading zero.
Subtract 1 from 64.
16^63
Probability that a randomly picked hash is a valid hash
16^63/16^64 = 16^-1 = .0625
 
Number of possible hashes when current hash must contain 17 leading zeros.
Subtract 17 from 64.
16^47
Probability that a randomly picked hash is a valid hash
16^47/16^64 = 16^-17 ~ 3.3881318e-21
Mining Process
 
Artists use this sheet to draw. The Gallery owners
enter Sender name, amount and receiver.
 
Artists use this sheet to draw. The Gallery owners
enter Sender name, amount and receiver.
undefined
Slide Note

Welcome ladies and gentlemen. My name is Sean Sanders.

Today I want to talk to you about a blockchain art simulation that will be demonstrating how blockchain works.

Embed
Share

Grasping the concept of blockchain can be a daunting task due to its multi-faceted nature, requiring knowledge spanning web programming, network, business, economics, and more. However, educational resources and practical exercises, such as those provided in BARTS Blockchain Art Simulation, can aid in comprehending and applying blockchain principles effectively across various domains. The distributed peer-to-peer append-only database ensures secure transactions through cryptographic methods like private and public keys, hashing, and consensus protocols. Practical examples, such as the use of an imaginary digital currency called BARTS, help illustrate blockchain concepts in action, facilitating learning and application for students across different educational levels.

  • Blockchain Technology
  • BARTS Blockchain Art Simulation
  • Distributed Database
  • Cryptographic Security
  • Practical Applications

Uploaded on Sep 11, 2024 | 0 Views


Download Presentation

Please find below an Image/Link to download the presentation.

The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author. Download presentation by click this link. If you encounter any issues during the download, it is possible that the publisher has removed the file from their server.

E N D

Presentation Transcript


  1. BARTS Blockchain ART Simulation Sean P Sanders Department of Computer Science G. Lawrence Sanders Department of Management Science and Systems SUNY-Buffalo This material is in part supported by the NSF under grant No. DGE- 1754085

  2. I find it hard to grasp the concept of blockchain in general. Not that I don't understand what it is but to put things together to make a decentralized ledger is quiet (sic) a challenge. I hate the fact that the concepts are (sic) not relatable. Especially blockchain that requires whole knowledge of web programming, network, business, economics, system analysis .. much more. It s on another level. I don t find machine learning or deep learning to be this challenging. Although all these concepts (sic) take a good amount of time to grasp, the blockchain is still harder to grasp and implement. https://www.reddit.com/r/ethereum/comments/92z4ok/how_difficult_is_bloc kchain_technology_to/

  3. Technology & Innovation Management Develop business plans and application prototypes. https://marvelapp.com/9c3aa9g Added 12 hours of blockchain concepts. BARTS: Blockchain Art Simulation Four exercises using hashing concepts Harvard BITFURY case: Bitfury: Blockchain for Government Harvard case : Snapper Future Tech: Land Records and Registration using Blockchain. Brief overview of Ethereum smart contract programming using solidity. Overview of an Android application using Java and Ethereum blockchain. Some students develop prototypes of blockchain applications for final projects. https://marvelapp.com/5dj1f6e

  4. Where Material Has Been Used Material used in graduate MIS technology course, middle school and high school GenCyber camp , and an undergraduate business course. BARTS simulation and introduction to blockchain concepts are the foundation. The purpose of this exercise is to illustrate how blockchain concepts can be illustrated using an imaginary digital currency called BARTS, to buy and sell drawings.

  5. Distributed peer-to-peer append only database Transactions are secured and authenticated using private and public keys, hashing, and consensus protocols (proof -of-work and proof of stake). B1 B2 B3 B4 B5 Sean B1 B2 B3 B4 B5 Gives 2 Coins to B1 B2 B3 B4 B5 Jody B1 B2 B3 B4 B5

  6. https://emtemp.gcom.cloud/ngw/globalassets/en/newsroom/images/graphs/Blockchain-HC-2019.pnghttps://emtemp.gcom.cloud/ngw/globalassets/en/newsroom/images/graphs/Blockchain-HC-2019.png

  7. Inside The Cryptocurrency Revolution | VICE on HBO Published on Dec 27, 2019 Bitcoin s emergence as a global digital currency has been as revolutionary as it has been erratic. But while fledgling investors obsess over every fluctuation in the cryptocurrency market, nation- states are more interested in the underlying blockchain technology and its ability to revolutionize how business is done on the internet and beyond. VICE's Michael Moynihan travels to Russia with Vitalik Buterin, inventor of the ethereum blockchain, to get a front-row seat to the geopolitical tug of war over Internet 3.0. https://www.youtube.com/watch?v=u-vrdPtZVXc&feature=youtu.be

  8. Topics of Discusison Introduction: What is a blockchain? Where blockchain is used What is Mining and Hashing? BARTS Exercise Summary

  9. Blockchain BARTS Introduction Satoshi Nakamoto developed the digital currency Bitcoin Blockchain serves as the public ledger. It is managed autonomously through the use of a peer-to-peer network of miners, along with a timestamp server. The miners assist in validating Bitcoin transactions between two parties that are to be added to the blockchain. The miners get paid for validating transaction from fees, and by receiving newly created Bitcoins

  10. Where the blockchain is used? Stores Government Supply Chain Financial Institutions Automated Governance Healthcare

  11. Benefits of blockchain 1. Eliminates the middle person or third party. 2. Solves the double spending issue. 3. Creates an immutable ledger that cannot be modified.

  12. Hashing is a key concept Hashing algorithms are used to verify digital currency transactions and then to add them to the distributed blockchain ledger. This process of validation is applicable to a variety of applications, not just cryptocurrency applications.

  13. A hash is like a fingerprint of the data Fingerprints are used to authenticate identification. They are unique and the patterns do not change over ones lifetime. Once the fingerprint is captured, the raw data is processed to extract the essential data called minutia. Minutia consist of ridges, valleys, curvature and thickness. https://semiengineering.com/fingerprint-senor-technology-and-security-requirements/ https://www.fingertec.com/companyprofile/development/wp-fingerprint.html

  14. Hashing Hashing Hash functions take text, convert it into binary digits and run Hash functions take text, convert it into binary digits and run mathematical operations on the digital data, and transform it mathematical operations on the digital data, and transform it into a fixed length number of binary digits. Hashing is the into a fixed length number of binary digits. Hashing is the process of converting a string of characters into a short fixed process of converting a string of characters into a short fixed- - length value. length value. A hash is implemented by using a Secure Hashing Algorithms A hash is implemented by using a Secure Hashing Algorithms (SHA) in a computer program, a programming function or a (SHA) in a computer program, a programming function or a subroutine. subroutine. Examples of hash functions are SHA Examples of hash functions are SHA- -224, SHA SHA SHA- -512, SHA 512, SHA- -512/224, and SHA 512/224, and SHA- -512/256. The number of fixed binary digits output for the hashes range The number of fixed binary digits output for the hashes range from 160 bits for SHA from 160 bits for SHA- -224 to 512 bits for the SHA 224 to 512 bits for the SHA- -512. 224, SHA- -256, SHA 512/256. 256, SHA- -384, 384, 512.

  15. H Hash Example ash Example A hexadecimal representation of data. A hexadecimal representation of data.

  16. Again, the hash is like a fingerprint of the Again, the hash is like a fingerprint of the data: Data goes in and hash comes out data: Data goes in and hash comes out Hello World b08022d315cf1eb12d2665bded0e6af40653c0a0be975232fb49bcbd021cfc 36 SHA 256 Hash algorithm The data fingerprint

  17. Notice the hash value is different after processing two data stings through the SHA 256 Jody 3 BARTS to Sean 6341a2308b516ba386a8290d14d82fd82eb25b4ed0ecbb7eecc8ff9ff9f80f0c Jodi 3 BARTS to Sean c2608a6a1f62e75cb87e4f9bdff4bfc6afb54f886c2c9848a4a1ca044250ed39

  18. SHA 256 SHA 256 the SHA256 Hash SHA256 Hash Algorithm Process Algorithm Process Details on Details on the

  19. SHA 256 SHA 256 the SHA256 Hash SHA256 Hash Algorithm Process Algorithm Process Details on Details on the

  20. 1. Text is input into the SHA256 algorithm 2. Converts text into binary 3. Does a number of transformations 4. Outputs a 256 bit number in hexadecimal format 1. Buffalo is always warm 2. 01000010 01110101 01100110 01100110 01100001 01101100 01101111 00100000 01101001 01110011 00100000 01100001 01101100 01110111 01100001 01111001 01110011 00100000 01110111 01100001 01110010 01101101 00001010 3. 0001011010001000100101010010100001101001110011100011000000000 0000000000000000000000000000000000000000000000000000000000000 0000000000000000000000000000000000000000000000000000000000000 0000000000000000000000000000000000000000000000000000000000000 0000000000 SHA 256 Hash algorithm 4. 45a2254a1a738db3b789c2b6d57e871e75ed8d6c3ee76b5022875a419b1a8ab5

  21. NOTE: It does not matter how large the text is; the hash function only outputs a 256 bit string in hexadecimal format. Four score and seven years ago our fathers brought forth on this continent, a new nation, conceived in Liberty, and dedicated to the proposition that all men are created equal. Now we are engaged in a great civil war, testing whether that nation, or any nation so conceived and so dedicated, can long endure. We are met on a great battle-field of that war. We have come to dedicate a portion of that field, as a final resting place for those who here gave their lives that that nation might live. It is altogether fitting and proper that we should do this. But, in a larger sense, we can not dedicate -- we can not consecrate -- we can not hallow -- this ground. The brave men, living and dead, who struggled here, have consecrated it, far above our poor power to add or detract. The world will little note, nor long remember what we say here, but it can never forget what they did here. It is for us the living, rather, to be dedicated here to the unfinished work which they who fought here have thus far so nobly advanced. It is rather for us to be here dedicated to the great task remaining before us -- that from these honored dead we take increased devotion to that cause for which they gave the last full measure of devotion -- that we here highly resolve that these dead shall not have died in vain -- that this nation, under God, shall have a new birth of freedom -- and that government of the people, by the people, for the people, shall not perish from the earth. Abraham Lincoln November 19, 1863 4f23fe7c74321509282780d70627bb9b537411855beb823ee52a0cfd7a1c76d9 SHA 256 Hash algorithm

  22. Great overview of why you cant cheat at Bitcoin. From a twitter feed at: https://twitter.com/JacBurns_Comext/status/8 78587756431233024

  23. ARTBARTS Inc. at https://artbarts.com/ The Blockchain ARTSimulation (BARTS) Blockchains help solve problems in both the public and private sectors involving government, business, medical, security, food processing, and transportation applications. To aid in the process of understanding blockchain concepts, we are introducing the Blockchain ART Simulation (BARTS). The simulation is used to illustrate the interrelationship of blockchain mining, cryptocurrency, and hashing concepts. The hash algorithm, SHA3, is used in cryptocurrency mining to make sure that there is no cheating, double spending, and to eliminate denial of service attacks. To participate as a miner, please bring a laptop, tablet or smartphone that is wifi enabled. ARTBARTS Inc. is a blockchain-based network for buying and selling pencil drawing and sketches (Figure 1). The initial coin offering for the 200 million BARTS tokens took place in July of 2018. Two hundred famous pencil artists received from 1,000 to 20,000 BARTS tokens if they agreed only to sell their pencil drawings through the ARTBARTS network for two years. Over 10,000 gallery owners, investors, dealers, collectors and even artists purchased 60 million BARTS for approximately $100 million in US funds. There are now over 60,000 artists and buyers participating in the marketplace. BARTS miners must use the interactive online mining software for solving a hash problem.

  24. The BARTS Simulation https://marvelapp.com/43gbd1f An example of a BARTS Wallet https://marvelapp.com/43gbd1f

  25. BARTS Players Coordinator or instructor 3 Artists 3 Gallery Owners At least 3 Mining Pools with two miners in each pool. One of the miners will be the spokesperson for the mining pool.

  26. Artist Drawgud creates a picture and sells to Flipflop Mining pools try to find a nonce with a leading zero for the transaction Transaction is added to ledger after 50% of mining pools agree that it is a valid transaction

  27. Artists use this sheet to draw. The Gallery owners enter Sender name, amount and receiver.

  28. BARTS Simulation Process Instructor: Is like the core blockchain coordinating software Announces the transaction to everyone in the room. I.e. Sean 2 Matt Mining Pools: Placer Kings, Gold Gulch and Spider Miners, etc. Each member of mining pool will use the BART Mining Program at www.artbarts.com Start the nonce at 1 and keep incrementing until there is a leading zero on SHA 256 hash. Yells Eureka when a leading zero is found. Instructor Asks the individual that yelled eureka what nonce value generated the leading zero. Instructor announces the nonce value to the miners. If three or more mining pools can generate a hash with the same leading zero, then the transaction is added to the blockchain using https://tinyurl.com/BARTSBlockchain

  29. Lets practice Go to https://artbarts.com/ Click on BARTS Mining Process Enter in Sender Name: Sean Enter in Amount: 2 Enter in Receiver Name: Matt Enter in Nonce: 1

  30. Hash Program for each miner at https://tinyurl.com/BARTSMining

  31. Lets begin the simulation Who wants to draw? Who wants to buy the drawings? The remaining individuals are miners and will be in one of the eight mining pools.

  32. Debriefing Lets go over additional details

  33. This is a simulation: Many similarities and several differences. Contd Bitcoin blocks usually contains 1,000 to 3,000 transactions. Miners also receive transaction fees for Bitcoin. The instructor is a centralized validator of the transactions and the participants. Digital currencies use many nodes in a peer-to-peer network to verify transactions.

  34. Consensus approaches differ Proof of work (Bitcoin and BARTS): Miners try to solve hash problem. The first miner to solve the hash problem will get a reward, (12.5 bitcoins) their transaction will be added to the blockchain after it has been validated by other miners. Proof of stake (Ethereum): One miner (actually called validator) is sort-of-randomly elected or selected to mint or forge new blocks. The minter or forger node with the highest number of coins in possession has a higher probability of being elected as the forger for the block. 51% Attack is supposedly harder with proof of stake. Problem with proof of stake is that rich can get richer.

  35. Gas in Ethereum-type blockchains In Ethereum-type ledgers, you can pay additional cryptocurrency to have your transaction added to the blockchain faster. This is called gas and it can be used to reduce transaction times.

  36. Research and Development The BARTS simulation can illustrate how R&D can be used to reduce the time to find a hash with a leading zero and increase mining performance. For example, process innovation would occur when miners in a mining pool start at different numbers for the nonce. For example, if there were three miners, one miner could start at 1, the second at 11, and the third at 20. Another way to increase mining performance is to find or develop a program to automatically generate a hash with a leading zero. Of course, the instructor could then have the miners generate a hash with more leading zeros.

  37. Mining complexity is controlled by number of leading zeros The number of leading zeros required for a transaction can be used to control the speed of the mining process. If we had a room with 200 miners, we could have them generate a hash with two leading zeros. That would on average take 162 or 256 attempts to find a text with two leading zeros.

  38. Digital currency market demand concepts Drawings can only be bought and sold through the BARTS market using the BARTS transaction paper. Before the simulation was started, 50 out of the 200 million BARTS cryptos were sold at an initial coin offering. People purchased the original BARTS using a credit card or direct deposit. Demand is created, if people had to turn to the BARTS environment to purchase the lovely drawings you saw today.

  39. Names of BARTS participants would be encrypted in an actual crypto application The name of the parties participating in the BARTS transactions would be hashed encrypted signatures. Names are typically not used with cryptos. The process of authentication and validation would involve something like the elliptic curve cryptography. This is a very technical topic that could be covered in more technical courses. It is essentially a secure user-id/password-type validation procedure.

  40. More on the Bitcoin Address We use names such as Matt, Sean, Drawgud, or Crafty instead of a 160 bit hashed public key as the Bitcoin destination address. A Bitcoin address is a virtual location. It is the public half of the asymmetric public and private key pair. A new keypair is generated for each receiving address (with newer HD wallets, this is done deterministically). The public key and their associated private keys (or the seed needed to generate them) are stored in the wallet data file. This is the only file users should need to backup. A "send" transaction to a specific Bitcoin address requires that the corresponding wallet knows the private key implementing it. This has the implication that if you create an address and receive coins to that address, then restore the wallet from an earlier backup, before the address was generated, then the coins received with that address are lost; this is not an issue for HD wallets where all addresses are generated from a single seed. Addresses are added to an address key pool prior to being used for receiving coins. If you lose your wallet entirely, all of your coins are lost and can never be recovered.We do not use a private key, which is like a password, to make sure that the sender is a valid owner of BARTS tokens. https://en.bitcoin.it/wiki/Technical_background_of_version_1_Bitcoin_addresses

  41. The 5 Dollar wrench Attack

  42. Survey of Blockchain Content Surveyed MS Students last year and this year about the blockchain concepts. This year had 76 out of 120 students completed the survey after the December 31 2019. The results last year and this year are surprisingly similar.

  43. The material covered in the blockchain teaching module helped me gain a clearer understanding of blockchain concepts Mean 4.11 Count 75 1 Strongly Disagree to 5 Strongly Agree

  44. What is the percentage of new understanding of blockchain concepts did you get from the teaching module? Minimum Maximum Mean Count 19 100 68 76

  45. I would like the following additional material presented in the course ? 2019 Mean 3.97 4.08 3.85 4.22 4.22 Etherium and smart contracts. Blockchain development platforms Tokens for designing new blockchain applications. Blockchain applications in healthcare, operations, finance and government The economics of cryptocurrency 2018 Mean 4.09 4.17 4.04 4.26 4.15 Count 107 109 105 104 108 Etherium and smart contracts. Blockchain development platforms Tokens for designing new blockchain applications. Blockchain applications in healthcare, operations, finance and government The economics of cryptocurrency

  46. How many addition hours of blockchain and cryptocurrency concepts would you like to have? Minimum 0 Maximum 50 Mean 12.27

  47. I liked the BITFURY case Mean 4.31

  48. I liked the Snapper Future Tech case I messed up this question and left off the Strongly Agree anchor on the survey. However 67 out of 76 Agreed that they liked the case.

  49. Questions? Terms of the Trade

Related


More Related Content

giItT1WQy@!-/#giItT1WQy@!-/#giItT1WQy@!-/#giItT1WQy@!-/#giItT1WQy@!-/#giItT1WQy@!-/#giItT1WQy@!-/#