CS6262 Lecture 14 - Basics of Blockchain and Bitcoin

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/57

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

58 Terms

1
New cards
What is a major weakness of the hash function "length of name mod 5"?
It can easily cause collisions when different names have the same length
2
New cards
Do cryptographic hash functions require a key?
No, cryptographic hash functions do not have a key
3
New cards
What is a primary use of cryptographic hash functions?
Ensuring message integrity
4
New cards
What is a key property of cryptographic hash functions regarding computation?
They are easy to compute for messages of any size
5
New cards
What output characteristic do cryptographic hash functions have?
They produce a fixed-length output regardless of the input size
6
New cards
What does it mean for a hash function to be one-way?
It is computationally infeasible to determine the original message from its hash
7
New cards
What is weak collision resistance in hash functions?
Given a message m1, it is infeasible to find a different message m2 with the same hash value
8
New cards
What is strong collision resistance in hash functions?
It is infeasible to find any two distinct messages that produce the same hash value
9
New cards
What is a hash pointer?
A pointer that stores both the address of data and the hash of the data
10
New cards
What is the advantage of using a hash pointer over a regular data pointer?
It allows verification that the data has not been tampered with
11
New cards
How is a blockchain constructed using hash pointers?
Each block contains data and a hash pointer to the previous block, forming a linked list of hash pointers
12
New cards
What happens when a block in a blockchain is tampered with?
The hash pointer in the next block will not match, making the tampering detectable
13
New cards
What is a primary use case for blockchain as discussed?
To create a tamper-evident log that allows appending data while detecting changes
14
New cards
What guarantees that a digital signature cannot be forged?
Public key cryptography ensures that without the private key, a signature cannot be forged
15
New cards
How can a public key be used as an identity?
If a signature can be verified with a public key, it proves the owner of the private key authored the message
16
New cards
How is a new public key-based identity created?
By generating a public-private key pair and using the public key or its hash as an ID
17
New cards
What are public key-based identities called in Bitcoin?
They are called addresses
18
New cards
What does the security of cryptocurrency ledgers depend on?
The honesty of miners
19
New cards
How are most cryptocurrencies designed to control production?
They are designed to reduce production, mimicking the market behavior of precious metals
20
New cards
What are public key-based identities called in GoofyCoin?
Coin ownership is proven through signatures that transfer ownership between public keys
21
New cards
What is a double spending attack?
When a coin owner creates multiple signed statements to transfer the same coin to different recipients
22
New cards
Why is GoofyCoin not considered a secure cryptocurrency?
It does not prevent double spending attacks
23
New cards
What is a hot wallet?
A digital wallet connected to the internet
24
New cards
What is a cold wallet?
A digital wallet that is offline
25
New cards
What are hardware wallets?
Wallets that use dedicated hardware and cryptography for security
26
New cards
How does Scrooge Coin prevent double spending?
By using a designated entity called Scrooge who publishes an append-only ledger of all transactions
27
New cards
What data structure does Scrooge use to implement the append-only ledger?
A blockchain containing blocks with transaction data and a hash pointer to the previous block
28
New cards
What is the main problem with Scrooge Coin despite preventing double spending?
Scrooge has too much control, leading to centralization
29
New cards
What is the key technical challenge in creating a successful cryptocurrency?
Designing a cryptocurrency without a central authority
30
New cards
What problems must be solved to create a decentralized cryptocurrency?
Consensus on a ledger, transaction validation, decentralized identity assignment, and decentralized production of coins
31
New cards
Which cryptocurrency suffered the largest crowdfunding exploit due to a smart contract vulnerability?
DAO
32
New cards
What is a fundamental challenge in Bitcoin due to the absence of a centralized authority?
Achieving distributed consensus among all nodes
33
New cards
What are the two basic requirements for a distributed consensus protocol?
All correct nodes must decide the same value, and the value must be proposed by a correct node
34
New cards
Why is achieving consensus difficult in Bitcoin's peer-to-peer system?
Nodes may crash, some may be malicious, and network delays occur
35
New cards
How does Bitcoin achieve consensus?
By using incentives and randomness, allowing agreement to emerge over time
36
New cards
What is implicit consensus in Bitcoin?
Nodes accept or reject blocks by choosing which blockchain branch to extend
37
New cards
Why can't Alice steal bitcoins that belong to another user?
She cannot create a valid digital signature without the private key
38
New cards
How can a merchant protect against double-spending in Bitcoin?
By waiting for multiple confirmations before finalizing a transaction
39
New cards
What enforces protection against invalid transactions?
Cryptography and consensus
40
New cards
What enforces protection against double spending?
Consensus
41
New cards
Is there a 100% guarantee that a Bitcoin transaction will remain valid?
No, confirmation is probabilistic
42
New cards
What is true about Bitcoin's proof of work?
It is costly and time consuming to produce
43
New cards
How must miners complete work to earn a Bitcoin?
They must complete all necessary work in a block
44
New cards
Why is changing a block in Bitcoin difficult?
It requires regenerating all successor blocks and repeating their proof-of-work
45
New cards
How can a Bitcoin node earn a reward for creating a block?
By including a special block reward transaction in a block that becomes part of the long-term chain
46
New cards
How can transaction fees incentivize miners?
They collect the difference between input and output values as a fee
47
New cards
What is a Sybil attack?
An attacker creates many fake identities to influence voting and reputation systems
48
New cards
How can Sybil attacks be mitigated?
By requiring identity costs or resource-based selection
49
New cards
What method does Bitcoin use to select a block creator?
Proof-of-work
50
New cards
How does proof-of-work determine which node creates a block?
A node finds a nonce that makes the hash smaller than a target value
51
New cards
Why is it difficult to find a valid nonce?
The target hash value is extremely small, requiring significant computation
52
New cards
Who typically performs proof-of-work?
Miners with large amounts of computing power
53
New cards
How can proof-of-work cost be adjusted?
By recalculating difficulty periodically to maintain a target block rate
54
New cards
What is the target block interval in Bitcoin?
One block every 10 minutes
55
New cards
What is a 51 percent attacker?
Someone controlling 51% of total computing power
56
New cards
Can a 51 percent attacker steal bitcoins?
No, digital signatures prevent unauthorized spending
57
New cards
What can a 51 percent attacker do?
Suppress or reverse transactions and damage system reliability
58
New cards
How can a 51 percent attacker destroy confidence in Bitcoin?
By refusing to extend valid blocks and causing instability