Upgrade to Pro — share decks privately, control downloads, hide ads and more …

The Building Blocks of Blockchain Technology — ...

The Building Blocks of Blockchain Technology — Networks + Ledgers + Cryptography

In this module, we will explore some of the the Building Blocks of Blockchain Technology — Networks + Ledgers + Cryptography

Daniel Martin Katz

February 20, 2018
Tweet

More Decks by Daniel Martin Katz

Other Decks in Technology

Transcript

  1. @ computational professor daniel martin katz danielmartinkatz.com BLOCKCHAIN, CRYPTOCURRENCY AND

    LAW professor nelson rosario THE BUILDING BLOCKS OF THE BLOCKCHAIN — NETWORKS + LEDGERS + CRYPTOGRAPHY nelsonmrosario.com @ nelsonmrosario BLOCKCHAINLAWCLASS.COM
  2. DANIEL MARTIN KATZ E D U | I L L

    I N O I S T E C H + S TA N F O R D C O D E X B LO G | C O M P U TAT I O N A L L E GA L S T U D I E S . C O M PAG E | DA N I E L M A R T I N K AT Z . C O M C O R P | L E X P R E D I C T. C O M NELSON ROSARIO B LO G | L AWO F C RY P TO C U R R E N C Y. C O M PAG E | N E L S O N M RO S A R I O . C O M F I R M | M A R S H A L L I P. C O M BLOCKCHAINLAWCLASS.COM L A B | T H E L AW L A B . C O M E D U | I L L I N O I S T E C H - C H I C AG O K E N T L AW
  3. BLOCKCHAINLAWCLASS.COM BLOCKCHAIN CRYPTOCURRENCY A CHAIN OF CRYPTOGRAPHICALLY LINKED BLOCKS OF

    TRANSACTIONS UNIQUE DIGITAL PROPERTY TRANSACTED ON A DECENTRALIZED PEER TO PEER TRANSACTION NETWORK
  4. THE BUILDING BLOCKS OF BLOCKCHAIN TECHNOLOGY BLOCKCHAINLAWCLASS.COM NETWORKS - ALLOW

    US INTERACT / COMMUNICATE LEDGERS - LET US TRACK THINGS CRYPTOGRAPHY - HELPS US SECURE THINGS (*NOTE* NOTHING CAN EVER BE PERFECTLY SECURE)
  5. BLOCKCHAINLAWCLASS.COM SOCIAL DYNAMICS OF HIGH SCHOOLS JAMES MOODY, RACE, SCHOOL

    INTEGRATION, AND FRIENDSHIP SEGREGATION IN AMERICA, AMERICAN JOURNAL OF SOCIOLOGY 107, 679-716 (2001)
  6. BLOCKCHAINLAWCLASS.COM NICHOLAS A. CHRISTAKIS AND JAMES H. FOWLER, THE COLLECTIVE

    DYNAMICS OF SMOKING IN A LARGE SOCIAL NETWORK, 358 NEW ENGLAND JOURNAL OF MEDICINE 2249 (2008) SOCIAL DYNAMICS OF SMOKING
  7. BLOCKCHAINLAWCLASS.COM JOHN KELLY AND BRUCE ETLING, MAPPING IRANʼS ONLINE PUBLIC:

    POLITICS AND CULTURE IN THE PERSIAN BLOGOSPHERE, BERKMAN CENTER FOR INTERNET AND SOCIETY AND INTERNET & DEMOCRACY PROJECT, HARVARD LAW SCHOOL (2008) MAPPING IRAN’S BLOGOSPHERE
  8. BLOCKCHAINLAWCLASS.COM M. K. GANAPATHIRAJU, M. THAHIR, A. HANDEN, S. N.

    SARKAR, R. A. SWEET, V.L. NIMGAONKAR & S. CHAPARALA, SCHIZOPHRENIA INTERACTOME WITH 504 NOVEL PROTEIN–PROTEIN INTERACTIONS, 2 NPJ SCHIZOPHRENIA16012 (2016)
  9. BLOCKCHAINLAWCLASS.COM HAGMANN P, CAMMOUN L, GIGANDET X, MEULI R, HONEY

    CJ, WEDEEN VJ, SPORNS O, MAPPING THE STRUCTURAL CORE OF HUMAN CEREBRAL CORTEX. PLOS BIOLOGY VOL. 6, NO. 7, E159 (2008)
  10. has spread from its ysical sciences into cial sciences (1).

    In- cial sciences frame from the financial d system as complex ) and urge policy- olutions with What is often se initiatives also complex st as it seems ory measures AS properties or regulation, o appreciate ystems yield nrealistic as- ng empirical w, there has exity science. cal studies of searchers are ngly evident cientific sup- ch agenda to gap and ad- ons. t what com- y as hallmark e diverse in- res, agencies, due process, actors (e.g., and judges); regulations, are intercon- tic processes s, and rule- mechanisms ourts and ju- n). These are all em- and nonhierarchical e.g., cross-references ns and judicial opin- ies of federal, state, stitutions) that fre- ganizing properties exercise bounded rationality, have only par- tial information, and are able to exercise only varying degrees of control on overall system behavior (2). Efforts to integrate CAS approaches to regulated systems may flounder if complex adaptive characteristics of the legal system it- self are not taken into account. For example, although natural-resources policy theorists have advocated for a new field of adaptive management based on an understanding that ecosystems are CAS, agencies, courts, and other components of the legal system have reacted in unexpected ways that can frustrate adaptive management (3). Legal systems are locked in perpetual co- evolution with their regulatory targets. Co- adaptive dynamics have driven growth in structure and size, punctuated with stages of nonlinear expansion of the U.S. statutory was a factor in the 2008 financial crisis (5) and the Deepwater Horizon oil spill (6). THEORY, ANALYSIS, APPLICATION Application of informatics and big-data– styled research to law offers many potential benefits for conventional empirical legal studies. The CAS framework is neither an extension of nor a replacement for that ap- proach but a different way of envisioning systems in which agent strategies and sys- tem structures evolve, with outcomes stan- dard game theory and equilibrium analyses would not predict (7). Although well behind CAS research in other social sciences, re- searchers have begun to map CAS concepts onto the legal system (2). Researchers are applying empirical tools of complexity sci- ence to understand how to measure, moni- tor, and manage the legal system as a CAS. U.S. Supreme Court term Percentage of cases contained within giant component Giant component (%) 60 1805 1810 1810 1815 1820 1820 1825 1830 1830 1835 50 40 30 20 10 0 United States Supreme Court citation network (1805–1835) Cases are represented as nodes, citations between cases as edges. Emergence of a giant [connected] component after 1815, a hallmark phenomenon in complex systems, represents a transition from jurisprudential reliance on foreign to domestic law following the War of 1812 (4). We include all cases that had been cited at least once over the Court’s history (1791–2015). For figure code and data, see https://github.com/mjbommar/legal-complexity-science. Nashville, TN 37203, USA. cago-Kent College of Law, he Stanford Center for 05, USA. Email: jb.ruhl@ 31 MARCH 2017 • VOL 355 ISSUE 6332 1377 3/29/17 11:31 AM Published by AAAS on March 30, 2017 http://science.sciencemag.org/ Downloaded from J.B. Ruhl, Daniel Martin Katz & Michael Bommarito, Harnessing Legal Complexity, 355 Science 1377 (2017) Michael Bommarito, Daniel Martin Katz, Jonathan Zelner & James Fowler, Distance Measures for Dynamic Citation Networks 389 Physica A 4201 (2010) BLOCKCHAINLAWCLASS.COM
  11. BLOCKCHAINLAWCLASS.COM (a) Christian Sternitzke, Adam Bartkowski & Reinhard Schramm, Visualizing

    Patent Statistics by Means of Social Network Analysis Tools. 30 World Patent Information 115 (2008) (a) (b) (b) Daniel Martin Katz & Michael Bommarito, Measuring the Complexity of the Law: The United States Code, 22 Journal of Artificial Intelligence & Law 1 (2014) (c) Daniel Martin Katz & Derek Stafford, Hustle and Flow: A Social Network Analysis of the American Federal Judiciary, 71 Ohio State Law Journal 457 (2010) (c)
  12. BLOCKCHAINLAWCLASS.COM A.A. WHITE, THE SOCIAL NETWORKS OF EARLY HUNTER- GATHERERS

    IN MIDCONTINENTAL NORTH AMERICA. PH.D. DISSERTATION: UNIVERSITY OF MICHIGAN (2012)
  13. BLOCKCHAINLAWCLASS.COM NETWORKS - A DEFINITION PEOPLE/SOCIAL - AN INTERCONNECTED ASSOCIATION

    OR GROUP OF PERSONS THOSE INDIVIDUALS MIGHT SHARE INFORMATION AND RESOURCES
  14. BLOCKCHAINLAWCLASS.COM A TRIBE OR VILLAGE IS A NETWORK JAIME IRANZO,

    JAVIER M. BULDÚ & JACOBO AGUIRRE, COMPETITION AMONG NETWORKS HIGHLIGHTS THE POWER OF THE WEAK, 7 NATURE COMMUNICATIONS 13273 (2016).
  15. BLOCKCHAINLAWCLASS.COM CITIES AND REGIONS (AS WELL AS COUNTRIES) CAN BE

    THOUGHT OF AS NETWORKS C. HERRERA-YAGÜE, C. M. SCHNEIDER, T. COURONNÉ, Z. SMOREDA, R. M. BENITO, P. J. ZUFIRIA & M. C. GONZÁLEZ, THE ANATOMY OF URBAN SOCIAL NETWORKS AND ITS IMPLICATIONS IN THE SEARCHABILITY PROBLEM, 5 SCIENTIFIC REPORTS 10265. (2015)
  16. BLOCKCHAINLAWCLASS.COM AS WE HAVE NOTED IN PRIOR MODULES, MUCH OF

    HUMAN HISTORY CONCERNS SCALING TRUST AND GROWING NETWORKS
  17. BLOCKCHAINLAWCLASS.COM NETWORKS - A DEFINITION REVISITED COMPUTER NETWORK : DIGITAL

    TELECOMMUNICATIONS NETWORKS THAT ALLOW COMPUTERS TO SHARE RESOURCES/INFORMATION
  18. BLOCKCHAINLAWCLASS.COM ARPANET PACKET SWITCHING IS A WAY OF TRANSMITTING DATA

    ON A NETWORK BY BREAKING THE DATA INTO TWO PARTS …
  19. BLOCKCHAINLAWCLASS.COM ARPANET HEADER : THE INTERNET IS A PACKET SWITCHING

    NETWORK PAYLOAD : THE HEADER IS USED TO ROUTE THE DATA
  20. BLOCKCHAINLAWCLASS.COM ARPANET - MID 1960’S INTERNET 1990’S LAN/WAN - MID

    1980’S TCP/IP - LATE 1970’S BLOCKCHAIN 2010’S IOT 2020’S (AND BEYOND) (AND BEYOND)
  21. BLOCKCHAINLAWCLASS.COM PEER-TO-PEER NETWORKS EXAMPLES THE SECOND WAVE OF PEER-TO-PEER APPLICATIONS

    ARE FOCUSED ON ALL SORTS OF TOPICS FINANCE COMPUTING FILE STORAGE
  22. BLOCKCHAINLAWCLASS.COM DOUBLE-ENTRY BOOKKEEPING LUCA PACIOLI - INVENTOR EVERY CREDIT HAS

    A DEBIT AND VICE VERSA REVOLUTIONIZED FINANCE/ BANKING/TRADE
  23. BLOCKCHAINLAWCLASS.COM LEDGERS - ISSUES LEDGERS CAN BE MAINTAINED BY A

    CENTRAL PARTY LEDGERS CAN BE MAINTAINED BY MULTIPLE PARTIES THAT THEN NEED TO RECONCILE THEIR LEDGERS
  24. BLOCKCHAINLAWCLASS.COM A WAY TO ORGANIZE INFORMATION MAY BE MANAGED BY

    A CENTRAL PARTY, OR EACH PARTY MAY MAINTAIN THEIR OWN LEDGER THAT IS LATER RECONCILED TO MAINTAIN CONSENSUS ON TRANSACTIONS LEDGERS - A REVIEW
  25. BLOCKCHAINLAWCLASS.COM CRYPTOGRAPHY - A DEFINITION CRYPTOGRAPHY IS THE ART AND

    SCIENCE OF KEEPING INFORMATION SECURE FROM UNINTENDED AUDIENCES
  26. BLOCKCHAINLAWCLASS.COM EGYPT ~2000 B.C. IN EGYPTIAN TOWN MENET KHUFU IN

    THE TOMB OF KHNUMHOTEP II IS A SET OF HIEROGLYPHIC SYMBOLS DESIGNED BY THEIR CREATOR TO OBSCURE THEIR MEANING
  27. BLOCKCHAINLAWCLASS.COM EGYPT ~2000 B.C. WHILE THE EXACT REASONS FOR THIS

    ARE UNKNOWN - THIS IS AN EARLY EXAMPLE OF A SUBSTITUTION CIPHER http://www.eng.utah.edu/~nmcdonal/Tutorials/EncryptionResearchReview.pdf
  28. BLOCKCHAINLAWCLASS.COM GREECE ~700 B.C. THE ANCIENT GREEKS USED THIS CIPHER

    AS A WAY TO COMMUNICATE AMONG MILITARY. SENDER AND RECIPIENT EACH HAD A CYLINDER OF EXACTLY THE SAME DIAMETER. THE SENDER WOULD WIND A RIBBON OF PARCHMENT PAPER AROUND THE CYLINDER AND WRITE ON IT LENGTHWISE.
  29. BLOCKCHAINLAWCLASS.COM AFTER THE RIBBON IS UNWOUND, THE WRITING COULD BE

    READ ONLY BY A PERSON WHO HAD A CYLINDER OF EXACTLY THE SAME CIRCUMFERENCE. IT IS WAS NOT OVERLY SECURE BUT DID IMPOSE SOME COST TO DECRYPTION GREECE ~700 B.C.
  30. BLOCKCHAINLAWCLASS.COM ROME ROMAN EMPIRE AT ITS HEIGHT WAS MASSIVE EMPIRE

    WITH MASSIVE COORDINATION PROBLEMS HOW DO YOU KEEP INFORMATION SAFE?
  31. BLOCKCHAINLAWCLASS.COM PLAINTEXT INPUT: EFGFOE UIF FBTU XBMM PG UIF DBTUMF

    DEFEND THE EAST WALL OF THE CASTLE CIPHERTEXT: OUTPUT: CIPHER
  32. BLOCKCHAINLAWCLASS.COM ROT13 IS JUST A SPECIAL CASE OF THE CAESAR

    CIPHER ROT13 A CANONICAL EXAMPLE OF ‘WEAK’ ENCRYPTION ROTATE BY 13 PLACES
  33. BLOCKCHAINLAWCLASS.COM “When Jefferson became America's minister to France (1784-1789), the

    adoption of codes [for diplomatic correspondence] was necessary. Codes were an essential part of his correspondence because European postmasters routinely opened and read all diplomatic and any suspect letters passing through their command.” https://www.monticello.org/site/research-and-collections/wheel-cipher JEFFERSON DISK It is not clear to what extent Jefferson actually used the invention.
  34. BLOCKCHAINLAWCLASS.COM THOMAS JEFFERSON INVENTED A WHEEL CIPHER (JEFFERSON DISK) THERE

    ARE 36 WHEELS AND THUS 36! WAYS TO ARRANGE (I.E. 3.72 X 1041) EACH WHEEL HAS A RANDOM ARRAY OF THE ALPHABET
  35. BLOCKCHAINLAWCLASS.COM ENCRYPT: TURN WHEEL TO DISPLAY THE PLAINTEXT INPUT THEN

    SELECT A RANDOM ROW AS THE CIPHERTEXT OUTPUT MESSENGER ONLY HAS THE CIPHERTEXT NOT THE DEVICE
  36. BLOCKCHAINLAWCLASS.COM ENCRYPT: TURN WHEEL TO DISPLAY THE PLAINTEXT INPUT THEN

    SELECT A RANDOM ROW AS THE CIPHERTEXT OUTPUT DECRYPT: USING AN IDENTICAL COPY OF THE JEFFERSON DISK TURN WHEEL TO THE CIPHERTEXT OUTPUT AND LOOK FOR AN INTELLIGIBLE ROW MESSENGER ONLY HAS THE CIPHERTEXT NOT THE DEVICE
  37. BLOCKCHAINLAWCLASS.COM THE DEVICE WAS DEVELOPED BY MAJOR JOSEPH MAUBORGNE IN

    1917 BASED ON A SYSTEM INVENTED BY THOMAS JEFFERSON AND ETIENNE BAZERIES THE M-94
  38. BLOCKCHAINLAWCLASS.COM ENIGMA POLISH MATHEMATICIANS BROKE THE INITIAL VERSION OF ENIGMA

    BUT THE GERMANS MADE A SET OF IMPORTANT CHANGES INCLUDING CHANGING THE CIPHER SYSTEM DAILY
  39. BLOCKCHAINLAWCLASS.COM SIMON SINGH, THE CODE BOOK: THE SCIENCE OF SECRECY

    FROM ANCIENT EGYPT TO QUANTUM CRYPTOGRAPHY, DOUBLEDAY PRESS (1999) A POPULAR TREATMENT OF THE HISTORY OF CRYPTOGRAPHY
  40. BLOCKCHAINLAWCLASS.COM ENCRYPTION DEFINITION PROCESS BY WHICH INFORMATION IS ENCODED INTO

    A FORMAT ONLY READABLE BY SOMEONE THAT KNOWS THE ENCRYPTION ALGORITHM OR CIPHER
  41. BLOCKCHAINLAWCLASS.COM SYMMETRIC ENCRYPTION - DEFINITION BOTH PARTIES TO A MESSAGE,

    SENDER AND RECIPIENT, USE THE SAME KEY FOR ENCRYPTING AND DECRYPTING THE MESSAGE INFORMATION IS ON A TWO WAY STREET USER MUST KEEP THE KEY SECRET
  42. BLOCKCHAINLAWCLASS.COM ASYMMETRIC ENCRYPTION - DEFINITION USES TWO KEYS FOR HANDLING

    OF INFORMATION INFORMATION IS ON A ONE WAY STREET ONE KEY ENCRYPTS AND OTHER DECRYPTS TYPICALLY KNOWN AS PUBLIC-KEY CRYPTOGRAPHY
  43. BLOCKCHAINLAWCLASS.COM HOW ARE THE KEYS GENERATED? LARGE “RANDOM” NUMBER IS

    USED AS A SEED
 THE LARGE RANDOM NUMBER MUST BE HARD TO GUESS TYPICALLY THIS IS A LARGE PRIME NUMBER
  44. BLOCKCHAINLAWCLASS.COM HASHING - AN EXAMPLE This old man, he played

    three, he played knick- knack on his knee INPUT TEXT E5B2621834F9F271503F12 AB984EF2312EC9CBBF257 AE27DAD7E1BE9F93104F9 This old man, he played three, he played knick- knack on his Knee A4AD6A051622F3E1BEBD90 F434A728DB36A62BB8A62D 59782DA2CB9F575FFCB2 SHA-256 SHA-256 HASH FUNCTION HASH VALUE
  45. BLOCKCHAINLAWCLASS.COM FIVE IDEAL PROPERTIES FOR A HASHING ALGORITHM 5. UNLIKELY

    TWO MESSAGES HAVE SAME HASH 1. SAME MESSAGE RESULTS IN THE SAME HASH 2. QUICK TO COMPUTE THE HASH VALUE 3. ONE WAY STREET 4. SMALL CHANGES TO MESSAGE GENERATE DIFFERENT HASHES
  46. BLOCKCHAINLAWCLASS.COM DIGITAL SIGNATURE HASH ALGORITHMS HASH VALUE SENDER PRIVATE KEY

    SIGNED MESSAGE SENDER RECEIVER SIGNED MESSAGE SENDER PUBLIC KEY HASH VALUE
  47. BLOCKCHAINLAWCLASS.COM DIGITAL SIGNATURE DIGITAL SIGNATURES ALLOWS A USER TO PROVE

    WHO SENT A MESSAGE AND THAT THERE HAS BEEN NO MESSAGE TAMPERING
  48. BLOCKCHAINLAWCLASS.COM MERKLE TREE MERKLE TREE OR HASH TREE IS NAMED

    AFTER RALPH MERKLE WHO PATENTED THE IDEA IN 1979 https://patents.google.com/patent/US4309569A/en
  49. BLOCKCHAINLAWCLASS.COM MERKLE TREE “A MERKLE TREE IS A HASH BASED

    DATA STRUCTURE … IN WHICH EACH LEAF NODE IS A HASH OF A BLOCK OF DATA, AND EACH NON-LEAF NODE IS A HASH OF ITS CHILDREN. MERKLE TREES ARE USED IN DISTRIBUTED SYSTEMS FOR EFFICIENT DATA VERIFICATION. THEY ARE EFFICIENT BECAUSE THE USES HASHES INSTEAD OF FULL FILES.” VIA BRILLIANT.ORG
  50. BLOCKCHAINLAWCLASS.COM MERKLE TREE WHAT IS CRITICAL ABOUT A THE TREE

    BASED STRUCTURE IS THAT NODES FURTHER UP IN THE TREE ARE THE HASHES OF THEIR RESPECTIVE CHILDREN — ANY TAMPERING UPSTREAM CHANGES DOWNSTREAM …
  51. BLOCKCHAINLAWCLASS.COM MERKLE TREE FOR EXAMPLE — HASH 0 IS THE

    RESULT OF HASHING THE CONCATENATION OF HASH 0-0 AND HASH 0-1. THAT IS, HASH 0 = HASH( HASH 0-0 + HASH 0-1) WHERE + DENOTES CONCATENATION
  52. BLOCKCHAINLAWCLASS.COM CRYPTOGRAPHY A REVIEW 1. USED TO PROTECT SECRETS 2.

    PUBLIC-KEY CRYPTOGRAPHY USES KEY PAIRS GENERATED BY USE OF A LARGE RANDOM NUMBER 3. HASHING SECURES THE INTEGRITY OF INFORMATION SENT ON A NETWORK 4. DIGITAL SIGNATURES AUTHENTICATE WHO SENT A MESSAGE AND VALIDATE THE INTEGRITY OF THE SENT MESSAGE
  53. BLOCKCHAINLAWCLASS.COM BUILDING BLOCKS PUT TOGETHER NETWORKS PEER-TO-PEER NETWORKS ALLOW PARTICIPANTS

    TO DIRECTLY CONNECT WITH EACH OTHER AND PERFORM TRANSACTIONS LEDGERS DISTRIBUTED LEDGERS ARE MAINTAINED BY EVERYONE ON THE PEER-TO-PEER NETWORK CRYPTOGRAPHY PUBLIC-KEY CRYPTOGRAPHY PROVIDES THE ADDRESSES AND AUTHENTICATION OF USERS IN THE PEER-TO-PEER NETWORK INFORMATION IS PROTECTED THROUGH THE USE OF HASHES AND DIGITAL SIGNATURES
  54. BLOCKCHAINLAWCLASS.COM WE WILL ALSO DISCUSS ECONOMIC INCENTIVES ASSOCIATED WITH PEER

    TO PEER PARTICIPATION (I.E. CURRENCY, REPUTATION, ETC.)
  55. DANIEL MARTIN KATZ E D U | I L L

    I N O I S T E C H + S TA N F O R D C O D E X B LO G | C O M P U TAT I O N A L L E GA L S T U D I E S . C O M PAG E | DA N I E L M A R T I N K AT Z . C O M C O R P | L E X P R E D I C T. C O M NELSON ROSARIO B LO G | L AWO F C RY P TO C U R R E N C Y. C O M PAG E | N E L S O N M RO S A R I O . C O M F I R M | M A R S H A L L I P. C O M BLOCKCHAINLAWCLASS.COM L A B | T H E L AW L A B . C O M E D U | I L L I N O I S T E C H - C H I C AG O K E N T L AW
  56. @ computational professor daniel martin katz danielmartinkatz.com BLOCKCHAIN, CRYPTOCURRENCY AND

    LAW professor nelson rosario THE BUILDING BLOCKS OF THE BLOCKCHAIN — NETWORKS + LEDGERS + CRYPTOGRAPHY nelsonmrosario.com @ nelsonmrosario BLOCKCHAINLAWCLASS.COM