Introduction to Blockchain Technology. Tiana Laurence

Читать онлайн.
Название Introduction to Blockchain Technology
Автор произведения Tiana Laurence
Жанр Учебная литература
Серия
Издательство Учебная литература
Год выпуска 0
isbn 9789401805049



Скачать книгу

stop the transactions of other users.

      The reason this type of attack is not more common is that there is a high monetary cost. The attacker would need to own enough equipment and burn enough electricity to overcome all the other mining nodes on the network. When there are not enough nodes a 51% attack becomes much easier and if that blockchain’s cryptocurrency is trading at a higher price than what it would cost to overcome the network, then it is simply a matter of time before the blockchain will be compromised.

       Mining’s drive to efficiency

      Bitcoin miners must always improve the efficiency of the equipment they are using. They are fighting a constant battle to lower the cost of power their equipment consumes to generate new bitcoins. Miners are fighting a never-ending battle of speed, since in order to stay competitive in the network they need to have the fastest machines.

      Since Bitcoin’s release in 2009, mining hardware has evolved quickly as those with the most efficient equipment will gain a majority of the bitcoins at the lowest cost. It used to be possible to mine using your computer’s CPUs or graphic cards. However, the competition for new bitcoins has now become so intense, that in order to have a chance at winning any bitcoin, you will need specialized equipment. The computers that mine bitcoin currently use ASICs chips (Application-Specific Integrated Circuit). ASIC mining chips and the hardware architecture are under continuous pressure to develop. Because electricity is traveling across a switch within the chip, the smaller the distance the faster the chip. When you stack ASICs closer together, they get even faster. With this in mind, bitcoin mining with Yifu Guo’s Avalon was 128 nm in 2013, whilst currently ASICs are being taped out for BTC mining closer to the 7nm. New chips become obsolete almost immediately as new faster chips are created, but the promise of easy and lucrative rewards keeps people buying and upgrading their equipment.

      Equipment becomes obsolete quickly for two main reasons. The blockchain itself has rules that increase the difficulty of mining if more computers enter the network. These rules act as a stabilizing force and help protect the integrity of the blockchain history.

      Mining cryptocurrency is a cannibalistic arms race. In order to obtain the most cryptocurrency miners need to have the most efficient mining operations. Miners with the newest equipment and cheapest electricity win the most blocks. However, the consensus algorithms for each blockchain are striving to maintain a constant rate of transaction clearing and generation of its cryptocurrency. The consensus algorithms adjust the difficulty rate to match the hash power generated by the miners. The more efficient the miners become, the more difficult the blockchain algorithms become.

illustration

      Figure 14 The fastest nodes win cryptocurrency.

       New distributed network structures

      Blockchains are distributed ledgers. They create a nearly unchangeable history of transaction records that are maintained by a decentralized network. All records secured in the blockchain have been approved by an agreed-on rule set called consensus. But not all distributed ledgers are blockchains.

      The very public nature of blockchain technology and structure has gained the attention of most governments, banks and businesses. The security that the system offers and the ability to confidently transact with a counterparty directly is fascinating. Many institutions are exploring blockchain technology to create improvements and efficiency in their operations.

      But the very public nature of their records is off putting. Many institutions need to keep their records private for a variety of reasons. And because blockchains are often subject to attack and down times that would crash an economy if everyone switched to using a blockchain system, it is unappealing for a country’s critical systems such as to operate based upon blockchain without complete assurance. Large institutions have been picking apart the elements of blockchain they like best. Many institutions see the benefit of having a shared distributed ledger.

      Distributed ledger technology, or DLT as it is often called, is a network of known parties collaborating in the creation and balances of a shared record. DLT does not have miners, because everyone who has the ledger and the ability to edit has incentives to maintain its integrity. Because DLT has no mining, it has no cryptocurrency. But oddly enough it can be used to issue a token that can operate like a cryptocurrency.

      DLT networks are not decentralized. Whoever creates a distributed ledger has complete control. They manage the structure, purpose and how the network functions. In normal practice there is more than one instance of a ledger’s history stored across many servers, and more than one node works to update and confirm new information. The nodes will communicate with one another to ensure that the most accurate and up-to-date record of transactions is maintained. These types of networks rely on similar principles of consensus just like traditional blockchains. They have rules that help ensure all the nodes are acting correctly, which is important even when all the parties are known.

      In this chapter, you learned more about the history and evolution of technology that led to the creation of blockchains and cryptocurrencies. This chapter has explored the slow evolution of encryption, from the early Roman techniques to the revolution of public-key encryption that allowed for modern conveniences such as email. You discovered how hashes are created and the purpose they serve in blockchain technology.

      This chapter is fundamental as it uncovers the core technologies that are used to create a blockchain. Having an understanding of how these different technologies work and are used demystifies blockchain technology. It reveals its limitations and vulnerabilities.

      After reading this chapter you will be better prepared to lead projects that look to utilize blockchain technology. Your understanding of the limitations and the core functions of the different parts of a blockchain will enable you to make more informed choices when choosing technology and designing your systems.

       1. What is cryptography?

      A. Cryptography is the encryption of data so that it is only known by the intended parties.

      B. Cryptography is the mixing of data so that it is only known by you.

      C. Cryptography is the publishing of data so that it is readable by everyone.

      D. Cryptography is a type of mathematics.

       2. What is the Enigma device?

      A. The Enigma device was invented by the English to confuse the Germans during WWII.

      B. The Enigma device was a computer that changed letters in a message in a complex manner.

      C. The Enigma device was a mechanical cryptography device that changed radio channels.

      D. The Enigma device was a mechanical cryptography device that changed letters in a message in a complex manner.

       3. What is public-key encryption?

      A. It uses an asymmetric pair of keys that everyone knows. When you receive a message, you decode it with your key.

      B. It uses asymmetric cryptography to allow you to send messages across private channels while keeping the content private.

      C. It uses asymmetric cryptography to allow you to send messages across public channels while keeping the content private. It uses a pair of keys, both a public key that everyone knows and a private key only you know. When you receive a message, you decode it with your private key.

      D. It uses symmetric cryptography to allow you to send messages across public channels while keeping the content private. It uses a pair of keys, both a public key that everyone knows and a private key only you know.

       4. What is a private key?

      A.