Вы находитесь на странице: 1из 4

68 SECURITY BITCOIN

The blockchain cycle


Transactions The bitcoin blockchain demands
hashes of a specific form, which
demands miners work hard to
contribute
Memory pool

Iterate hash
calculations
Miner collects until one found
Blockchain transactions with the form
000....x....

Block header
Hash 000....X....
Other metadata

Transaction list
If first to complete, append block to chain

IN BLOCKS
2014 WAS NOT good for bitcoin as a digital Confidence in bitcoin’s keep track of all the money in the system.
currency. After surging in value from $100 value is sliding after a less- Without some form of universally-
to more than $1,000 per bitcoin by the end of accepted ledger, it would be easy for people to
2013, the price slipped and slid all the way than ideal 2014, but money ‘double spend’ by sending money to someone
through last year to sink just below $200 by may not be its legacy. Now and then sending it again to someone else.
mid-January. The virtual currency was hit the aim is to secure users’ Nakamoto’s answer was the blockchain: a
by a number of issues including the collapse
of the Mt Gox exchange, which saw more
funds and reduce the risk growing chain of numbers that encapsulates
the history of every bitcoin ever created. But
than half a million bitcoins go ‘missing’. of ‘double spending’ with it could also be the transactional history of
Yet 2015 could be good for the the introduction of the just about anything that can be traded in a
underlying technology. Despite these blockchain. virtual space. Even if the value of the bitcoin
failures of confidence, underpinning evaporates as quickly as it spiralled upwards
bitcoin is a concept that could in the style of the financial manias that
change the nature of ensuring trust preceded it, the blockchain could live on.
online, using its infrastructure to
authenticate any transactions without
By Danny Bradbury Writing in January for the Brookings
Institute, venture capitalists Mohit Kaushal
the need for a central authority. and Sheel Tyle put forward a number of
Even the concept’s creator went missing businesses and services that could benefit
without a trace. Under the name Satoshi from the blockchain’s mechanism for
Nakamoto, the inventor of the blockchain ensuring trust. Several projects are already
published a paper in late 2008, titled ‘Bitcoin: moving beyond bitcoin’s usage model as a
A Peer-to-Peer Electronic Cash System’, in blockchain for storing value.
which he proposed the system of electronic Examples of this include Stone, which
cash. Such a system needs to let the P2P enables people to publish their own messages
network’s members be autonomous, and yet in the blockchain, and Proof of Existence,

Engineering & Technology March 2015 www.EandTmagazine.com

C2201_R19862_Feature_60.BK.indd 68 11/02/2015 15:11


69

Market Blockchain
price size,
(US$) (MB) Source: blockchain.info

1,300

1,200

1,100

1,000 100,000

900 10,000

800 1,000

700 100

600 10

500 1.0000

400 0.1000

300 0.0100

200 0.0010

100 0.0001

0 0

Jan 09 Jul 09 Jan 10 Jul 10 Jan 11 Jul 11 Jan 12 Jul 12 Jan 13 Jul 13 Jan 14 Jul 14 Jan 15

WE TRUST
which hashes documents uploaded by users, “The blockchain is not good at storing depends on the blockchain’s most innovative
creating a timestamping service that proves and indexing arbitrary data,” warns Gavin principle: its consensus algorithm.
they existed on a certain date. Counterparty, Andresen, chief scientist at The Bitcoin Someone cannot simply decide to add a
a service for creating custom tokens built on Foundation and formerly lead developer for new block and expect it to be accepted. The
the bitcoin blockchain, says they can be used bitcoin who worked online with Nakamoto block has to take a specific form that is
for everything from crowdfunding to voting. during the cryptocurrency’s early days. computationally difficult to create. The block
These applications all embed their needs to be accompanied by a ‘hash’, a code
own information into transactions on Blocks on blocks generated arithmetically from the data
the bitcoin blockchain, often using a part We can think of the blockchain as a inside the block. Hashes are widely used to
of the transaction record built to store digital skyscraper, with each floor built encode data such as passwords because it is
extraneous information. But the more on top of the one beneath. Each floor is a very difficult to calculate the source data
things people try to store, the bigger ‘block’ of data, containing information from its hash. By hashing a password entered
the blockchain grows. Its nature means about the transactions that happened on by a user against the stored hash, software
that old data cannot simply be archived the network while that block was being can authenticate or reject the user with a
away. Each part of the chain is based on created. In bitcoin, a new block is created much lower risk of exposure in the event of
its predecessors – it’s one of the features roughly every 10 minutes. This creates the list of password hashes being stolen.
that makes it possible for many different an ever-lengthening tower of blocks. Hashes have another property – it is
people to contribute to the blockchain. Detailing every single transaction ever extremely difficult to predict any digit in a
The piggy-backing on the blockchain has created in the network, the blockchain is hash’s result from the source data except to
caused consternation among people already open and transparent. Anyone can download compute the entire hash itself. Changing a
concerned about its ever-increasing size. and explore it using software tools to find out single byte of the input information will
Bitcoin’s blockchain more than doubled to which addresses transacted with each other, completely alter the hash.
reach 26GB in 2014 – its fifth year of when, and for how much. Hashes are consistent, however.
existence. During its first two years, the If there is no central authority, who is in Rehashing the transactions in a block should
blockchain barely needed 1MB of space. charge of adding blocks to the network? This produce the same hashing digest that is >

www.EandTmagazine.com March 2015 Engineering & Technology

C2201_R19862_Feature_61.BK.indd 69 12/02/2015 14:43


70 SECURITY BITCOIN
The board from a
dedicated bitcoin
mining machine

MONOPOLY AVOIDANCE
POWER BASE
The blockchain sounds like an
attack-proof mechanism, but there
are potential issues. One of them is
consolidation of power.What happens
if a single actor gains control of most of
the network?
Controlling more than half of the
hashing power in the blockchain would
enable a malicious party to persuade its
nodes to accept a fraudulent version of
the blockchain instead of the real one,
effectively outvoting legitimate miners,
and resulting in what’s known as a fork
in the blockchain. This exploit, known
as a 51 per cent attack, has so far been
theoretical. But it is far from impractical.
Mining pools are a popular way for
individual miners to generate bitcoins in
the network. They join their mining power
together to hash blocks, jointly increasing
the chance of a payout, and then share the
proceeds. This puts all of their computing
power in the control of a central player.
In June 2014, CEX.IO, which runs the
Ghash.io mining pool, vowed not to run a
51 per cent attack against the network
after it approached 50 per cent power. The
pool imposed a 40 per cent cap on its own
network share to allay concerns.
Mike Hearn, a former Google engineer
and a strong contributor to bitcoin’s core
code base, has implemented a Java
version of the algorithm called BitcoinJ. He
has various solutions to the 51 per cent
problem, including using decentralised
mining pools that don’t require trust in a
single mining pool operator. However, he
has pointed out that these are fraught with
problems such as technical complexity.
Others suggest that the 51 per cent
attack, while technically doable, is a form
of mutually-assured destruction.
“Most large-miners (which happen also
to be ASIC chip manufacturers) have a
high-stake in bitcoin because of their < already stored in that block. If it doesn’t, after it to account for its altered hash digest.
investment in design and hardware,” says the transactions have been altered. As blocks age in the blockchain this becomes
Sergio Demian Lerner, the co-founder of Still, why couldn’t someone preserve the harder to do, making them increasingly
several alternative cryptocurrencies to deception by simply replacing the hash in a secure.
bitcoin, and a security auditor at bitcoin block that they wanted to alter with their Hashes such as those used to store
security consulting firm Coinspect. own, fraudulent hash? This is prevented by a passwords can be calculated very quickly.
“It is reasonable to think they will not feature in the blockchain that links the But the consensus algorithm makes
erode the public confidence in bitcoin by blocks together. miners work artificially hard for a hash
reaching a high percentage of the network that will be accepted by the network.
mining rate,” he adds. The hashing process The hash generated for each block has to
By co-opting the network, an attacker To verify any block’s transactions, have a specific format. Bitcoin demands
would destroy bitcoin’s monetary value, it isn’t enough to simply rehash its it starts with a group of zeros. Because
which would be counterintuitive for transactions and compare that hash to it is impossible to predict what digit will
someone who was earning significant the one stored in the block. The digest be at any position within a hash from the
mining rewards, paid in bitcoin. However, stored in the preceding block must be source data, the computer creating the hash
the incentive to tamper might arise if a included in the hashing process. must run the computation repeatedly to
blockchain were used for purposes other Because all blocks are linked together find the digest with the required number
than storing money, such as sending sequentially in this way, one block’s hash of zeros at the beginning by adjusting a
messages or storing other information. affects the hashes of all following blocks. value within the block’s digest known as
“It will take some time and some failed If any block’s hash were to be altered by the ‘nonce’, named after the concept of
experiments to find a solution that changing its transactions, it would alter the nonce word – a word used so rarely
combines the secure, decentralised the hash of the next block, which would, that it never enters the language proper.
ledger that is a blockchain with some in turn, alter the hash of the next block, To encourage people to devote compute
reliable, massively scalable, searchable and so on all the way through the chain. resources to running bitcoin’s network, they
data storage solution,” Lerner says. To fraudulently alter a block, an attacker are rewarded for coming up with appropriate
would need to rehash every block that came hashes with more bitcoins. The first

Engineering & Technology March 2015 www.EandTmagazine.com

C2201_R19862_Feature_60.BK.indd 70 11/02/2015 15:11


71

GAS GUZZLERS
DIFFERENT ALGORITHMS
Although it is effective, the bitcoin bitcoin took the equivalent of 16 gallons of
proof-of-work mechanism has become petrol to calculate.
problematic. The mining difficulty set by “I think we’ll see the idea go off in
the network adjusts according to the total various directions, probably by replacing
computation power available. As more proof of work with something different, not
people pile into the network, and begin for bitcoin but in alternative coins,” says
buying more powerful, dedicated ASIC Mike Hearn, one of the contributor’s to the
equipment to mine with, the difficulty bitcoin code base.
skyrockets. What other consensus algorithms are
Consequently, bitcoin’s proof of work available? One of the most experimented
algorithm chews through computing with is proof of stake, in which coins are
power. As of November 2014, the awarded based on the number of coins
computing power of the entire network already held.
stood at 3,546,954 PetaFLOPs, whereas the “Ideally, [we should] eventually
world’s top 500 supercomputers only used deprecate the old proof of work-based
309 PetaFLOPS. This translates to a lot of bitcoin, as it’s an environmental tragedy,”
energy usage. Back in April 2014, a single advises Vitalik Buterin, head of Ethereum.

of hours contributed to a project.


‘The blockchain is not good Projects such as Ethereum, Mastercoin,
at storing and indexing and others are still embryonic. As they move
arbitrary data,’ Gavin forward, advocates believe that they will
Andresen, chief scientist at succeed in usurping bitcoin, the incumbent
blockchain implementation.
The Bitcoin Foundation “Bitcoin the protocol is guaranteed to be
eclipsed. It’s already outdated technology,”
warns Buterin.
in some cases, some competing ones. History is littered with examples of
“Notary chains are a simple and effective incumbent technology implementations that
solution for proof of publication and have been displaced by rivals, shattering the
metadata storage,” says Ron Gross, market into many alternative
co-founder of Mastercoin, a protocol for implementations and leaving the original
building and trading custom smart tokens on trailblazers forgotten.
top of the bitcoin blockchain. The Bitcoin Foundation’s Andresen is
Notary chain systems, such as the one predictably sanguine. “Bitcoin isn’t perfect,
operated by Factom, enable users to record but I think it is good enough to win, and it is
immutable entries in a chain of their own. designed so it can evolve over time,” he says.
These entries represent anything created by
a transaction, from a tweet to a video file or Interoperable blockchains
the deeds to a house, and they are stored with As people grapple with the problems
extensive metadata. of a growing blockchain, a gaggle
The notary chain then uses a decentralised of alternative implementations in a
network of servers and nodes to successively relatively new space seems inevitable.
producer of each successful hash receives a hash these entries into a single digest that is The important thing will be for these new
bonus transaction, known as a coinbase, then embedded into the bitcoin blockchain. A systems to interoperate, says Charles
which pays a predefined number of bitcoins single digest could represent thousands of Hoskinson. A cryptography expert and the
to their address. They also collect any notary chain entries, which can themselves creator of a Udemy course on bitcoin’s inner
transaction fees that people on the network be traced back to their original sources workings, Hoskinson is also the co-founder
have paid to ensure that their transactions through the notary chain. and former CEO of Ethereum.
are hashed in the block. An alternative is sidechains, which are “There has to be standardisation, not
To ensure bitcoin ‘miners’ do not come alternative blockchains designed for specific domination or assimilation,” he says,
up with hashes too quickly by deploying applications. A recent white paper, with “standardisation in terms of how
more powerful computers, the network’s contributors including core bitcoin blockchains will communicate with each
‘proof of work’ algorithm alters the developers, proposed a system in which other.”
difficulty of the task to suit the amount bitcoin’s blockchain would be a ‘parent’ The broader benefits could be immense,
of available compute performance. In chain, from which bitcoins could be Hoskinson adds, and in fields that many have
bitcoin’s case, this involves changing the transferred to an alternative blockchain. barely yet thought of, such as accounting.
number of leading zeros in the hash. More There could be many of these sidechains, “With blockchains, you have transaction
consecutive zeros means more work. each representing specific types of asset, the histories back to the beginning,” he says. “If
The structure of the bitcoin network has paper suggested. you can internalise it and merge with GAAP,
made hashes so hard to calculate, the Some platforms have moved away from then every single penny could be accounted
network now almost completely runs on using the bitcoin blockchain altogether. for by this incorruptible identity.”
special-purpose computers built solely to Ethereum, led by Vitalik Buterin, uses its These applications, and others such as
generate hashes. own blockchain to create ‘smart contracts’. identity management, are only beginning to
These are contractual agreements, emerge as concepts in the nascent world of
Dealing with bloat written in executable code, that carry out the blockchain. As a fundamental step
There are some complementary technologies instructions based on predefined conditions, forward in computing, it has too much
in the works to make these enhanced uses such as an equity ownership contract that potential to fail – no matter what happens to
of the blockchain more efficient and, changes dynamically with the proportion bitcoin as a payment network and currency. *

www.EandTmagazine.com March 2015 Engineering & Technology

C2201_R19862_Feature_60.BK.indd 71 11/02/2015 15:11

Вам также может понравиться