3. Blockchain Basics & Cryptography

💡Tryout HIVEOS Entirely Free:

The following content is
provided under a Creative Commons license. Your support will help
MIT OpenCourseWare continue to offer high quality
educational resources for free. To make a donation or to
view additional materials from hundreds of MIT courses,
visit MIT OpenCourseWare at ocw.mit.edu. GARY GENSLER: I
just want to say how touched I am that you
are all still here. I really– you know, there's a
lot of shopping opportunities in the MIT courses. And that you have come
back and not shaken loose after reading
Satoshi Nakamoto's peer-to-peer Bitcoin paper,
or maybe you just came back to see whether I was going to
crash and burn describing it. But what we're going to try to
do in the next three classes, just to frame it,
is really give you some of the technical
underpinnings of blockchain technology
through the lens of Bitcoin.

Bitcoin is just the first use
case of blockchain technology. So if I often say Bitcoin
this or Bitcoin that, it's really largely– not entirely–
largely applicable to blockchain technology. My feeling is I'm only about
eight or nine months ahead of all of you. I may have spent my
whole professional life around finance and
public service, and I can talk a lot
about markets and about public policy, but
MIT has given me the gift of thinking about
blockchain technology. And I'm trying to return that
gift a little bit for you all.

And I have a few
computer scientists in the room that are
going to bail me out if I don't get this right. Sabrina, and then, oh, I
see Alin is putting up his– do you all know Alin? He's actually a PhD student
at MIT, computer science. So somebody gets to that
part of their life– AUDIENCE: Terrible life choice. GARY GENSLER: Yeah, yeah. What was that? AUDIENCE: Terrible life choice. GARY GENSLER:
Terrible life choice. Yeah. But he's going to
bail us all out. But the reason that I think it's
relevant not to just belabor it, is I really believe
the only way that any of us can get to ground truths is
to know a little bit about how the inner workings of
this technology are. You're not going to
have to do an algorithm or actually do a hash function,
but to know underneath it.

And then you can
step away and say I no longer need to know how
the carburetor on the car works, but I know what a carburetor is. Or, you know, whatever
analogy you want. So with that little
bit, as opposed to sort of all of that
Socratic cold calling that I did last
class, because money, Fiat currency is
something at the core, and ledgers is at the
core of a Sloan student's either education or background,
this a little less of the core. If today's and the next
couple of lectures, if you can work with me then
I want you to interrupt me anytime you've got a question. I'm not going to do
much cold calling. I don't want you
to relax too much. I still want you to do the
readings the next three classes. But just raise your
hand, stop me, say, well, but what is that all about. And that just sort
of we can work a little bit different
on these next classes. So, as I'm always going
to be doing, consistency. What are the study questions? So really, what are
the design features? What are the key design
features of this new technology, blockchain.

And I put a few on the syllabus. And we're going to go through
all this today and next week. Cryptography,
append-only, timestamps blocks, distributed consensus
algorithms, and networking. I list four. Later in this lecture,
you'll see 8 or 10 that– I guess it's 10 that we're
going to really dig dig into. Can I just get a sense
of the class and this is not for Talita or
Sabrina to write down notes about participation. Is it a decent assumption,
did most or all of you at least read Nakamoto's paper? All right. Good. All right, great. Just a sense, how many of you
felt you got at least half of it, maybe less than 2/3,
but at least half of it? All right, pretty good.

When I first read it,
I was right with you. So it's all right. Alin you got more than
half of it, right? AUDIENCE: I read it
five years ago, so. GARY GENSLER: You read
it five years ago. Yeah, yeah, yeah. Yeah, life choices,
talk about it. All right. And you're taking this class. Good, good. So we'll go through
each of those. And then more
specifically, we're going to peel back
the cryptography. The two main cryptographic
algorithms, or these words that you'll hear sometimes,
cryptographic primitives– Alin, what is a
cryptographic primitive? AUDIENCE: Oh, it's
a wild beasts. There are so many of them. GARY GENSLER: Yeah, but what's
the two words together mean? AUDIENCE: Well,
that's I'm saying. It could be anything. It could be a hash function,
could be encryption function, could be a very powerful
computation scheme, it could be a data outsourcing
scheme, could be a data access privacy access.

GARY GENSLER: But
it's anything that basically protects
the communication in the presence of adversaries. AUDIENCE: Well
it's also something that you can use to prove that
computation was done correctly on trusted servers. It's not just communication,
it's also computation. GARY GENSLER: So
communications and computation that needs to be
protected or verified, have some form of
cryptographic algorithm, which happens to be called
a cryptographic primitive. The two main ones– and there's a third one
we'll talk about later in the semester– but the two
main ones, hash functions, just as a working knowledge of
blockchain is worthy to know, and we're going to get–
everybody's going to get there. We're going to all
get there to where you have some sense of
what a hash function is. And then this whole concept
of digital signatures, which relates to
asymmetric cryptography.

Those two are very fundamental
to blockchain technology. Later in the semester,
we'll talk a little bit about zero knowledge
proofs, but they're not as fundamental to the
first application. And so that's why
they're kind of– and they help make things
verifiable and immutable. And that's the business
side, the market side. Why does it matter? Otherwise, like, who cares
what's in the carburetor if it doesn't matter? And then how does this
all relate to the double spend problem? I can cold call on this.

Isabella, do you remember
what the double spending problem was from? AUDIENCE: It was when they
would use the same coin, I guess, and they would
use it multiple places and other digital
wallets [INAUDIBLE].. GARY GENSLER: All right. So in essence, a
double spend is when you have a piece of information
and you use it twice. And we happen to call this
piece of information "money," but you use it twice. You can send an email to
two people and that's OK. I mean, it's a
little embarrassing if you're sending it to
one friend telling them you're available for
dinner and the other friend thought you told them
you weren't available. But you can still
send it to two places. But in the system of money,
it's a critical thing that you don't use it twice. The readings, was
the demo helpful? I mean, we're going to
do a lot more on that.

I watched that demo
last November, December. That was one of the
first things I watched. From an MIT student. I don't know if
you knew Bosworth. And I found it very
helpful, so I'm glad. And I see it's actually
that demo is on a Stanford blockchain course as well,
so the West Coast, one of our competitors is
using an MIT product. And so we're going to just
do a slight review of what we did in class 2. And then we're going to
talk about the key design features, hash functions,
as I mentioned, what is an append-only log,
block headers and Merkle trees, and asymmetric cryptography
and digital signatures.

Crazy. We're going to cover
all five of those today. And then you're going
to tell me how we did. Oh, Bitcoin addresses,
which is just a small thing. Six, actually. So last time, for those of
you that weren't with us, we talked about money. And again, money is
just a social construct, or an economic
consensus mechanism. We're going to talk
a lot about consensus next Tuesday when we
talk about the consensus protocol on Bitcoin. But remember, money itself
is just a consensus. There was a question
on Tuesday, I think Alin actually
had asked this question about well, what
does it mean to be a liability in the central bank? Why is money, what does
that actually mean? And I said it just means that
somebody else will accept it.

It's a social consensus
because it's not that they're going to
give you anything else. It's just that you can
get a bank deposit, you can pay your taxes, you
can use it at Starbucks, if in fact, you've already
gotten a cup of coffee. If you remember, it's only
legal tender for a debt. And so forth. Fiat money is just
in that long line. But it's had its challenges
and instabilities. It doesn't mean it's
going to go away. I'm not a Bitcoin maximalist who
thinks that Fiat currencies are going to go away. But Fiat currencies have their
instabilities, particularly around weak monetary policy. In essence, when you debase a
currency and allow a lot of it to be issued, or usually
around unstable fiscal policy.

So either the government
is spending a lot, the King is off to foreign
wars, and the Bank of England was actually set up in the
late 17th century in essence to control the currency
when the King was– of England, I think– was in wars with
France, if I can recall. A lot of banks, central
banks, were set up right about when a sovereign was
off debasing a currency and spending too much at war. Ledgers, we talked
about ledgers, how critical ledgers are. In essence, ledgers are
a way to keep records. And those records could
either be transaction records or balance records. We'll see that Bitcoin is set up
as a transaction ledger system. Later we're going to be
talking about other blockchain technologies that are set
up as balance ledgers. So one should not just
think immutability that there's only
one way to do this. But transactions and ledgers
are at the core of Bitcoin.

And central banking is of
course, built on ledgers. The master ledger of the
central bank, and then the commercial banks have
sort of the sub-ledgers. And then you can think
sometimes your digital wallet, maybe Starbucks has yet
a third tier ledger. We obviously live in an
electronic age already. We know this. There's been many
efforts, they've all died until Bitcoin
to crack that riddle that we talked about,
peer-to-peer money without a central authority. And later in the
semester when we talk about what
are the use cases, that's going to
be the core thing. It's why I'm not a maximalist.

I'm not sure in
every circumstance a central intermediary
isn't necessarily so bad. And this is not
a value judgment. It's just pure money and
markets and so forth. But in some circumstances,
decentralization really will compete and beat the
centralized intermediary. So let's talk about his little
paper, which of course he was modest, or she was modest. Please remind me, we don't
know who Nakamoto is or was, or a group of people. "I've been working on
a new electronic cash system that's fully peer-to-peer
with no trusted third party." So you've seen
this slide before. But a time stamped
append-only log. Just think blocks of data.

To kind of oversimplify, but
it's got a name, blockchain. And I don't think–
did Satoshi's paper, you all read it in the
last few days, I of course read it again yesterday just
to make sure I remembered it, I don't remember that he ever
used the word blockchain. Am I right about that? Right. So the words
blockchain are really– have been sort of layered
over his innovation. So information, blocks going on. And that leads to
basically a database. But it's the blocks of data. Bitcoin right now is
about 550,000 blocks, and the blocks are added on
average every 10 minutes. And we'll talk about why it's
every 10 minutes, and not only why Satoshi Nakamoto
made it every 10 minutes but how they maintain that. Other blockchains like Ethereum
it's about every seven seconds. So don't get too caught
up that it's all the same. And there's some technologists,
here Silvio Micali is working on Algorand
and that's even tighter, less than seven seconds.

So there's not one way. There's multiple designs on
how often blocks are added. But let's start with Bitcoin. Secured by yes,
guess what, those two cryptographic primitives,
hash functions and digital signatures. Lose anybody yet? Yeah? Maybe. And then there's a
consensus for agreement. The whole debate
usually about databases is who gets to change the data. And this is true
in all databases. In its essence, it's
usually centralized.

But in blockchain, it's all
a sudden, well, maybe it's not centralized. Who gets to add that next bit
of information, that next block? And the consensus agreement is– which we'll discuss
next Tuesday– is about that very issue. And I think there was
a little pretty picture of that done in slides before. But I'm going to I'm going
to delay that discussion until next Tuesday. And hopefully you'll
all come back. So what are the key features? And I might do a
little cold calling. Do you remember any
key feature, Tom? From the papers? AUDIENCE: Oh, boy. GARY GENSLER: It's all right. AUDIENCE: Yeah. You know, the hash function. GARY GENSLER: Hash function. Any other key features? Let's see how many. I'm going to have
10 on this page. AUDIENCE: A private
and a public key. GARY GENSLER: What is that? AUDIENCE: Private
and public keys. Private and public– GARY GENSLER: Oh,
private and public key. Yes. So asymmetric cryptography,
or private and public keying. Yes, hash functions, yes,
private and public key.

Any other kind of
key design features, or words you didn't understand? Maybe that's another
way to put it. Leandro. AUDIENCE: Addresses. GARY GENSLER: What's that? AUDIENCE: Addresses. GARY GENSLER: Bitcoin addresses. Three. AUDIENCE: Timestamp server. GARY GENSLER: Timestamp server. That's four of the things. This is going well. [INAUDIBLE] AUDIENCE: Double payments. GARY GENSLER: Double
payment is something that it's trying to address. It's not really
a design feature, but it's a– they have a
solution for double payment, so I'll give you
a credit for it.

But it's– AUDIENCE: Miners. GARY GENSLER: All right. So Hugo says miners, which
is really the consensus. So I'll say that the
design feature is the consensus or proof of work. Kelly. AUDIENCE: The full node
versus the lightweight node. GARY GENSLER: Right. So very interesting,
this concept of nodes. And Satoshi actually
talks about full nodes or lightweight nodes. In essence, how much
information has to be stored. I want to reserve that. Kelly, please remind me
when we talk about block headers to come back to that. But nodes in the network is a
very important design feature. Over here. AUDIENCE: The Merkle
tree structure.

The Merkle tree structure. GARY GENSLER: Merkle
tree structure. So Merkle tree structure is a
way to compress a lot of data, and also to sort
through that data. Uh-oh. No, Sabrina's not going
to clean me out here. Merkle tree structure is there. We're going to talk about that. Two more. AUDIENCE: Nonce. GARY GENSLER: What's that? The AUDIENCE: Nonce. GARY GENSLER: Nodes. All right. What's that? AUDIENCE: Nonce. GARY GENSLER: Nonce.

The nonce. OK. So a nonce. Anybody know what
the word nonce is? A year ago I didn't. So this– so we're
all getting there. What, do I have a look, do
you know what a nonce is? Yeah. AUDIENCE: In the
actual protocol, it's essentially a guess
for the miners to kind of– GARY GENSLER: So
the word "nonce" means a random number
that is used once.

N for number, and "once." It's a number that's
random and it's used once. That's how I've learned it. Whew. And so one more, because
this is great, actually. AUDIENCE: Peer-to-peer. GARY GENSLER: Remind
me your first name. AUDIENCE: Pria. GARY GENSLER: Pria. Peer-to-peer. All right. So this is what I have. Cryptographic hash functions. We're going to go through
these in more detail. Timestamped append-only logs,
block headers and Merkle trees. So Merkle trees were discussed. But we need to actually
say what information is kept at the head of the block
as opposed to all the body. And some of that's just to
make it more manageable. Asymmetric cryptography,
which is this public key, private key, and signatures.

The Bitcoin
addresses themselves, which interestingly are a little
bit different than public keys. And then I breach break
because in the next, we're going to talk about next
Tuesday, the proof of work, the miners, the then the
nodes, the nonces, they're are all in that little topic. There's actually in Bitcoin
a really important protocol is how information gets
propagated on the internet. Just the network communication. It's not written about a lot. You won't read a lot about it
in Nathaniel Popper's Digital Gold or all the
other popular books, but it is an important
thing to remind ourselves that information has to
propagate around the internet and all these transactions have
to communicate with each other. There's currently about 10,000
nodes on the Bitcoin network.

We don't know where
all of them are, but they're probably in
180 different countries. And so it's just– also the networking and
communication matters. And it matters to
the economics a lot. There's a native currency. This is interesting that it was
the one thing that no one said. That's an actual
technological design feature. It's not only that he
created a currency, but the native currency is
part of the economic incentive system. And we'll have
some fun with that. In essence, he
said that when you mine and did the proof
of work, you created and you've got some native
currency called Bitcoin. So he created an economic
incentive system. Whomever Satoshi
Nakamoto was or is knew a lot about economics,
as well as technology. Yes. AUDIENCE: I just wanted to
quickly add to what you said. So it's not only that he
created this native currency, but wants the finite supply
has reached, the currency can be distributed as
a transaction fee, which I think is very
important in [INAUDIBLE]..

GARY GENSLER: And remind
me your first name? AUDIENCE: Daniel. GARY GENSLER: So
what Daniel just said is really interesting. Not only to take light of
this individual or individuals that did this. But this world of Bitcoin
and other cryptocurrencies creates a unit of account
that could be valued. And once it's valued, you have
sort of a native currency. But as Daniel
said, Nakamoto also said there would
be a finite limit. It happens to be
21 million Bitcoin is the most that it
can be, and we'll get there around the year 2040. Does anyone know how many
Bitcoin there are right now? About half of you
were investing in it. Hugh? Hugo? About 17 million
Bitcoin right now. And all 17 million have
come from this process of proof of work and mining.

Initially it was 50
Bitcoin every 10 minutes, roughly every 10 minutes. Then it went down
to 25, and we're now at 12 and a half Bitcoin. And does anyone know what
today's value purported– I always should say
purported value of Bitcoin, because I don't
know if we can trust some of those websites that
say with the values are. What is it? AUDIENCE: $6,500. GARY GENSLER: So
$6,500 of Bitcoin at 12 and a half
Bitcoin to mine a block. So you see that
it's about $80,000 US is the reward to
mine a block, right? So he created an
incentive system that initially, if you
got 50 Bitcoin and they weren't worth a penny, you
would not commit that much. You had to be a hobbyist,
basically, in 2009, or a cyberpunk, or
just kind of curious. Because you weren't
getting much incentive. If in fact it's
worth 6,500 today, you're getting $80,000 if you
actually successfully mine a block.

And then there's the
transaction inputs and outputs. Think about a check, who signs
it, where you move money. There's something called the
unspent transaction ledger. So this is the ledger part. So when you think– I think of the
technology, I think of cryptography,
which is kind of all that stuff at the top which
we're going to discuss today. Secondly, the
consensus mechanism. In essence, that's
that key question of any database, who gets
to amend the database? Who gets to decide to change the
state of what we all agreed to? And then thirdly, is the ledger,
or the transaction ledger, which we're not
going to deep dive into the scripting
language, but we are next Thursday going
to talk a little bit about the underlying scripting.

Does that give you a path
that's all this cryptography, the consensus, and
then the transactions. Yes. AUDIENCE: I have a question. GARY GENSLER: And
your first name? If everybody just
says first name. AUDIENCE: Oh. I'm just curious, so
you mentioned that– GARY GENSLER: I'm curious
about your first name. AUDIENCE: Sean. GARY GENSLER: All right. AUDIENCE: So just
curious, you mentioned that the block value is
roughly $80,000 US as of now. So just curious, in
terms of the CPU power, the electricity that will be
consumed to mine the block, how much does that translate
to equivalent US dollar terms? GARY GENSLER: So the
question that's asked is how much electricity is
being consumed for that miner to get that reward,
that $80,000.

And I'm going to try to
answer in one minute. But we'll come back to this
later in the semester about economics, and blockchain
economics, and mining economics. But what has happened
over these 10 years is more and more
computers are being used, or are trying to
mine for the Bitcoin. And so today in the most
recent research I've seen is that the probability
of winning a block– there's so much– is it
measured in terahashes? I can't remember the numbers.

But it's how many terahashes,
which, is it 15 zeros Is a terahash? Is it that, or is it 12? Well, in any event,
there's so many hashes being done a second, x
number of terahashes, that your probability
of winning is quite low. And so what's happened
is most nodes and miners have entered into agreements
called mining pools, where they smooth out the
risk and everybody shares in the rewards. But those economics
we'll talk about later, it's thought to be that
you need electricity cost around $0.03 a kilowatt
hour to be successful. And in most parts
of the world you can't get electricity for
$0.03 a kilowatt hour. So you would put
your mining rigs where you can get
low cost electricity or where you possibly can– you can get it legally low
cost or illegally low cost. So there are a
lot of mining rigs and in jurisdictions where there
may be local officials that are allowing those
mining rigs, and instead of $0.03 a kilowatt hour
to the electric company it's $0.01 to $0.02
cents a kilowatt hour to the local
government officials. And the two largest
mining pools are in China.

And the third is in Russia. But we'll get into
the sort of economics and at least some theories about
why some are where they are. So cryptography. So Alin's probably
going to clean me up. It's not just communication in
the presence of adversaries, it's also computation in
the presence of adversaries. That would be good. And we talked about– we're
not going to deep dive. If you remember, even in ancient
times if you were going to war there was this
wonderful little way that you could do cryptography.

And then anybody who's
seen imitation games about the British breaking
into the German codes, even though they
should have probably given more credit to the Polish
government that had probably broken into it in the 1930s,
but Turing did great work. And then we're going to talk
about asymmetric cryptography today. All right. What is a hash function? A hash function, and these are
just words that I think of it, I think of it as a
fingerprint for data. But it has certain properties. The one that you'll
see throughout is that it takes
inputs of input x. It maps that input of
any size to a fixed size. So one that we use
here in the US, one hash function we all
use is zip codes, in a way. It's five digits,
it's a fixed size. I know I'm doing this as a loose
hand, how can I think of it. But zip codes. You might have 50,000 people
or 5,000 people all living in one postal district. And you can map them to zip
codes, and it's a fixed let.

Now, I don't know whether my
friends in the computer science departments– but it's an
early sense of a hash function. I just wanted to say there are
tangible things in our life that act like hash functions. Problem with zip codes
is it will not in any way be a secure hash function. And you'll see that in a minute. But it does take– you can be a 300-pound
person or a 30-pound kid and you still map into
the same zip code. It's deterministic. It's always the same. So if you take a
certain set of data, it will always give
you the same hash. And that's relevant
to the background. And you can
efficiently compute it. You don't want to take
a year to do this. You've got to do it in
short periods of time. And in Bitcoin's case,
it's done in nanoseconds or less, because they're one
computer, one CPU can do– can't remember, probably–
how many millions a second? AUDIENCE: Couple of
terahashes a second.

GARY GENSLER: Couple
of terahashes a second. So it's a remarkably
efficient algorithm. And so a bunch of
mathematicians– and hashing started in the 1950s
and '60s, but the ones that we're talking about
here are much more recent. But it's really
terrifically talented scientists, mathematicians,
computer scientists, and sometimes the National
Institute Standards of Technology here in the US
working on hash functions. So it takes a array of any size,
puts it into a fixed number– I think zip codes for a minute– it's deterministic. It's always– you only live
in one zip code, in a sense. And it's very efficient. But now what are its
cryptographic properties? Because a zip code
wouldn't make it. It just wouldn't. Well, the computer
scientists use this term preimage resistant. I would just say
it's one way, you can only go one way, meaning
it's infeasible to determine the input from the output. It's infeasible to determine
the x from the hash of x. Does anybody know why I use
the word infeasible rather than impossible? AUDIENCE: [INAUDIBLE] GARY GENSLER: First name? AUDIENCE: Brotish.

GARY GENSLER: Brotish AUDIENCE: Because we can
do it with brute force. GARY GENSLER: So you might be
able to use it brute force. What do you mean by brute
force, just so everybody– AUDIENCE: Try all the options. GARY GENSLER: Try all options. But as I understand it, a
sort of tenet of cryptography for centuries is not to have
it mathematically impossible, the point is getting
it so infeasible that your adversary can't
either get the communication or so forth. So hash functions,
I just say this because you can't assume
that Bitcoin can't be broken. We all call it immutable. It is immutable. Until the hash functions
that are inside of Bitcoin might be broken.

And even Satoshi wrote
about this in 2010. He got emails. There's this wonderful
book if any of you want that I mentioned in
the bookshelf at the end of the syllabus, he said, well
what if a SHA-256, which is the hash function, gets broken? And his answer, by
the way, was well, there will be a better
hash function at that time. Whatever that is, we'll
hash the entire system, whatever that is. Because remember, you can
take something of any size, hash it with a new
system, and move forward. And so he or she felt
in this wonderful email is that Bitcoin actually
could transition to a new hash function as long as you
had a little bit of time before it was all corrupted. Kelly. AUDIENCE: Is this what his
article called the Gambler's Ruin problem? Is that we you're describing? GARY GENSLER: The
Gambler's Ruin problem.

AUDIENCE: The probability that
an attacker could catch up to recreating it. GARY GENSLER: OK. AUDIENCE: That's something else. That's– GARY GENSLER: Will you
speak a little louder? AUDIENCE: Yeah. So that's the– you
want to sort of assess how hard it is to fork Bitcoin. If I have a lot of
computational power, how hard is it for
me to create a fork? And Satoshi does an analysis
at the end of the paper– GARY GENSLER: Oh, I apologize.

You're talking
about in his paper. Yes. In his paper, he's
talking about how hard it is computationally to
do what some people call a 51% attack, to basically
take over all the nodes. And that part of his
paper we're going to talk about next Tuesday. But it's basically, can
you take over the nodes? I was talking about
a separate thing, can you break the cryptography. And he doesn't write
about that in his paper. He writes about it in an email
about 10 months later or so. Second key cryptographic thing. So we said one is it's one way. The other thing is this
concept of collision resistant. I presume if everybody in this
room told me your birthdays, there's multiple
people in this room who have the same birthday. And in fact, if we got it
past 26 people in a room it's over 50% chance that two
of you have the same birthday. We don't need to get to 183
people in the room, which is half of the days of the year.

We can get to about 26 or 7. And similarly, the key thing is
is that two sets of data are– it's again, infeasible
that x and y would hash to the same thing. It's not impossible. It's infeasible. And if you look at the
history of hash functions, this is usually the thing,
that at some point in time these hash functions will
not be collision resistant. Some quantum computing
will come along, or something will come along. But for now you can put
something of any size in and they're independent.

They also look terribly random. It's called an avalanche
effect, meaning you change one little
difference and the whole thing looks different. So when you noticed
on that little video, if you changed one thing,
it all looked so different. And why that's important
is it makes it more secure. And then there's something
called puzzle friendliness. Even if you know a
little bit of the input, it doesn't mean that you're
going to get the output. I put these up here not
for you to know them. You're not going to get tested. If you go into
business, as Elon, you've started, when you
probably haven't thought, well, collision
resistant this or that.

But I just wanted
you to know there is a bunch of cryptography
underneath this. And the key is it is
not 100% immutable. It's probably one in,
you know, I don't know, a quadrillion immutable. But there's still– these
things could be broken. And quantum computing and
something else might– Alin. AUDIENCE: The actual probability
should be actually 1 over 2 to the power of 128. So much more than
one quadrillion. GARY GENSLER: So it's 1
over 10 to about the 40th. How'd I do? My math all right? All right. And anybody who's interested
can come to office hours.

pexels photo 8358134

So it's highly
unlikely to be broken. But I think it's always
worthwhile to say, well, no, there's some outward– it's not as bounded
as you think. So what is it used for? In many places it's used
for names, and references, and pointers, and in
something called commitments. In Bitcoin, it's used for
pointers because one block points to another block. But it's also used
in commitments. You'll hear these words. We're not going to
delve into them. But the headers and the
Merkle trees use something called SHA 256, which
is a standard which is literally 256 bits long. That's like zeros and
ones for 256 registries. But a Bitcoin address actually– Satoshi Nakamoto
threw on a loop. I'm glad to debate why, but
he uses two hash functions for Bitcoin addresses.

The one thing I saw
that he actually wrote about it is he
said if one of them is broken at least the other
one is less likely to be broken. So as I've read
about it, I think in his own voice is you have
to hash something twice. And he was just making
it that much more secure, even knowing it was one out
of 10 to the 40th chance. AUDIENCE: Which is
astronomically low, so. GARY GENSLER: Right. So. So remember, where's Caroline? I remember– there we are. You asked me about, I
thought I had set it up for today, which you
were good to remind me for Tuesday, what's the
longest running hash, time stamped hash? AUDIENCE: That is
a great question. GARY GENSLER: Thank
you for the compliment. AUDIENCE: The answer is– yeah, I don't know
that phonetically, so I'm not sure if I'm
totally butchering this one. But it came out of Bell Labs
with Stuart Haber and Surety. GARY GENSLER: There he is. Yeah. So Haber and his
colleague– yes. You got it. AUDIENCE: That's my roommate. GARY GENSLER:
That's you roommate.

Terrific. So I'm just trying to say it
wasn't Bitcoin that had it. He did this in 1991. But by 1995, they started
a company called Surety. I don't think it
took off that much. It's not competing with Apple
for the largest market cap or anything like
that or Facebook. But every week in
the notices section, you can see a hash literally. It's time stamped because
it's in the New York Times. And it's a hash, all those
funky digits and everything of all the information
came before it. And they're basically
hashing any document. Any document that you want
a timestamp in that week, you put it in. One follows another,
and that's a blockchain. It's not about money. There's no native
currency and so forth.

I believe that
Haber and Stornetta are three of the eight or nine
footnotes in the Satoshi paper. Maybe it's four of them. So he gets his credit. And if you go to his
website, Stuart Haber, I think he says,
blockchain's co-founder on his personal website. Who knew? So here, we get– this
was in the National Institute, the NIST paper. But timestamp append-only
logs in Bitcoin or blockchain. What is put together is the
header, the top information. And if I can go past the visual
and just say, what's there? There's five pieces
of key information. The version, it doesn't
change that often. But there is a version number. The previous block's
hash, so it's some information about all the
blocks that came before it. The Merkle Root hash, which does
anybody want to tell me what that does, the Merkle Root? AUDIENCE: So it essentially
posts the transactions in the bottom most
layer of the tree and then creates
the [INAUDIBLE] hash of each of the transactions.

GARY GENSLER: So if I go back
to this nice little picture, the yellow box at the bottom
up each of these blocks is all the transactions. There could be upwards to 1,000,
2,000 transactions in a block. So there's blockchain
concept, 1,000, 2,000. There's means and methods
well before Nakamoto's paper about how to compress that,
how to keep that information a little bit tidier. And that uses this thing
called Merkle Roots. The five items right at the top,
what's called the block header, doesn't have the
1,000 transactions. And earlier, Kelly,
you had asked me about full nodes
and light nodes. A light node or a
wallet that anyone here could download on
your cell phone probably does not
download the millions of transactions
that have happened in the history of Bitcoin. You are unlikely to download
what's called a full node. But you might download
all the headers, this bit of information
that's all of the headers. All of the
information in Bitcoin is still not that large.

It's less than 200 gigs. But all of the headers, I
think, is single digit gigs. I can't remember if it's four
or six gigabytes right now. What is the number? AUDIENCE: The
header is 80 bytes. So it's 80 bytes
times 500,000, which is 50 megabytes, 60
megabytes of headers. GARY GENSLER: So
it's 60 megabytes, so it's much smaller as
opposed to like 180 gig. So Satoshi was
thinking in advance. And every blockchain that
you're going to work on, likely, I mean, there might
be some, this concept of it's really keeping the security
by a little bit of information in something called a
header and then pushing all the meat of the
transaction and data down. And this is really
important when you get to like
Ethereum where there's a lot of data, a
lot of computation down in each of these blocks.

It's sort of like
if Stuart Haber had a lot of documents and
pictures and everything. You don't have to
have all the picture quality and a whole movie. You can actually
hash a whole movie, and you still get
these 256 bits. So whoops. So the header has the previous
hash, this Merkle Root, which is just a way to
get all the transactions. Just think of a Merkle
Root as a way to grab 2,000 transactions in a way. A timestamp, that one's easy. We can get that. Difficulty target, anybody
know what blockchain, Bitcoin tried to
do to make it more or less difficult over time? No. Brodish, we've heard. AUDIENCE: [INAUDIBLE]
time but such that it stays with creating
a block every 10 minutes. So with more
computational power, it gets harder to find a block. GARY GENSLER: So it's
harder to find a block, the more miners there are. So every block header
needs to have some what's called a difficulty target. How difficult is the
mining going to be? Since we're talking about
mining next Tuesday, these all bring me back
to difficulty target.

And then what's a nonce? AUDIENCE: [INAUDIBLE] GARY GENSLER: What's that? AUDIENCE: Just a random number. GARY GENSLER: A random
number that's used one. Number once, nonce. And that's hash functions. How'd we do? We're a little off the skids. We are MIT. Yes? AUDIENCE: I have a question. The number of characters in
the hash is equal to your– GARY GENSLER: The
output, not the input. AUDIENCE: No. No. They put the number of
characters in the hash is limited, right? So that's a pool of
functions that you have.

When you have many,
many transactions, that's like a flow, right? So internally, you're just
consuming and consuming hashes up to a point where you're
going going to repeat that hash, right? So how do you know
for the same has, you have two
different information, to which information
you're referring to? GARY GENSLER: So could you help
me pronounce your first name? AUDIENCE: Diermo. GARY GENSLER: Diermo, has
asked the right question. He's say, well, how do you know? Especially as you have more
and more time and more and more time, you might get the
same output of a hash from different inputs.

And if you recall– wait. Somebody does recall. Now before Brodish,
in front of Brodish. AUDIENCE: The papers
mentioned that it's possible that two the hash
of x equal to hash of y. But if the miners are
working at the same time, if the same information are not
treated at the same exact time, it won't be a problem because
then they just continue just like two different– GARY GENSLER: So you're correct
as it relates to mining. But there is another
piece of it as well is that the hash
function, if it's a good cryptographic
secure hash function, is what's called collision
resistant where what you're saying is so
infeasible, in fact, 1 divided by 10 to the 40th,
that's a 1 with 40 zeroes after it.

It's so infeasible to happen,
it's possible but infeasible to happen. What you're referencing
is what if two parties solve the cryptographic puzzle
as opposed to a collision. And because of the difficulty,
they just got at the same time. Please. AUDIENCE: It seems like
a dumb question but– GARY GENSLER: No. There's no dumb questions
when it comes to this. I really mean that. AUDIENCE: The timestamps
attributed, so is it from the whole system or? GARY GENSLER: So timestamps are
not a particularly important part of Bitcoin. They are timestamped. But sometimes if somebody
puts something off and it's off by a few minutes
or even up to two hours, there's a check
in the technology in the scripting function
if the timestamp's off more than a couple hours.

So literally, it's
not that precise. Having said that, the real way
that timestamping happens is if a block is mined and it's the
540,000th block and it's sort of accepted in all the nodes,
these 10,000 nodes start mining the 540,000 and 1st
block, in essence, it's just think of it
as almost like a stack. And so what's, in essence, more
relevant than the actual time that's in the
header, and they all have a timestamp in
the header, but what's more relevant is the
order of the blocks, and, most importantly,
the previous block hash. Yes? AUDIENCE: I would say that
without the timestamps, you cannot do this
difficulty readjustment. The timestamps are
very important.

If you don't have
timestamps on the block, you cannot do the
difficulty readjustment, which is necessary to keep the
rate of blocks 10 minutes after [INAUDIBLE]. GARY GENSLER: I'm going
to partially agree with you because the difficulty
adjustment happens every two weeks. So even if any one individual
or five or six timestamps are a little goofed
up in the two weeks, the algorithm is basically
looking over the course of about 2,000 blocks. AUDIENCE: Yeah. So a little goofed up is fine. But you need the timestamp. GARY GENSLER: You
need the timestamps. But it's more important
is basically the– here, I'll go back a slide. It's the order of the blocks. Please. AUDIENCE: Going back to when
we talked about collisions. The paper didn't
really go into detail, but it said like in
addition to how unlikely it is with to the power of 128
that even if there were two that hashed to the
same kind of has digest that it would be
unlikely that they'd both be valid in the context. So given what's a valid
blockchain transaction that that could
even further reduce the likelihood of any
problems, which there wasn't a lot of detail as to
why the blockchain context would even make two hashes of the
same value even more unlikely because of the context.

GARY GENSLER: I want to hold
that question for Tuesday. But it has to do with rather
than the collision issue, what the paper is talking about is
if two miners solve the puzzle. And that doesn't mean that
they got identical hashes because the puzzle is not
geared to getting an exact hash. The Bitcoin puzzle is
having a certain number of leading zeros. So it's literally
started, I think, it was nine or 10 leading zeros. I'm talking about 10 years ago. And now, you have to hash
to something with, I think, it's about 20 or
26 leading zeros. Meaning it's gotten
more and more difficult, and the result of
the hash has to have a bunch of leading zeros,
what you saw in that video. I'm sorry. AUDIENCE: I have a question on
how the hash, the [INAUDIBLE] hash comes about. So if it's only hashing
the transactions, how does it change when the hash
of the previous block changes? GARY GENSLER: OK, so, Addy. It reminds me of
that old television show with Johnny Carson.

And you just did a great
setup for the comedian. So thank you. So I'm going to go
to Merkle Roots. So Merkle Roots, which
are a binary data tree, looks something like this. If one had 1,000 transactions,
I wouldn't have a pretty slide. So this only goes
to four levels. But think of four
transactions at the bottom. They're each hashed. And then you concatenate. You put the two hashes together. You hash that. You keep going up the tray. If you had 1,000 transactions,
because that's 2 to the 10th roughly, then you'd have
10 levels of this tray. And so that's what happens. And literally, the mining pull
operators are doing this a lot for the nodes. But in the Bitcoin
core application, in software that
anybody in this room could download the
software if you wished. There is software that helps,
takes transactions, puts them basically into this binary
tree called a Merkle tree, uses hash functions, and
basically skinnies it all the way up to the top.

Does that– AUDIENCE: I think
what my question was that given that this
structure exists, how does the root hash change
with the previous block? So basically, we saw
that if you change the hash of the previous
block, all the blocks forward will get invalidated
because the hash changes. But it doesn't seem to
use the previous hash. GARY GENSLER: So I'm going
to repeat the question. Does the Merkle Root
that is basically a summary of the
10,000 transactions that are in a block change if
the rest of the header changes or the previous block change? And the answer is no.

It only changes if some of the
data in the 10,000 transactions change. And so a Merkle Root
will change if you put different
transactions in the mix or, as is really important,
one of the incentives. You get your 12 and
1/2 bitcoins today in what's called a
Coinbase transaction. And so one of these
1,000 transactions is the payment to the miner. So the Merkle Root
would be different depending upon who wins. But that wasn't your question. I'm just saying. But Merkle Roots are
a very efficient way to take thousands
of transactions, store it up, have one spot. Please. AUDIENCE: So the order of
the different transaction has to be exactly the
same for everyone that is hashing, right? GARY GENSLER: No, actually not. So if you're hashing, and
you're running a mining rig, and Elon's running a mining
rig, if Elon solves the puzzle and propagates it
out on the network, and people start mining
on top of Elon's block because they say,
well, he's finished. You're not– you're just
going to probably start mining on the top of his block
and look in something called the mempool.

The memory pool is
this network of all the free floating transactions. You'll scoop up the next
set of transactions. AUDIENCE: And so
how can we validate that all the transaction
he wrote are the real ones? GARY GENSLER: All
right, so validation, which is more next Thursday,
but I'll give it a shot. No, no, no. It's a good question. Every transaction– or
actually, you're setting me up, digital signatures. There you go. Thank you. Did you have a question or
I'm going to on to digital. So the second
cryptographic thing, and we're going to keep
going back and forth, hash functions are basically a
way to compress a lot of data, have a fingerprint, make sure
that it's basically commitment. Digital signatures, well,
remember that little graph that we had Alice and Bob? Alice wants to send a note to
Bob and just say, hello, Bob. She wants to encrypt it. She encrypts it with Bob's
public key, sends it to him. He decrypts it with
his private key.

You might say, oh my god,
Gensler, what's a private key? What's a public key? In cryptography, it's a way to
kind of scramble information. I know. I'm really making this like– So if we went back to
that little mechanism the Romans used or we used what
the Germans used in the Enigma machine, they were
symmetric cryptography. Both people had the key. The key was the Enigma
machine with five rotors. In the 1970s, some wonderful
technologist here and elsewhere basically said, well, what
if the key isn't the same? Because the adversary
could steal the key. What if it's not symmetric
but it's asymmetric? There's a private
key and a public key.

In essence, there's
two keys that have some mathematical relationship. And the math between
these two keys don't matter for
a class like this. But know that the public key and
the private key link together. They're bonded together. But the critical thing is
about digital signatures, there's three functions. You have to generate a key pair. And when a key
pair is generated, a public key and a private key
are generated at the same time. And they need a random
number to go into it. And one of the things
that makes a lot of Bitcoin and other
wallets insecure, and it's probably why
some have been hacked, the wallets, not Bitcoin,
is because they don't have good random number generation.

Yes, Brodish? I saw– I was at a
conference last week where a technologist from the
University of Pennsylvania had done a survey of
150 hedge funds, mining companies, and Bitcoin wallet
companies and the like. So they actually let a
cybersecurity individual get inside and do a survey of
150 what you would consider really committed, high end
users of Bitcoin, miners and hedge funds and
crypto exchanges. And it was horrifying,
their cyber security as to what they're doing
with their private keys. Before he even got to the
private keys, many of them didn't really have a secure way
to create the random numbers to create their private keys. So it's just a piece. When somebody says they have
really good private key, public key, in the
back of your mind, just know there's got to be
some way to do a random number generation. That's the only
math that I'm going to ask you to remember of that. There is a signature function.

And the key thing is
a signature creates. You can create a
digital signature from a message
and a private key. So if Kelly has a
private key and wants to send a secret message to
somebody across the room– Isabella, you want a
message from Kelly? Kelly's going to
take the message. You got this, Kelly? You're going to
take the message, and you're going to sign
it with a private key. You send it over to Isabella. How's Isabella know
that it was from you? AUDIENCE: She has to
decrypt it with her key. GARY GENSLER: She's
got to verify it.

So there's a function called
a verification function, and it comes back just yes, no. I mean, it might
say it differently. But it's just a yes, no. It's a verification function. Isabella– you want
to do this with me– is going to verify
your signature is valid for this
message because you have the public key. So you're right. Isabella has your public key. But using your public key, she
can verify that the signature. It's magical math. Well, it's not magical math. It's real math. But it's not math we need
to study in this class. Yes, Hugo? AUDIENCE: Back to
generating the key pair. GARY GENSLER: Yeah? AUDIENCE: So they're
both generated from the random number? One is not– like
the private is not determined by the public
key or the other way around? GARY GENSLER: The public– you can think of it– in Bitcoin, it uses an
elliptic curve cryptography. And you can think of it
as that the private key is based on the random number. To be more technical,
the random number is what gets you
to the public key.

But I think of it
as the private key is almost the random number,
and then the public key is generated along with it. AUDIENCE: So [INAUDIBLE]. GARY GENSLER: Yes. AUDIENCE: So you pick a
random number actually between 0 and 256,
that's your private key. To pick a public
key, you derive it directly from the private key. In fact, all you do is you
exponentiate another number by the private key. So you can think
of the public key as a one way function
of the private key. So given a public key, you
cannot recover the private key. If you could, then you could
sign, potentially disastrous. GARY GENSLER: And instead of
exponentiation, in Bitcoin, it uses a function called
the elliptic curve. So what properties? And these are the key
economic properties as well as cryptographic properties. Basically, it's infeasible. And again, I use
the word infeasible. I didn't say impossible,
even though Eileen might want to tell me
that it's 1 over 10 to the 40th of something.

But it's infeasible to find a
private key from a public key, so reverse engineer. AUDIENCE: So even if you
can't find the private key, like in the case of
Kelly and Isabella, if I knew Kelly's
public key, could I send a message to Isabella
impersonating Kelly? GARY GENSLER: No. You need to do a signature– if you please just
run your eye up there. To do a digital
signature, you need a private key and a message. And it's a function of the
message and the private key. Let's call it complex math. That digital signature was
created from the private key. And the public key was
created from the private key. And to oversimplify the reason
that the verify function works is because both
the digital signature and the public key
that Isabella has– Isabella has this
digital signature, and she has the public key,
and she has the message.

The math is such
that, basically, the private key, if you wish,
almost like factors out. But think of two functions. Isabella has Kelly's
public key, the message, the digital signature. It either verifies
or it doesn't. But she never has to
see the private key. And in fact, Kelly
does not want her to ever see the private key. AUDIENCE: Eric, maybe
just to simplify the way the validation of
the digital signature works is Kelly's message is run
through a hash function which generates a hash. And it's encrypted
with her private key. Then the message encrypted
and the digital signature goes to Isabella. Isabella, what she does is
using the same hash function to run it with the document
to generate the hash function and uses the public key of
Kelly to unencrypt the signature and compare those two hashes. If those two hashes
correspond that means that the message
belongs to Kelly and it hasn't been
tampered with. So that's the more or
less the simplification of the digital
signature process. AUDIENCE: I don't know if– GARY GENSLER: So I mean,
the key is basically that there's a scheme
unrelated to Bitcoin that exists for many other
reasons on the internet, many other reasons in
commerce and at war that this public key,
private key cryptography.

And it's not simply
just going back, it's not just simply
Alice sending something. It's also digital signatures. You generate the key pair. Everything in Bitcoin,
everything in Ethereum has key pairs, public
key and private key, a digital signature. But, Kelly, never
lose your private key. You got that? Do not. And by the way, you have to
create it with a good random number generator because most
sophisticated hedge funds around the world aren't. So you're going to
be better than those. That's what I learned at a
conference I was at recently. And then there's a
verification function. AUDIENCE: A quick question about
the random number generator and the verification function.

So is there any third
party generating the generator or the generator
is a function already existing and already there? GARY GENSLER: So the question
is, if random number generation is so important, are
there outside parties that have good software, in essence,
to produce the random number generation? And the answer is
yes, and there's some that are not so good. And yes, some good
laptops have it. At the heart, I
want to skip ahead. Elliptic curve digital
signature algorithm, that's the actual algorithm
that Bitcoin uses to take the private key and so forth.

But many of the wallets, if you
download a wallet application to hold your Bitcoin,
to hold your Litecoin, to hold some other coin,
that wallet application has a random number
generation software. I can't attest to all the random
number generation software. I'm not a cyber security expert. But there's probably
a range of some that are a little bit more. There's stronger ones. The key to random
number generation is if you're generating
any length that it truly is not clumpier,
that there's let's say it's what maximum
entropy, and that you really don't have any clumps. If it all clumps
in one area, then that's not great randomness. So I just want to
finish because there's one other thing we're
going to chat about to lay the groundwork
is Bitcoin addresses.

I put that up. You can look at
the slides later. The details don't matter much. But the key thing is that
when you hear somebody talk about public keys and Bitcoin
addresses, colloquially, we all reference them the same. They're actually not. The technology that Nakamoto
did was he uses the public key. He literally hashed it twice,
once with this hash function called SHA256,
another hash function, then concatenates, and puts a
little check sum at the end, and then uses something
called a base 58 to make it even shorter. I've gone back and read
some of Nakamoto's emails for the two years after
he published all this and I've read other things. My understanding is the reason
there is two hash functions and actually two
different ones was just to make everything
a bit more secure.

Also, a public key is very long. It's about 512 bits. And so you can shrink
the data and make the data more compressed
by hashing it, which took it to 256 bits. He hashes it twice, and
then he does this base 58 and makes it even
a little tighter. So for all purposes, you
could go ahead and just use public key and Bitcoin
address is the same. But remember back in
the mind, oh, actually, they're a little different.

Bitcoin addresses are a little
bit more secure supposedly, unless of course somebody
has hacked into your wallet and figured out all
these little details. A Bitcoin address
is a little bit like the signatures on these
notes we talked about, right? Remember what an– half of you
don't use checking accounts. But these are early
forms of checks. And there's a signature
on the bottom. That's really kind
of a Bitcoin address. I'm sorry, the signature
is the digital signature. The address, the Bitcoin
address is who it's paid for. And I promise last slide. We're going to be talking
about this next week. Transactions, all
that stuff that rolls up into the Merkle trees. All that little itty bitty
important information, they basically have an input
and an output, the input and a lock time. But the input is a
previous transaction. This uniquely identifies,
basically, money. And you're going to
send value in Satoshis. He named the unit of
count for himself. There's a lot of Satoshis
in every one Bitcoin. That's why we don't hear
much about Satoshis. But there's 10 to the 8th
Satoshis in every one Bitcoin.

So when you actually
enter in the computer code in a transaction,
you're doing it in Satoshis. And it's sent to a public key. That's a coin. That is what the incentive
system's all about. Any other questions? And this is just I know. There's a lot. I wonder how many of you are
going to come back on Thursday. No. Let me say this. It's not just that we're at MIT. But we are at MIT. Come on. Everybody in this room can get
these kind of key concepts. The key questions
that we talked about were timestamped
append-only logs. Does anybody want
to tell me what a– if this class here in
the next seven minutes can get these two
concepts, that's all we talked about
for the last hour. So I don't know your
name in the orange shirt. AUDIENCE: Andrew. GARY GENSLER: What's that? Andrew? Andrew, what's time
append-only logs? AUDIENCE: Timestamped
append-only logs is essentially a record of
transactions or a block as blockchain uses
it with a time.

And that can't be
changed in the future. So you can only add
on transactions. GARY GENSLER: So it's
kind of immutable because of all this cryptography. Stuart Haber was making it in
a timestamped append-only log. And he was placing it where? Carolyn, you still with me? Where was Haber putting it? AUDIENCE: New York Times. GARY GENSLER: New York Times. There you go in the
classified section. So it's just it's a bunch of
blocks of data compressed up. So we talked about
something called Merkle trees and Merkle Roots.

Just think about as that's a
way to take a lot of information and compress it but also
make it searchable later because 1,000 transactions,
when we talk next week, you have to be able to verify. Somebody asked me about
how to verify, right? When you go back to verify, you
need an index number to find it in that Merkle tree situation. And it's secured
through hash functions. Anybody want to tell me
that easiest lay definition of the hash function? Jennifer? AUDIENCE: It's like
a mapping can be so members can get to just one. GARY GENSLER: Right. You could take a picture of this
classroom and everybody exactly and they could map
it into something. I don't know. Would a QR code be
a form of a hash? Not cryptographically secure.

But is it a hash? AUDIENCE: It's more of a
different representation of some data rather than
binary you're using. GARY GENSLER: All right,
so I failed that one. AUDIENCE: It often
stores hashes. GARY GENSLER: So
cryptographic hash function is a way to take not
only a lot of information and put it into a fixed
form, but the key thing here is the hash functions are
what tie the blocks together because hash functions can
point to previous information. And as the video showed, if you
change any of the underlying information, the hash changes. So what does that give you? It basically secures the data. You know if somebody
has tampered. So the only reason to really
learn about hash functions is it's to say, oh, I get it. This is one of the ways to
make this data tamper proof. Go on. AUDIENCE: I have a question
about a theoretical event where a better hash function
is found than the SHA256.

How would that be implemented
into the Bitcoin network practically? There needs to be
a consensus and– GARY GENSLER: So how
would any relevant change be adopted into Bitcoin
is always a challenge because it's a
decentralized network. And all decentralized
networks have a little bit of a governance challenge. The governance challenge is,
how do you do software updates? We all know that on our
laptops, our iPhones, there's probably software
updates going on here now unbeknownst to me, right? They're probably just
Apple has dropped.

I mean, who knows what
they're doing in here, right? And Uber, I really, one of my
favorites, who knows what's happening inside this phone. But the commercial enterprise,
the central authority has a way to update
the software. We probably sign
some terms of use that allows them to do that. In a decentralized
network like this, there has to be consensus. And so the only way
really to update the software for a new hash
function or for most everything else is, in essence,
that the nodes, the operators of the software
collectively in a consensus form adopt it. So it's another way that
not only is the data immutable because of these hash
functions but the software is. And that comes both
with benefits and costs. Some people would say
that's a bug of blockchain. Some people would
say it's a feature.

You can come to
your own judgment over the course
of this semester. But the software
is harder to update than software in
centralized authorities because centralized
authorities just say– they just push the– now sometimes you have
to click and say update. But don't be naive. Not every software do you click. I mean, there's some
that's just happening. But here, you've got
to have consensus. I know it didn't
answer your question about the hash function. But if it were a hash function
that had to be updated and everybody said they
had to quickly update it, there's interesting
debates about this, but you wouldn't need to
go back over all 540,000 previous blocks. You could just hash all 540,000
blocks, 180 gigabytes to one 256 or maybe it's
then a different, and then you'd have that.

And it would be tamper proof. So those are the key things. That's what we covered really. What we're going to cover next
Tuesday is consensus protocol. We've talked a lot
about proof of work here because everybody thinks
of Bitcoin about proof of work. But we're going to talk about
proof of work, the nodes, and the native currency.

And then next
Thursday, we're going to talk about transactions. Again, I try to break
down this technology. If you want to forget
about this lecture, and you're going to
go, oh my god, it was like going to
the dentist, you can tell your friends
that you actually know something about cryptography. It is called cryptocurrencies. So how could we not know
something about cryptography? But it's basically
those three things. It's cryptography. It's a consensus mechanism
and the transactions.

So right? Cryptography, consensus
mechanism, transactions. And we will get through it. And then you'll see
this matters to finance and whether it's
got any use cases. So thank you.

As found on YouTube

You May Also Like

Leave a Reply

Your email address will not be published. Required fields are marked *