SlideShare a Scribd company logo
Blockchain and Security – Solving
the challenge of Privacy, Identity
and Trust
Anish Mohammed
MIT DCI – 25th August 2016
Blockchain – what makes it unique
● Pseudonmity- The ability that
users are not easily identified
● Censorship resistance – gives the
ability to bypass authorities
● Decentralised – distributed hence
hard to track down
Blockchain – key security challenges
● Identity- General approach has been to
support pseudonyms
● Privacy – Blockchain as a paradigm
expects all data to be available
● Trust – Question of trust in a
decentralised system
Blockchain – key security challenges (contd)
● Cryptography – choice of algorithms and
parameters not necessarily considered
traditional. Also the question of QC
resistance brought up by some vendors
● Infrastructure – Generally considering the
whole Blockchain ecosystem, esp Bitcoin
Blockchain and Post Quantum Cryptography
● Shor’s algorithm
● Grover’s algorithm
● Current crop of QC resistant
algorithms
Privacy
● Permissioned Blockchain – having Blockchain
which has permission
● Homomorphic encryption – Allowing
operations with out revealing content
Smart Contracts and Privacy
● “The basic idea behind smart contracts is that many kinds of
contractual clauses (such as collateral, bonding, delineation of
property rights, etc.) can be embedded in the hardware and
software we deal with, in such a way as to make breach of
contract expensive (if desired, sometimes prohibitively so) for
the breacher.”
● “Smart contracts combine protocols, user interfaces, and
promises expressed via those interfaces, to formalize and secure
relationships over public networks. This gives us new ways to
formalize the digital relationships which are far more functional
than their inanimate paper-based ancestors”
● “Smart contracts reduce mental and computational transaction
costs.”
– “Formalizing and Securing Relationships on Public Networks,” Nick Szabo
Contracts Systems evolution
Permissioned Blockchain
● Permissioned Blockchain – Bitcoin
Blockchain is non-permissioned, nodes could
have permission to read or write
Homomorphic Encryption
● Homomorphic Encryption – the challenge of
processing without knowing what is being
asked
Function
f
x
search
query Google
search
Search results
x
f(x)
Homomorphic Encryption
● Homomorphic Encryption – Oct 2008 Craig
Gentry came up with solution
Function
f
x
Enc(x)
Enc(f(x))
search
query
Search results
Google
search
Homomorphic – under multiplication
● Some encryption algorithms already have
multiplicative homomorphic properties, e.g.
RSA 𝐸 𝑚1 = 𝑚1
𝑒
𝐸 𝑚2 = 𝑚2
𝑒
which implies 𝐸 𝑚1 × 𝐸 𝑚2
= 𝑚1
𝑒 × 𝑚2
𝑒
= (𝑚1 × 𝑚2) 𝑒
= 𝐸(𝑚1 × 𝑚2)
Homomorphic – under addition
● Other Encryptions were additively
homomorphic
𝐸 𝑚1 + 𝐸 𝑚2 = 𝐸(𝑚1 + 𝑚2)
Additive Homomorphism
Enigma – the possible answer from MIT
MtGox – yet another case
Provisions – privacy preserving way to prove solvency
Trust
● Trust model – Bitcoin Blockchain has a
distributed model of trust. So everyone
trusts everybody else.
● Intermediaries in the ecosystem – real life
implementation of Bitcoin ecosystem
requires one to trust various intermediaries
with varying results.
Bitcoin/Blockchain – malware
● Malware which mines (steals CPU/GPU
cycles)
● Malware which steals Bitcoin from
wallets
● Ransomware – accepts Bitcoins to
release keys
Bitcoin/Blockchain – malware
Identity
● Identity- General approach has been to
support pseudonyms
● Identity verification – strength of
verification of identity is as good as
onboarding
Identity – some interesting examples
Blockchain and graph analysis
Silkroad – A case of failure
Smart Contracts – security challenges (moritorium)
Smart Contracts – security challenges (the hack)
Other tools - Trusted Computing
Trust
Trustworthy systems
Trusted Platform Module
Direct Anonymous Attestation
Zero Knowledge Proofs
Zero Knowledge protocols - properties
● Completeness -If prover is telling the truth, then they
will eventually convince the verifier.
● Soundness -Prover can only convince verifier if they're
actually telling the truth.
● Zero-knowledgeness -Verifier doesnt learn anything
else about prover's solution
According to Goldwasser, Micali and Rackoff
Blockchain and expert opinions
Dilbert’s take on Security
Anish Mohammed
@anishmohammed

More Related Content

PDF
Blockchain security research (in 2 minutes)
PPSX
Cryptography
PPTX
Software for encrypting and decrypting text file powerpointpresentation
PDF
HMAC a signature alternative
PPTX
Blockchain technology
PPTX
Cryptography in networks
PDF
Anish Mohammed - Bitcoin vs Blockchain
PDF
Consensu, Security, and the Blockchain Gateway Interface - Ethan Buchman, Ten...
Blockchain security research (in 2 minutes)
Cryptography
Software for encrypting and decrypting text file powerpointpresentation
HMAC a signature alternative
Blockchain technology
Cryptography in networks
Anish Mohammed - Bitcoin vs Blockchain
Consensu, Security, and the Blockchain Gateway Interface - Ethan Buchman, Ten...

Viewers also liked (20)

PPTX
Redefining Security with the Blockchain by William Mougayar
PDF
Information security in private blockchains
PDF
Build Secure IOT Solutions using Blockchain
PDF
Introduction to DAOs - Ethereum Meetup Warsaw 28.04
PDF
InterCon 2016 - Blockchain e smart-contracts em Ethereu
PPTX
Blockchain and the investment industry stack
PDF
Reassessing Regulation and the IoT - Gilad Rosner
PDF
FINTECH Circle Blockchain Masterclass with Prof Mainelli @ BNY Mellon
PDF
Risk Leadership on the Boardroom Agenda
PDF
DWS16 - Smart city forum - Niels De Schutter, Atos
PPTX
Web application security: how to start?
PPTX
Trust No One: The New Security Model for Web APIs - SecTor talk by Greg Kliew...
PDF
IoT And Inevitable Decentralization of The Internet
PDF
Patterns and Antipatterns in Enterprise Security
PDF
The End of the Fortress: The new Approach to Cybersecurity
PDF
SABSA: Key features, advantages & benefits summary
PPTX
Understand How Machine Learning Defends Against Zero-Day Threats
PPTX
The Zero Trust Model of Information Security
PPTX
Modelling Security Architecture
PDF
Beyond Bitcoin - Enabling Smart Government Using the Bitcoin Blockchain
Redefining Security with the Blockchain by William Mougayar
Information security in private blockchains
Build Secure IOT Solutions using Blockchain
Introduction to DAOs - Ethereum Meetup Warsaw 28.04
InterCon 2016 - Blockchain e smart-contracts em Ethereu
Blockchain and the investment industry stack
Reassessing Regulation and the IoT - Gilad Rosner
FINTECH Circle Blockchain Masterclass with Prof Mainelli @ BNY Mellon
Risk Leadership on the Boardroom Agenda
DWS16 - Smart city forum - Niels De Schutter, Atos
Web application security: how to start?
Trust No One: The New Security Model for Web APIs - SecTor talk by Greg Kliew...
IoT And Inevitable Decentralization of The Internet
Patterns and Antipatterns in Enterprise Security
The End of the Fortress: The new Approach to Cybersecurity
SABSA: Key features, advantages & benefits summary
Understand How Machine Learning Defends Against Zero-Day Threats
The Zero Trust Model of Information Security
Modelling Security Architecture
Beyond Bitcoin - Enabling Smart Government Using the Bitcoin Blockchain
Ad

Similar to Blockchain_ver0.5_MIT_security_and Privacy_am_final_upload (20)

PDF
Blockchain_FintechEvo_ver1.8_am
PPTX
SMART Seminar Series: "Blockchain and its Applications". Presented by Prof Wi...
PPTX
Improving privacy in blockchain using homomorphic encryption
PPTX
Understanding Blockchain
PDF
Paranoid's View of Token Engineering
PDF
Introduction To Blockchain Technology For Beginners
PDF
Blockchain meetup
PDF
Topic 2 Blockchain Fundamentals - Cryptography BW.pdf
PPTX
Crypto & Crpyocurrencies Intro
PDF
Introduction to blockchain and cryptocurrency technologies
PPTX
Blockchain
PDF
Blockchain and Cryptography - A Primer
PDF
Introduction to Blockchain Technologies
PPTX
Module (Blockchain & Cryptocurrency).pptx
PPTX
Bitcoin MOOC Lecture 1.pptx
PDF
Bitcoin.pdf
PDF
Privacy Preserving Paradigms of Blockchain Technology
PDF
Blockchain_TezosDeveloperCommunitySNSCE.pdf
ODP
Understanding Bitcoin (Blockchain) and its Potential for Disruptive Applications
Blockchain_FintechEvo_ver1.8_am
SMART Seminar Series: "Blockchain and its Applications". Presented by Prof Wi...
Improving privacy in blockchain using homomorphic encryption
Understanding Blockchain
Paranoid's View of Token Engineering
Introduction To Blockchain Technology For Beginners
Blockchain meetup
Topic 2 Blockchain Fundamentals - Cryptography BW.pdf
Crypto & Crpyocurrencies Intro
Introduction to blockchain and cryptocurrency technologies
Blockchain
Blockchain and Cryptography - A Primer
Introduction to Blockchain Technologies
Module (Blockchain & Cryptocurrency).pptx
Bitcoin MOOC Lecture 1.pptx
Bitcoin.pdf
Privacy Preserving Paradigms of Blockchain Technology
Blockchain_TezosDeveloperCommunitySNSCE.pdf
Understanding Bitcoin (Blockchain) and its Potential for Disruptive Applications
Ad

Blockchain_ver0.5_MIT_security_and Privacy_am_final_upload

  • 1. Blockchain and Security – Solving the challenge of Privacy, Identity and Trust Anish Mohammed MIT DCI – 25th August 2016
  • 2. Blockchain – what makes it unique ● Pseudonmity- The ability that users are not easily identified ● Censorship resistance – gives the ability to bypass authorities ● Decentralised – distributed hence hard to track down
  • 3. Blockchain – key security challenges ● Identity- General approach has been to support pseudonyms ● Privacy – Blockchain as a paradigm expects all data to be available ● Trust – Question of trust in a decentralised system
  • 4. Blockchain – key security challenges (contd) ● Cryptography – choice of algorithms and parameters not necessarily considered traditional. Also the question of QC resistance brought up by some vendors ● Infrastructure – Generally considering the whole Blockchain ecosystem, esp Bitcoin
  • 5. Blockchain and Post Quantum Cryptography ● Shor’s algorithm ● Grover’s algorithm ● Current crop of QC resistant algorithms
  • 6. Privacy ● Permissioned Blockchain – having Blockchain which has permission ● Homomorphic encryption – Allowing operations with out revealing content
  • 7. Smart Contracts and Privacy ● “The basic idea behind smart contracts is that many kinds of contractual clauses (such as collateral, bonding, delineation of property rights, etc.) can be embedded in the hardware and software we deal with, in such a way as to make breach of contract expensive (if desired, sometimes prohibitively so) for the breacher.” ● “Smart contracts combine protocols, user interfaces, and promises expressed via those interfaces, to formalize and secure relationships over public networks. This gives us new ways to formalize the digital relationships which are far more functional than their inanimate paper-based ancestors” ● “Smart contracts reduce mental and computational transaction costs.” – “Formalizing and Securing Relationships on Public Networks,” Nick Szabo
  • 9. Permissioned Blockchain ● Permissioned Blockchain – Bitcoin Blockchain is non-permissioned, nodes could have permission to read or write
  • 10. Homomorphic Encryption ● Homomorphic Encryption – the challenge of processing without knowing what is being asked Function f x search query Google search Search results x f(x)
  • 11. Homomorphic Encryption ● Homomorphic Encryption – Oct 2008 Craig Gentry came up with solution Function f x Enc(x) Enc(f(x)) search query Search results Google search
  • 12. Homomorphic – under multiplication ● Some encryption algorithms already have multiplicative homomorphic properties, e.g. RSA 𝐸 𝑚1 = 𝑚1 𝑒 𝐸 𝑚2 = 𝑚2 𝑒 which implies 𝐸 𝑚1 × 𝐸 𝑚2 = 𝑚1 𝑒 × 𝑚2 𝑒 = (𝑚1 × 𝑚2) 𝑒 = 𝐸(𝑚1 × 𝑚2)
  • 13. Homomorphic – under addition ● Other Encryptions were additively homomorphic 𝐸 𝑚1 + 𝐸 𝑚2 = 𝐸(𝑚1 + 𝑚2) Additive Homomorphism
  • 14. Enigma – the possible answer from MIT
  • 15. MtGox – yet another case
  • 16. Provisions – privacy preserving way to prove solvency
  • 17. Trust ● Trust model – Bitcoin Blockchain has a distributed model of trust. So everyone trusts everybody else. ● Intermediaries in the ecosystem – real life implementation of Bitcoin ecosystem requires one to trust various intermediaries with varying results.
  • 18. Bitcoin/Blockchain – malware ● Malware which mines (steals CPU/GPU cycles) ● Malware which steals Bitcoin from wallets ● Ransomware – accepts Bitcoins to release keys
  • 20. Identity ● Identity- General approach has been to support pseudonyms ● Identity verification – strength of verification of identity is as good as onboarding
  • 21. Identity – some interesting examples
  • 23. Silkroad – A case of failure
  • 24. Smart Contracts – security challenges (moritorium)
  • 25. Smart Contracts – security challenges (the hack)
  • 26. Other tools - Trusted Computing
  • 27. Trust
  • 32. Zero Knowledge protocols - properties ● Completeness -If prover is telling the truth, then they will eventually convince the verifier. ● Soundness -Prover can only convince verifier if they're actually telling the truth. ● Zero-knowledgeness -Verifier doesnt learn anything else about prover's solution According to Goldwasser, Micali and Rackoff