SlideShare a Scribd company logo
2
Most read
4
Most read
12
Most read
Tangle: An Alternative to Block Chain
For Future of Crypto Currency
Presented by
Kishor Datta Gupta
Center for Information Assurance (CfIA)
Some Conceptual issue
Center for Information Assurance (CfIA)
• Block is not equal Bitcoin or any CryptoCoin.
• Header of every block contains a hash of header of the previous block.
• Mining is NOT about creating new coins.
• Block is not limited to a definite number like Bitcoin/Cryptocoin.
• Linked List outside between blocks & Merkle tree inside between
transections.
• Merkle roots do not verify transactions, they verify a set of transactions.
• Merkle root will change if data tempered.
Simplified Bitcoin Block Chain
Center for Information Assurance (CfIA)
Mining Logic
Center for Information Assurance (CfIA)
Joe's reward = Reward for mining block + transactions fees
Block Chain Issue
Center for Information Assurance (CfIA)
As a Block chain grows over
time, nodes will need more and
more storage capacity and a
higher bandwidth (volume
increases) to keep up-to-date
with the transactions added to
the ledger.
Network Size
Memory Storage
Bandwidth
Centralization
8 Pool Contain 75% mining
Center for Information Assurance (CfIA)
Some can have 51%
Center for Information Assurance (CfIA)
LinkList vs DAG
Center for Information Assurance (CfIA)
LinkList
Direct Acyclic Graph
Tangle
Center for Information Assurance (CfIA)
Same as block chain , tangle is also a distributed ledger, in
which a network of independent accounts perform
transactions among themselves, reaching consensus about
who owns what without depending on a centralized
authority.
http://tangle.glumb.de
Tangle: Issue a transaction
Center for Information Assurance (CfIA)
• It chooses two other transactions to approve (in
general, these two transactions may coincide),
according to some algorithm.
• It checks if the two transactions are not conflicting and
do not approve conflicting transactions.
• For the transaction to be valid, the node must solve a
cryptographic puzzle
Tangle: Nodes
Center for Information Assurance (CfIA)
Full Node: store all transactions since the last snapshot. It
is required to be online (= available to its neighbors) 24/7
Permanodes: is a Full Node that doesn't do snapshots and
stores all transactions since the genesis transaction.
Light Client: does not store any transactions. To make
transactions, it has to has access to a Full Node.
It asks the full node to publish its transactions. It does not
have to be online 24/7.
Swarm Clients: Full Nodes that run distributed on more
than one device.
Tangle: Nodes Weight
Center for Information Assurance (CfIA)
Tangle: Consensus
Center for Information Assurance (CfIA)
A node runs the tip selection algorithm many times, and
see which transaction of the two is more likely to be
(indirectly) approved by the selected tip.
For example, if, after 100 runs of the tip selection
algorithm, a transaction was selected 97 times, we say that
it is confirmed with 97% confidence.
Consensus: tip selection algorithm
Center for Information Assurance (CfIA)
Instead of just randomly selecting two tips (or always using the newest two tips), there
is a tip selection algorithm that is run and which will select the tips, to make sure that
tips are chosen in a way to make the tangle converge (have all transactions approved)
quickly. IOTA Use Random Walk Markov Chain Monte Carlo algorithm
Consensus: Orphaned
Center for Information Assurance (CfIA)
if a node issues a new transaction that approves conflicting transactions, then it risks that
other nodes will not approve its new transaction, which will fall into oblivion."
In order to find transactions to approve that are unlikely to lead its own transaction to be
orphaned, a node runs a "tip selection algorithm."
Incentive: For Node to Run
Center for Information Assurance (CfIA)
Every node calculates some statistics, one of which is how
many new transactions are received from a neighbor. If one
particular node is “too lazy", it will be dropped by its
neighbors.
So, even if a node does not issue transactions (and hence has
no direct incentive to share new transactions that approve its
own one), it still has incentive to work hard.
Incentive: For Full Node to Run
Center for Information Assurance (CfIA)
• Hope that people are generally good
• Almost all server run 24*7
Possible attack scenarios :Double
Spending
Center for Information Assurance (CfIA)
Possible attack scenarios :Parasite
Chain
Center for Information Assurance (CfIA)
Tangle Applications: IOTA
Center for Information Assurance (CfIA)
• Uses a coordinator to issue all node a
certificate.
• Not distributed yet per definition, but
decentralized.
• Uses Quantum Resistance cryptography
• No mining so No transection fees
• Partition intolerance
IOTA is a Crypto Currency designed for
the Internet of Things.
Tangle Applications: Byteball
Center for Information Assurance (CfIA)
• Has Transection Fees
• Use a MC(main chain) algorithm to define transaction order
• Need time to verify transection
• Can remove orphan nodes
Byteball is a Crypto Currency similar to IOTA with additional
features
Tangle Applications: Git
Center for Information Assurance (CfIA)
Git actually use tangle type consensus to commit its code
In simplified form, git object storage is "just" a DAG of objects,
with a handful of different types of objects. They are all stored
compressed and identified by an SHA-1 hash (that, incidentally,
isn't the SHA-1 of the contents of the file they represent, but of
their representation in git).
Tangle Advantages over block chain:
Scalability
Center for Information Assurance (CfIA)
Conclusions
Center for Information Assurance (CfIA)
A Tangle can solve many problems blockchains are facing right now
• Bandwidth
• Storage cost
• Centralization
• Scalability
• Micropayments

More Related Content

PPTX
Mining Opportunities of Block Chain and BitCoin
PDF
Blockchain technology
PDF
Block Chain Technology Report
PPTX
Cryptocurrencies
PDF
What is MultiChain Technology?
PPTX
blockchain and iot: Opportunities and Challanges
PDF
What is Hyperledger Technology?
PDF
Build your first blockchain
Mining Opportunities of Block Chain and BitCoin
Blockchain technology
Block Chain Technology Report
Cryptocurrencies
What is MultiChain Technology?
blockchain and iot: Opportunities and Challanges
What is Hyperledger Technology?
Build your first blockchain

What's hot (20)

PDF
Introduction to Blockchain
PDF
Hands on with multichain
PPTX
Blockchain Technology
PPTX
Introduction to blockchain
PPTX
Distributed systems and blockchain technology
PPTX
Block chain by harsh biltu agarwal
PPTX
Blockchain for IoT Security and Privacy: The Case Study of a Smart Home
PPTX
Blockchain: Bitcoin and Beyond
PPTX
What is Block-Chain Technology?
PPTX
Blockchain Technology
PPTX
Introduction to Blockchain and Recordkeeping
PDF
How does blockchain work
PDF
Understanding Blockchain Security
 
PPTX
Blockchains and Smart Contracts: Architecture Design and Model-Driven Develop...
PDF
Blockchain and Security : A Virtuous Circle?
 
PDF
Block Chain as a Platform February 2015 - LERNER Consulting
PDF
Understanding Proof of Work (PoW) and Proof of Stake (PoS) Algorithms
PDF
Introduction to Blockchain and Smart Contracts
PPTX
Microservices architecture
PDF
Payment Protocols - Block Chain & Beyond
Introduction to Blockchain
Hands on with multichain
Blockchain Technology
Introduction to blockchain
Distributed systems and blockchain technology
Block chain by harsh biltu agarwal
Blockchain for IoT Security and Privacy: The Case Study of a Smart Home
Blockchain: Bitcoin and Beyond
What is Block-Chain Technology?
Blockchain Technology
Introduction to Blockchain and Recordkeeping
How does blockchain work
Understanding Blockchain Security
 
Blockchains and Smart Contracts: Architecture Design and Model-Driven Develop...
Blockchain and Security : A Virtuous Circle?
 
Block Chain as a Platform February 2015 - LERNER Consulting
Understanding Proof of Work (PoW) and Proof of Stake (PoS) Algorithms
Introduction to Blockchain and Smart Contracts
Microservices architecture
Payment Protocols - Block Chain & Beyond
Ad

Similar to Tangle: An alternative to Block chain for future of crypto currency (20)

PDF
Iota - Structure and Validation Method
PPTX
Crypto currency of The Future.pptx
PDF
IOTA Presentation - BlockchainHub Graz Meetup #5
PPTX
The problem with blockchains
PDF
IOTA - Ledger of Things
PPTX
Module 5_Exploring-IOTA-and-the-Tangle.pptx
PPTX
IOTA's Tangle Explained in 8 Minutes
PDF
Flowchain: A case study on building a Blockchain for the IoT
PDF
Interblockchain Communication for Blockchain Interoperability
PDF
Blockchain Interoperability using Cosmos Interblockchain Communication
PDF
Real world blockchains
PDF
Nzpug welly-cassandra-02-12-2010
PDF
IRJET- Study of Blockchain and its Concepts
PDF
A fault-tolerant peer-to-peer replication network
PPTX
QCONSF - FaunaDB Deterministic Transactions
PPTX
BaaS for IoT
PPT
Building Reliable Cloud Storage with Riak and CloudStack - Andy Gross, Chief ...
PDF
Blockchain for IoT
PDF
IPFS introduction
PPTX
Introduction to blockchain & cryptocurrencies
Iota - Structure and Validation Method
Crypto currency of The Future.pptx
IOTA Presentation - BlockchainHub Graz Meetup #5
The problem with blockchains
IOTA - Ledger of Things
Module 5_Exploring-IOTA-and-the-Tangle.pptx
IOTA's Tangle Explained in 8 Minutes
Flowchain: A case study on building a Blockchain for the IoT
Interblockchain Communication for Blockchain Interoperability
Blockchain Interoperability using Cosmos Interblockchain Communication
Real world blockchains
Nzpug welly-cassandra-02-12-2010
IRJET- Study of Blockchain and its Concepts
A fault-tolerant peer-to-peer replication network
QCONSF - FaunaDB Deterministic Transactions
BaaS for IoT
Building Reliable Cloud Storage with Riak and CloudStack - Andy Gross, Chief ...
Blockchain for IoT
IPFS introduction
Introduction to blockchain & cryptocurrencies
Ad

More from Kishor Datta Gupta (20)

PPTX
GAN introduction.pptx
PPTX
Interpretable Learning Model for Lower Dimensional Feature Space: A Case stud...
PPTX
A safer approach to build recommendation systems on unidentifiable data
PPTX
Adversarial Attacks and Defense
PPTX
Who is responsible for adversarial defense
PPTX
Robust Filtering Schemes for Machine Learning Systems to Defend Adversarial A...
PPTX
Zero shot learning
PPTX
Using Negative Detectors for Identifying Adversarial Data Manipulation in Mac...
PPTX
Deep Reinforcement Learning based Recommendation with Explicit User-ItemInter...
PPTX
Machine learning in computer security
PPTX
Policy Based reinforcement Learning for time series Anomaly detection
PPTX
Cyber intrusion
PPTX
understanding the pandemic through mining covid news using natural language p...
PPTX
Different representation space for MNIST digit
PPTX
"Can NLP techniques be utilized as a reliable tool for medical science?" -Bui...
PPTX
Applicability issues of Evasion-Based Adversarial Attacks and Mitigation Tech...
PPTX
Adversarial Input Detection Using Image Processing Techniques (IPT)
PPTX
Clustering report
PPTX
Basic digital image concept
PPTX
An empirical study on algorithmic bias (aiml compsac2020)
GAN introduction.pptx
Interpretable Learning Model for Lower Dimensional Feature Space: A Case stud...
A safer approach to build recommendation systems on unidentifiable data
Adversarial Attacks and Defense
Who is responsible for adversarial defense
Robust Filtering Schemes for Machine Learning Systems to Defend Adversarial A...
Zero shot learning
Using Negative Detectors for Identifying Adversarial Data Manipulation in Mac...
Deep Reinforcement Learning based Recommendation with Explicit User-ItemInter...
Machine learning in computer security
Policy Based reinforcement Learning for time series Anomaly detection
Cyber intrusion
understanding the pandemic through mining covid news using natural language p...
Different representation space for MNIST digit
"Can NLP techniques be utilized as a reliable tool for medical science?" -Bui...
Applicability issues of Evasion-Based Adversarial Attacks and Mitigation Tech...
Adversarial Input Detection Using Image Processing Techniques (IPT)
Clustering report
Basic digital image concept
An empirical study on algorithmic bias (aiml compsac2020)

Recently uploaded (20)

PDF
July 2025 - Top 10 Read Articles in International Journal of Software Enginee...
PPTX
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
PDF
Operating System & Kernel Study Guide-1 - converted.pdf
DOCX
573137875-Attendance-Management-System-original
PDF
Digital Logic Computer Design lecture notes
PPTX
KTU 2019 -S7-MCN 401 MODULE 2-VINAY.pptx
PPTX
web development for engineering and engineering
PDF
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
PPTX
bas. eng. economics group 4 presentation 1.pptx
PPTX
Recipes for Real Time Voice AI WebRTC, SLMs and Open Source Software.pptx
PPTX
Internet of Things (IOT) - A guide to understanding
PPTX
CYBER-CRIMES AND SECURITY A guide to understanding
PPTX
CH1 Production IntroductoryConcepts.pptx
PDF
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
PPTX
Sustainable Sites - Green Building Construction
PPTX
UNIT-1 - COAL BASED THERMAL POWER PLANTS
PPTX
Foundation to blockchain - A guide to Blockchain Tech
PDF
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
PPTX
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
PDF
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
July 2025 - Top 10 Read Articles in International Journal of Software Enginee...
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
Operating System & Kernel Study Guide-1 - converted.pdf
573137875-Attendance-Management-System-original
Digital Logic Computer Design lecture notes
KTU 2019 -S7-MCN 401 MODULE 2-VINAY.pptx
web development for engineering and engineering
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
bas. eng. economics group 4 presentation 1.pptx
Recipes for Real Time Voice AI WebRTC, SLMs and Open Source Software.pptx
Internet of Things (IOT) - A guide to understanding
CYBER-CRIMES AND SECURITY A guide to understanding
CH1 Production IntroductoryConcepts.pptx
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
Sustainable Sites - Green Building Construction
UNIT-1 - COAL BASED THERMAL POWER PLANTS
Foundation to blockchain - A guide to Blockchain Tech
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026

Tangle: An alternative to Block chain for future of crypto currency

  • 1. Tangle: An Alternative to Block Chain For Future of Crypto Currency Presented by Kishor Datta Gupta Center for Information Assurance (CfIA)
  • 2. Some Conceptual issue Center for Information Assurance (CfIA) • Block is not equal Bitcoin or any CryptoCoin. • Header of every block contains a hash of header of the previous block. • Mining is NOT about creating new coins. • Block is not limited to a definite number like Bitcoin/Cryptocoin. • Linked List outside between blocks & Merkle tree inside between transections. • Merkle roots do not verify transactions, they verify a set of transactions. • Merkle root will change if data tempered.
  • 3. Simplified Bitcoin Block Chain Center for Information Assurance (CfIA)
  • 4. Mining Logic Center for Information Assurance (CfIA) Joe's reward = Reward for mining block + transactions fees
  • 5. Block Chain Issue Center for Information Assurance (CfIA) As a Block chain grows over time, nodes will need more and more storage capacity and a higher bandwidth (volume increases) to keep up-to-date with the transactions added to the ledger. Network Size Memory Storage Bandwidth Centralization
  • 6. 8 Pool Contain 75% mining Center for Information Assurance (CfIA)
  • 7. Some can have 51% Center for Information Assurance (CfIA)
  • 8. LinkList vs DAG Center for Information Assurance (CfIA) LinkList Direct Acyclic Graph
  • 9. Tangle Center for Information Assurance (CfIA) Same as block chain , tangle is also a distributed ledger, in which a network of independent accounts perform transactions among themselves, reaching consensus about who owns what without depending on a centralized authority. http://tangle.glumb.de
  • 10. Tangle: Issue a transaction Center for Information Assurance (CfIA) • It chooses two other transactions to approve (in general, these two transactions may coincide), according to some algorithm. • It checks if the two transactions are not conflicting and do not approve conflicting transactions. • For the transaction to be valid, the node must solve a cryptographic puzzle
  • 11. Tangle: Nodes Center for Information Assurance (CfIA) Full Node: store all transactions since the last snapshot. It is required to be online (= available to its neighbors) 24/7 Permanodes: is a Full Node that doesn't do snapshots and stores all transactions since the genesis transaction. Light Client: does not store any transactions. To make transactions, it has to has access to a Full Node. It asks the full node to publish its transactions. It does not have to be online 24/7. Swarm Clients: Full Nodes that run distributed on more than one device.
  • 12. Tangle: Nodes Weight Center for Information Assurance (CfIA)
  • 13. Tangle: Consensus Center for Information Assurance (CfIA) A node runs the tip selection algorithm many times, and see which transaction of the two is more likely to be (indirectly) approved by the selected tip. For example, if, after 100 runs of the tip selection algorithm, a transaction was selected 97 times, we say that it is confirmed with 97% confidence.
  • 14. Consensus: tip selection algorithm Center for Information Assurance (CfIA) Instead of just randomly selecting two tips (or always using the newest two tips), there is a tip selection algorithm that is run and which will select the tips, to make sure that tips are chosen in a way to make the tangle converge (have all transactions approved) quickly. IOTA Use Random Walk Markov Chain Monte Carlo algorithm
  • 15. Consensus: Orphaned Center for Information Assurance (CfIA) if a node issues a new transaction that approves conflicting transactions, then it risks that other nodes will not approve its new transaction, which will fall into oblivion." In order to find transactions to approve that are unlikely to lead its own transaction to be orphaned, a node runs a "tip selection algorithm."
  • 16. Incentive: For Node to Run Center for Information Assurance (CfIA) Every node calculates some statistics, one of which is how many new transactions are received from a neighbor. If one particular node is “too lazy", it will be dropped by its neighbors. So, even if a node does not issue transactions (and hence has no direct incentive to share new transactions that approve its own one), it still has incentive to work hard.
  • 17. Incentive: For Full Node to Run Center for Information Assurance (CfIA) • Hope that people are generally good • Almost all server run 24*7
  • 18. Possible attack scenarios :Double Spending Center for Information Assurance (CfIA)
  • 19. Possible attack scenarios :Parasite Chain Center for Information Assurance (CfIA)
  • 20. Tangle Applications: IOTA Center for Information Assurance (CfIA) • Uses a coordinator to issue all node a certificate. • Not distributed yet per definition, but decentralized. • Uses Quantum Resistance cryptography • No mining so No transection fees • Partition intolerance IOTA is a Crypto Currency designed for the Internet of Things.
  • 21. Tangle Applications: Byteball Center for Information Assurance (CfIA) • Has Transection Fees • Use a MC(main chain) algorithm to define transaction order • Need time to verify transection • Can remove orphan nodes Byteball is a Crypto Currency similar to IOTA with additional features
  • 22. Tangle Applications: Git Center for Information Assurance (CfIA) Git actually use tangle type consensus to commit its code In simplified form, git object storage is "just" a DAG of objects, with a handful of different types of objects. They are all stored compressed and identified by an SHA-1 hash (that, incidentally, isn't the SHA-1 of the contents of the file they represent, but of their representation in git).
  • 23. Tangle Advantages over block chain: Scalability Center for Information Assurance (CfIA)
  • 24. Conclusions Center for Information Assurance (CfIA) A Tangle can solve many problems blockchains are facing right now • Bandwidth • Storage cost • Centralization • Scalability • Micropayments