Bitcoin: A Peer-to-Peer Electronic Cash System
Bitcoin: A Peer-to-Peer Electronic Cash System
Bitcoin: A Peer-to-Peer Electronic Cash System
o Proof of work: In blockchain mining, miners • The process is solved based on a difficult mathematical
validate transactions by solving a difficult puzzle called as proof of work.
mathematical puzzle called proof of work. To do • The miner who first solves the puzzle is rewarded.
that, the primary objective of the miner is to
determine the nonce value, and that nonce value is In the early days of bitcoin, miners used to solve
the mathematical puzzle that miners are required the mathematical puzzles using regular processors—
to solve to generate a hash that is less than the controlling processor units (CPUs). It used to take a lot of
target defined by the network for a particular time for mining Bitcoins and other cryptocurrencies, even
though the difficulty levels were easier than today. As
mentioned above, the difficulty level keeps changing and
growing, so the miners also had to increase their processing
power. They discovered that graphical processing units
(GPUs) proved to be more efficient than regular CPUs, but
this also had the drawback of consuming more electricity. A
miner has to calculate the return on investment based on the
hardware and the cost of electricity and other resources
needed to do the mining. Today miners use hardware called
block. ASIC (application-specific integrated circuit), which was
specifically introduced for mining Bitcoin and other
Fig 1: Blockchain
cryptocurrencies. It consumes less power and has a higher
computing power. Miners are profitable when their cost of
III. BITCOIN MINING
resources to mine one block is less than the price of the
reward. So, Bitcoin miners use their resources (hardware and
• It is the process of verifying Bitcoin transactions by
electricity) to verify a transaction, and each time a block is
recording them on a public ledger.
mined, new bitcoins are created in the network.
• Bitcoin mining is performed by high-powered computers
that solve complex computational math problems. The luck IV. WHAT IF SOMEONE TRIES TO HACK THE
and work required by a computer to solve one of these DATA?
problems is the equivalent of a miner striking gold in the
ground — while digging in a sandbox. What if someone tries to hack the data? Blockchain, as
the name implies, is a chain of blocks—let’s call the blocks A, B
• But the result of mining is “twofold” and C. Each block has solved a puzzle and generated a hash
o First, you can get a new bitcoin that you can own. value of its own, which is its identifier. Now suppose a person
tries to tamper with block B and change the data. The data is
o Second, by solving these computational math aggregated in the block, so if the data of the block changes, then
problems, bitcoin miners make the bitcoin the hash value that is the digital signature of the block will also
payment network trustworthy and secure, by change. It will therefore corrupt the chain after it—the blocks
verifying its transaction information. ahead of block B will all get delinked, because the previous hash
value of block C will not remain valid.
• Because Bitcoin is decentralized it is not regulated by
central authority, instead it is backed by millions of For a hacker to make the entire blockchain valid for the
computers across the world called as “miners”. block B that has been changed, he or she would have to change
the hash value of all the blocks ahead of block B. This would
require a huge amount of computing power and is next to VI. SYMMETRIC AND ASYMMETRIC
impossible. With this method, blockchain is non-hackable and ENCRYTPTION
prevents data modification.
Bitcoin uses asymmetric encryption. There are two
V. TRANSACTION types of encryptions: Symmetric and Asymmetric. In order to
understand asymmetric let’s first understand symmetric
We define an electronic coin as a chain of digital
encryption.
signatures. Each owner transfers the coin to the next by
digitally signing a hash of the previous transaction and the This is the simplest kind of encryption that involves
public key of the next owner and adding these to the end of the only one secret key to cipher and decipher information.
coin. A payee can verify the signatures to verify the chain of Symmetrical encryption is an old and best-known technique. It
ownership. uses a secret key that can either be a number, a word or a string
of random letters. It is a blended with the plain text of a message
to change the content in a particular way.
IX. DISADVANTAGES