You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 2 Next »


Session Topic or Project

Crypto focused. Why crypto means cryptology. Discuss the unifying cryptographic foundations of Blockchain; starting with a few crypto-primitives like hash functions and signature and encryption schemes to more advanced ideas. How do the DLTs in Hyperledger use these primitives, what is their cryptographic relationship to other popular Blockchains like Bitcoin and Ethereum.  Demonstration of these ideas through a demo of explorers on popular chains. This is intended as a beginning to intermediate session.  

Session Leader

Vipin Bharathan.

Time Slots and Spaces

Earlier the better, suggesting Training Room number 1 from 10 am to 12 noon. A one to 2 hour session.

Experience Level of Participants

Beginner

Session Language

English

Programming Language(s)

We will present snippets in many of these languages from Github repos.

  • C / C++
  • Go
  • Java
  • Javascript
  • Python
  • Rust
  • Other

Other Prerequisites

Laptop with Internet capabilities needed to follow along on demo or look at github repositories.

The Plan

General Intro to Blockchain- Focus on Blockchain as a data structure calling out the cryptographic nature of the fields-

What makes Enterprise DLTs different and what makes them similar to other Blockchains-

Each of these will have demos, of data structures using explorers (of live or testnets as far as they are accessible), of actual code in Hyperledger DLTs

Fabric

  • Iroha
  • Sawtooth
  • Burrow
  • Indy
  • Quilt

Using the above pattern discuss the following 

  1. Discuss hash functions 
  2. Symmetric and Asymmetric Cryptography, key exchange (DH as well as other methods)
  3. Signature and Encryption schemes
  4. Ursa and why reusable libraries are important
  5. Systems View and Vulnerabilities
  6. Advanced topics - ZK, E2EE etc. Grin, ZCash etc.


The Goals

Attendees learn to look at DLTs from a systems perspective , figuring out what unites them and why cryptographic underpinnings cause differences in functional behavior. 

Software to Install Before

Need a web browser with Internet capabilities.

Special Equipment Required

Power, Projector and screen, Internet (WiFI or hardwired), laptop connectivity to projector. Can provide slides that drive the session.

  • No labels