SlideShare a Scribd company logo
1 of 20
Bitcoin: A Peer-to-Peer Electronic Cash
System
PARAS JAIN
TE CMPN-A-46
Satoshi Nakamoto
October 21, 2008
(Anonymous Programmers)
OUTLINE FOR THE SEMINAR
1.What Is Bitcoin
2.Abstract
3.Problem Definition
4.Literature Survey
5.Getting Started With Bitcoin
6.What Is Bitcoin Mining
7.How Bitcoin Works
8.Architecture From The Paper
9.Implementation
10.Conclusion
11.References
WHAT IS BITCOIN
• First Decentralized Digital Currency
• No Bank, Very Less Fee
• P2p(no Third Party Involved)
• No Prerequisite And Limit
• Can Be Used Anywhere Across The World
• Transaction Are High Speed, Low Cost, Secured
ABSTRACT
• A purely peer-to-peer version of electronic cash
would allow online payments to be sent directly from
one party to another without going through a
financial institution.
• Digital signatures provide part of the solution, but
the main benefits are lost if a trusted third party is
still required to prevent double-spending.
• The network timestamps transactions by hashing
them into an ongoing chain of hash-based proof-of-
work, forming a record that cannot be changed
without redoing the proof-of-work.
PROBLEM DEFENITION
• Commerce on the Internet has come to rely almost
exclusively on financial institutions serving as trusted
third parties to process electronic payments.
• Completely non-reversible transactions are not really
possible, since financial institutions cannot avoid
mediating disputes.
• What is needed is an electronic payment system
based on cryptographic proof instead of
trust, allowing any two willing parties to transact
directly with each other without the need for a
trusted third party
LITERATURE SURVEY
2008 2009 2010 2011 2012 2013 2014
BTCIN$
25
50
75
100
125
150
1200
600
October 31, 2008
Bitcoin announced
January 11, 2009
First Bitcoin client released
February 6, 2010
Bitcoin Market – first
exchange – is founded
May 21, 2010
First real-world goods purchased
July 17, 2010
MtGox is established
March 21, 2011
Bitcoin user survives 3 month
road trip on bitcoin alone
YEAR
March 28, 2013
Total Bitcoin market cap
passes $1 billion USD
600 600
32
100
10
1
1200
February 28, 2013
MtGox Exchange rate
nears nearly $32 USD
September 27, 2012
Bitcoin Foundation
established
GETTING STARTED WITH BITCOIN
STEP:1
Image: http://www.bitcoins.com/
STEP:2 STEP:31)Purchasing Bitcoins
2)Earn Bitcoins
3)Mining Bitcoins
Image: http://www.bitcoins.com/
WALLETS EXCHANGE
• Blockchain (Recommended)
• Coinbase
• Coinjar
• Coinpunk
•BitcoinQT(original Satoshi wallet)
•Armory
•Multibit
•Blockchain (Recommended)
•CoinJar
•Coinpunk
WHAT IS BITCOIN MINNING
• Bitcoin Is A P2P Network ,No Centralized
Government
• Bitcoin Has Miners
• To Process The Transaction The Miners
Solve The Math Problem
• After The Transaction Is Approved, Miners
Are Given Rewards(i.e. Bitcoin)
HOW BITCOIN WORKS
Image: http://www.bitcoins.com/
TECHNICAL BACKGROUND
• During mining, your computer runs a cryptographic hashing function (two
rounds of SHA256) on what is called a block header.
• For each new hash, the mining software will use a different number as the
random element of the block header, this number is called the nonce.
• Depending on the nonce and what else is in the block the hashing function will
yield a hash which looks like this:
93ef6f358fbb998c60802496863052290d4c63735b7fe5bdaac821de96a53a9a
• Now to make mining difficult, there is what's called a difficulty target.
• To create a valid block your miner has to find a hash that is below the difficulty
target. So if for example the difficulty target is
1000000000000000000000000000000000000000000000000000000000000000
,any number that starts with a zero would be below the target, e.g.:
0787a6fd6e0782f7f8058fbef45f5c17fe89086ad4e78a1520d06505acb4522f
TECHNICAL BACKGROUND CONT…
• Because the target is such an unwieldy number with tons of digits, people
generally use a simpler number to express the current target. This number is
called the mining difficulty. The mining difficulty expresses how much harder
the current block is to generate compared to the first block. So a difficulty of
70000 means to generate the current block you have to do 70000 times more
work than Satoshi had to do generating the first block. Though be fair
though, back then mining was a lot slower and less optimized.
• The difficulty changes every 2016 blocks. The network tries to change it such
that 2016 blocks at the current global network processing power take about 14
days. That's why, when the network power rises, the difficulty rises as well.
ARCHITECTURE FROM THE PAPER
TRANSACTION TIMESTAMP
PROOF-OF-WORK
Paper :https://bitcoin.org/bitcoin.pdf
MINING HARDWARE MINING SOFTWARE
• CPU's
o In the beginning, mining with a CPU was the only way to
mine bitcoins. Mining this way via the original Satoshi
client is how the bitcoin network started. This method is
no longer viable now that the network difficulty level is
so high. You might mine for years and years without
earning a single coin.
• GPU's
o Soon it was discovered that high end graphics cards
were much more efficient at bitcoin mining and the
landscape changed. CPU bitcoin mining gave way to the
GPU (Graphical Processing Unit)
• FPGA's
o As with the CPU to GPU transition, the bitcoin mining
world progressed up the technology food chain to the
Field Programmable Gate Array.
• ASIC's
oThe bitcoin mining world is now solidly in the Application
Specific Integrated Circuit (ASIC) era. An ASIC is a chip
designed specifically to do one thing and one thing only.
• BFGminer
• CGminer
• EasyMiner
• BitCoin Plus
MINING POOL
• Eclipse
• Eligius
• BTC Guild
TOTAL NUMBER OF BITCOIN
Image: http://www.bitcoins.com/
IMPLEMENTATION
STEP 1: INSTALLING THE BITCOIN WALLET
BITCOINWALLET
IMPLEMENTATION
STEP 2: INSTALLING THE MINING SOFTWARE
EASYMINER
CONCLUSION
• We have proposed a system for electronic transactions
without relying on trust.
• We started with the usual framework of coins made from
digital signatures, which provides strong control of
ownership, but is incomplete without a way to prevent
double-spending.
• To solve this, we proposed a peer-to-peer network using
proof-of-work to record a public history of transactions
that quickly becomes computationally impractical for an
attacker to change if honest nodes control a majority of
CPU power.
REFRENCES
• [1] W. Dai, "b-money," http://www.weidai.com/bmoney.txt, 1998.
• [2] H. Massias, X.S. Avila, and J.-J. Quisquater, "Design of a secure timestamping service with minimal trust requirements," In 20th
Symposium on Information Theory in the Benelux, May 1999.
• [3] S. Haber, W.S. Stornetta, "How to time-stamp a digital document," In Journal of Cryptology, vol 3, no 2, pages 99-111, 1991.
• [4] D. Bayer, S. Haber, W.S. Stornetta, "Improving the efficiency and reliability of digital time-stamping," In Sequences II: Methods
in Communication, Security and Computer Science, pages 329-334, 1993.
• [5] S. Haber, W.S. Stornetta, "Secure names for bit-strings," In Proceedings of the 4th ACM Conference on Computer and
Communications Security, pages 28-35, April 1997.
• [6] A. Back, "Hashcash - a denial of service counter-measure,“ http://www.hashcash.org/papers/hashcash.pdf, 2002.
• [7] R.C. Merkle, "Protocols for public key cryptosystems," In Proc. 1980 Symposium on Security and Privacy, IEEE Computer
Society, pages 122-133, April 1980.
• [8] W. Feller, "An introduction to probability theory and its applications," 1957

More Related Content

What's hot

BLOCKCHAIN TECHNOLOGY.ppt
BLOCKCHAIN TECHNOLOGY.pptBLOCKCHAIN TECHNOLOGY.ppt
BLOCKCHAIN TECHNOLOGY.ppt
jishnub8
 
Non-fungible tokens (nfts)
Non-fungible tokens (nfts)Non-fungible tokens (nfts)
Non-fungible tokens (nfts)
Gene Leybzon
 

What's hot (20)

Ethereum Blockchain with Smart contract and ERC20
Ethereum Blockchain with Smart contract and ERC20Ethereum Blockchain with Smart contract and ERC20
Ethereum Blockchain with Smart contract and ERC20
 
Blockchain Explained | Blockchain Simplified | Blockchain Technology | Blockc...
Blockchain Explained | Blockchain Simplified | Blockchain Technology | Blockc...Blockchain Explained | Blockchain Simplified | Blockchain Technology | Blockc...
Blockchain Explained | Blockchain Simplified | Blockchain Technology | Blockc...
 
Introduction to Blockchain
Introduction to BlockchainIntroduction to Blockchain
Introduction to Blockchain
 
Tokenization v2
Tokenization v2Tokenization v2
Tokenization v2
 
An Introduction to Blockchain Technology
An Introduction to Blockchain Technology An Introduction to Blockchain Technology
An Introduction to Blockchain Technology
 
Blockchain
BlockchainBlockchain
Blockchain
 
Blockchain
BlockchainBlockchain
Blockchain
 
BLOCKCHAIN TECHNOLOGY.ppt
BLOCKCHAIN TECHNOLOGY.pptBLOCKCHAIN TECHNOLOGY.ppt
BLOCKCHAIN TECHNOLOGY.ppt
 
Non-fungible tokens (nfts)
Non-fungible tokens (nfts)Non-fungible tokens (nfts)
Non-fungible tokens (nfts)
 
Blockchain and Bitcoin
Blockchain and BitcoinBlockchain and Bitcoin
Blockchain and Bitcoin
 
Blockchain 101 | Blockchain Tutorial | Blockchain Smart Contracts | Blockchai...
Blockchain 101 | Blockchain Tutorial | Blockchain Smart Contracts | Blockchai...Blockchain 101 | Blockchain Tutorial | Blockchain Smart Contracts | Blockchai...
Blockchain 101 | Blockchain Tutorial | Blockchain Smart Contracts | Blockchai...
 
Blockchain basics
Blockchain basicsBlockchain basics
Blockchain basics
 
What is a blockchain?
What is a blockchain?What is a blockchain?
What is a blockchain?
 
Hyperledger Fabric
Hyperledger FabricHyperledger Fabric
Hyperledger Fabric
 
Blockchain technology
Blockchain technologyBlockchain technology
Blockchain technology
 
Basic introduction in blockchain, smart contracts, permissioned ledgers
Basic introduction in blockchain, smart contracts, permissioned ledgersBasic introduction in blockchain, smart contracts, permissioned ledgers
Basic introduction in blockchain, smart contracts, permissioned ledgers
 
Introduction to Blockchain Technology
Introduction to Blockchain TechnologyIntroduction to Blockchain Technology
Introduction to Blockchain Technology
 
Ethereum
EthereumEthereum
Ethereum
 
Blockchain - HyperLedger Fabric
Blockchain - HyperLedger FabricBlockchain - HyperLedger Fabric
Blockchain - HyperLedger Fabric
 
Blockchain
BlockchainBlockchain
Blockchain
 

Viewers also liked

Seminar Report On Bitcoin
Seminar Report On BitcoinSeminar Report On Bitcoin
Seminar Report On Bitcoin
Touroxy
 
Bitcoin powerpoint
Bitcoin powerpointBitcoin powerpoint
Bitcoin powerpoint
dcarro11
 

Viewers also liked (20)

Bitcoin Internal
Bitcoin InternalBitcoin Internal
Bitcoin Internal
 
BITCOIN - De-anonymization and Money Laundering Detection Strategies
BITCOIN - De-anonymization and Money Laundering Detection StrategiesBITCOIN - De-anonymization and Money Laundering Detection Strategies
BITCOIN - De-anonymization and Money Laundering Detection Strategies
 
BitCoin explained
BitCoin explainedBitCoin explained
BitCoin explained
 
What is Bitcoin? - A guide for beginners
What is Bitcoin? - A guide for beginnersWhat is Bitcoin? - A guide for beginners
What is Bitcoin? - A guide for beginners
 
Bitcoin: The Internet of Money
Bitcoin: The Internet of MoneyBitcoin: The Internet of Money
Bitcoin: The Internet of Money
 
Bitcoin - Introduction, Technical Aspects and Ongoing Developments
Bitcoin - Introduction, Technical Aspects and Ongoing DevelopmentsBitcoin - Introduction, Technical Aspects and Ongoing Developments
Bitcoin - Introduction, Technical Aspects and Ongoing Developments
 
Bitcoin, Blockchain, and IoT
Bitcoin, Blockchain, and IoTBitcoin, Blockchain, and IoT
Bitcoin, Blockchain, and IoT
 
Seminar Report On Bitcoin
Seminar Report On BitcoinSeminar Report On Bitcoin
Seminar Report On Bitcoin
 
Bitcoin powerpoint
Bitcoin powerpointBitcoin powerpoint
Bitcoin powerpoint
 
Bitcoin: Today and Future
Bitcoin: Today and FutureBitcoin: Today and Future
Bitcoin: Today and Future
 
Bitcoin - the Basics
Bitcoin - the BasicsBitcoin - the Basics
Bitcoin - the Basics
 
Bitcoin 101
Bitcoin 101Bitcoin 101
Bitcoin 101
 
Bitcoin Explained
Bitcoin ExplainedBitcoin Explained
Bitcoin Explained
 
Cyber Vulnerabilities of Biometrics - OWASP 2015
Cyber Vulnerabilities of Biometrics - OWASP 2015Cyber Vulnerabilities of Biometrics - OWASP 2015
Cyber Vulnerabilities of Biometrics - OWASP 2015
 
Bitcoin 101: The Currency, The Network, The Community
Bitcoin 101: The Currency, The Network, The CommunityBitcoin 101: The Currency, The Network, The Community
Bitcoin 101: The Currency, The Network, The Community
 
Blockchain: under the hood
Blockchain: under the hoodBlockchain: under the hood
Blockchain: under the hood
 
An Overview on Bitcoin
An Overview  on Bitcoin         An Overview  on Bitcoin
An Overview on Bitcoin
 
Anatomy of a blockchain
Anatomy of a blockchainAnatomy of a blockchain
Anatomy of a blockchain
 
Bitcoin, the Blockchain, and Open Source
Bitcoin, the Blockchain, and Open SourceBitcoin, the Blockchain, and Open Source
Bitcoin, the Blockchain, and Open Source
 
Intro to Bitcoin
Intro to BitcoinIntro to Bitcoin
Intro to Bitcoin
 

Similar to Bitcoin: A Peer-to-Peer Electronic Cash System

Bitcoin-full-report-STVM
Bitcoin-full-report-STVMBitcoin-full-report-STVM
Bitcoin-full-report-STVM
Kai Bennink
 
Landgate Presentation on Blockchain
Landgate Presentation on BlockchainLandgate Presentation on Blockchain
Landgate Presentation on Blockchain
Junran Cao
 

Similar to Bitcoin: A Peer-to-Peer Electronic Cash System (20)

Bitcoin(8-15).pptx
Bitcoin(8-15).pptxBitcoin(8-15).pptx
Bitcoin(8-15).pptx
 
#blockchain_hashin_bitcoin_cryptocurranies
#blockchain_hashin_bitcoin_cryptocurranies#blockchain_hashin_bitcoin_cryptocurranies
#blockchain_hashin_bitcoin_cryptocurranies
 
Digital currency
Digital currencyDigital currency
Digital currency
 
Introduction into blockchains and cryptocurrencies
Introduction into blockchains and cryptocurrenciesIntroduction into blockchains and cryptocurrencies
Introduction into blockchains and cryptocurrencies
 
BITCOIN EXPLAINED
BITCOIN EXPLAINEDBITCOIN EXPLAINED
BITCOIN EXPLAINED
 
Bitcoins
BitcoinsBitcoins
Bitcoins
 
Blockchain & Cryptocurrencies Intro - July 2017
Blockchain & Cryptocurrencies Intro - July 2017Blockchain & Cryptocurrencies Intro - July 2017
Blockchain & Cryptocurrencies Intro - July 2017
 
Understanding Bitcoin
Understanding BitcoinUnderstanding Bitcoin
Understanding Bitcoin
 
Bitcoin School Project
Bitcoin School ProjectBitcoin School Project
Bitcoin School Project
 
Bitcoin and the Rise of the Block Chains
Bitcoin and the Rise of the Block ChainsBitcoin and the Rise of the Block Chains
Bitcoin and the Rise of the Block Chains
 
Bitcoin and Ransomware Analysis
Bitcoin and Ransomware AnalysisBitcoin and Ransomware Analysis
Bitcoin and Ransomware Analysis
 
Bitcoin and Ransomware Analysis
Bitcoin and Ransomware AnalysisBitcoin and Ransomware Analysis
Bitcoin and Ransomware Analysis
 
Blockchain
BlockchainBlockchain
Blockchain
 
Blockchain seminar
Blockchain seminarBlockchain seminar
Blockchain seminar
 
Bitcoin-full-report-STVM
Bitcoin-full-report-STVMBitcoin-full-report-STVM
Bitcoin-full-report-STVM
 
WHAT IS MINING? WHAT IS BITCOIN?
WHAT IS MINING? WHAT IS BITCOIN?WHAT IS MINING? WHAT IS BITCOIN?
WHAT IS MINING? WHAT IS BITCOIN?
 
Bitcoin and the future of cryptocurrency
Bitcoin and the future of cryptocurrencyBitcoin and the future of cryptocurrency
Bitcoin and the future of cryptocurrency
 
Landgate Presentation on Blockchain
Landgate Presentation on BlockchainLandgate Presentation on Blockchain
Landgate Presentation on Blockchain
 
About Bitcoin, Blockchain, and the DLT Chimera
About Bitcoin, Blockchain, and the DLT ChimeraAbout Bitcoin, Blockchain, and the DLT Chimera
About Bitcoin, Blockchain, and the DLT Chimera
 
OVERVIEW ON CRYPTOCURRENCY
OVERVIEW ON CRYPTOCURRENCYOVERVIEW ON CRYPTOCURRENCY
OVERVIEW ON CRYPTOCURRENCY
 

Recently uploaded

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

Recently uploaded (20)

TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 

Bitcoin: A Peer-to-Peer Electronic Cash System

  • 1. Bitcoin: A Peer-to-Peer Electronic Cash System PARAS JAIN TE CMPN-A-46 Satoshi Nakamoto October 21, 2008 (Anonymous Programmers)
  • 2. OUTLINE FOR THE SEMINAR 1.What Is Bitcoin 2.Abstract 3.Problem Definition 4.Literature Survey 5.Getting Started With Bitcoin 6.What Is Bitcoin Mining 7.How Bitcoin Works 8.Architecture From The Paper 9.Implementation 10.Conclusion 11.References
  • 3. WHAT IS BITCOIN • First Decentralized Digital Currency • No Bank, Very Less Fee • P2p(no Third Party Involved) • No Prerequisite And Limit • Can Be Used Anywhere Across The World • Transaction Are High Speed, Low Cost, Secured
  • 4. ABSTRACT • A purely peer-to-peer version of electronic cash would allow online payments to be sent directly from one party to another without going through a financial institution. • Digital signatures provide part of the solution, but the main benefits are lost if a trusted third party is still required to prevent double-spending. • The network timestamps transactions by hashing them into an ongoing chain of hash-based proof-of- work, forming a record that cannot be changed without redoing the proof-of-work.
  • 5. PROBLEM DEFENITION • Commerce on the Internet has come to rely almost exclusively on financial institutions serving as trusted third parties to process electronic payments. • Completely non-reversible transactions are not really possible, since financial institutions cannot avoid mediating disputes. • What is needed is an electronic payment system based on cryptographic proof instead of trust, allowing any two willing parties to transact directly with each other without the need for a trusted third party
  • 6. LITERATURE SURVEY 2008 2009 2010 2011 2012 2013 2014 BTCIN$ 25 50 75 100 125 150 1200 600 October 31, 2008 Bitcoin announced January 11, 2009 First Bitcoin client released February 6, 2010 Bitcoin Market – first exchange – is founded May 21, 2010 First real-world goods purchased July 17, 2010 MtGox is established March 21, 2011 Bitcoin user survives 3 month road trip on bitcoin alone YEAR March 28, 2013 Total Bitcoin market cap passes $1 billion USD 600 600 32 100 10 1 1200 February 28, 2013 MtGox Exchange rate nears nearly $32 USD September 27, 2012 Bitcoin Foundation established
  • 7. GETTING STARTED WITH BITCOIN STEP:1 Image: http://www.bitcoins.com/
  • 8. STEP:2 STEP:31)Purchasing Bitcoins 2)Earn Bitcoins 3)Mining Bitcoins Image: http://www.bitcoins.com/
  • 9. WALLETS EXCHANGE • Blockchain (Recommended) • Coinbase • Coinjar • Coinpunk •BitcoinQT(original Satoshi wallet) •Armory •Multibit •Blockchain (Recommended) •CoinJar •Coinpunk
  • 10. WHAT IS BITCOIN MINNING • Bitcoin Is A P2P Network ,No Centralized Government • Bitcoin Has Miners • To Process The Transaction The Miners Solve The Math Problem • After The Transaction Is Approved, Miners Are Given Rewards(i.e. Bitcoin)
  • 11. HOW BITCOIN WORKS Image: http://www.bitcoins.com/
  • 12. TECHNICAL BACKGROUND • During mining, your computer runs a cryptographic hashing function (two rounds of SHA256) on what is called a block header. • For each new hash, the mining software will use a different number as the random element of the block header, this number is called the nonce. • Depending on the nonce and what else is in the block the hashing function will yield a hash which looks like this: 93ef6f358fbb998c60802496863052290d4c63735b7fe5bdaac821de96a53a9a • Now to make mining difficult, there is what's called a difficulty target. • To create a valid block your miner has to find a hash that is below the difficulty target. So if for example the difficulty target is 1000000000000000000000000000000000000000000000000000000000000000 ,any number that starts with a zero would be below the target, e.g.: 0787a6fd6e0782f7f8058fbef45f5c17fe89086ad4e78a1520d06505acb4522f
  • 13. TECHNICAL BACKGROUND CONT… • Because the target is such an unwieldy number with tons of digits, people generally use a simpler number to express the current target. This number is called the mining difficulty. The mining difficulty expresses how much harder the current block is to generate compared to the first block. So a difficulty of 70000 means to generate the current block you have to do 70000 times more work than Satoshi had to do generating the first block. Though be fair though, back then mining was a lot slower and less optimized. • The difficulty changes every 2016 blocks. The network tries to change it such that 2016 blocks at the current global network processing power take about 14 days. That's why, when the network power rises, the difficulty rises as well.
  • 14. ARCHITECTURE FROM THE PAPER TRANSACTION TIMESTAMP PROOF-OF-WORK Paper :https://bitcoin.org/bitcoin.pdf
  • 15. MINING HARDWARE MINING SOFTWARE • CPU's o In the beginning, mining with a CPU was the only way to mine bitcoins. Mining this way via the original Satoshi client is how the bitcoin network started. This method is no longer viable now that the network difficulty level is so high. You might mine for years and years without earning a single coin. • GPU's o Soon it was discovered that high end graphics cards were much more efficient at bitcoin mining and the landscape changed. CPU bitcoin mining gave way to the GPU (Graphical Processing Unit) • FPGA's o As with the CPU to GPU transition, the bitcoin mining world progressed up the technology food chain to the Field Programmable Gate Array. • ASIC's oThe bitcoin mining world is now solidly in the Application Specific Integrated Circuit (ASIC) era. An ASIC is a chip designed specifically to do one thing and one thing only. • BFGminer • CGminer • EasyMiner • BitCoin Plus MINING POOL • Eclipse • Eligius • BTC Guild
  • 16. TOTAL NUMBER OF BITCOIN Image: http://www.bitcoins.com/
  • 17. IMPLEMENTATION STEP 1: INSTALLING THE BITCOIN WALLET BITCOINWALLET
  • 18. IMPLEMENTATION STEP 2: INSTALLING THE MINING SOFTWARE EASYMINER
  • 19. CONCLUSION • We have proposed a system for electronic transactions without relying on trust. • We started with the usual framework of coins made from digital signatures, which provides strong control of ownership, but is incomplete without a way to prevent double-spending. • To solve this, we proposed a peer-to-peer network using proof-of-work to record a public history of transactions that quickly becomes computationally impractical for an attacker to change if honest nodes control a majority of CPU power.
  • 20. REFRENCES • [1] W. Dai, "b-money," http://www.weidai.com/bmoney.txt, 1998. • [2] H. Massias, X.S. Avila, and J.-J. Quisquater, "Design of a secure timestamping service with minimal trust requirements," In 20th Symposium on Information Theory in the Benelux, May 1999. • [3] S. Haber, W.S. Stornetta, "How to time-stamp a digital document," In Journal of Cryptology, vol 3, no 2, pages 99-111, 1991. • [4] D. Bayer, S. Haber, W.S. Stornetta, "Improving the efficiency and reliability of digital time-stamping," In Sequences II: Methods in Communication, Security and Computer Science, pages 329-334, 1993. • [5] S. Haber, W.S. Stornetta, "Secure names for bit-strings," In Proceedings of the 4th ACM Conference on Computer and Communications Security, pages 28-35, April 1997. • [6] A. Back, "Hashcash - a denial of service counter-measure,“ http://www.hashcash.org/papers/hashcash.pdf, 2002. • [7] R.C. Merkle, "Protocols for public key cryptosystems," In Proc. 1980 Symposium on Security and Privacy, IEEE Computer Society, pages 122-133, April 1980. • [8] W. Feller, "An introduction to probability theory and its applications," 1957