Bitcoin Seminar Report
Bitcoin Seminar Report
Bitcoin Seminar Report
On
1|Page
TABLE OF CONTENT
Page No.
CHAPTER NO.2..10
2. Working of Bitcoin.10
2.1. Introduction10
CHAPTER NO.3..12
3. Payment Method
3.1 Using Bitcoin as an Individual.....13
3.2 Using Bitcoin as a Merchant..16
CHAPTER NO.4..18
4. Advantages & Disadvantages
4.1 Advantages...18
4.2 Disadvantages...19
CHAPTER NO.5..20
5. Economy
5.1 Classification as money20
5.2 Price volatility...20
5.3 Alternative to national currencies...20
5.4 Speculative bubble20
5.5 As investment21
5.6 Money supply21
5.7 Value forecasts..21
CHAPTER NO.6..23
6. Security
2|Page
BIBLIOGRAPHY.27
3|Page
CHAPTER NO.1
Bitcoin
Bitcoin uses peer-to-peer technology to operate with no central authority or banks; managing
transactions and the issuing of bitcoins is carried out collectively by the network. Bitcoin is
open-source; its design is public, nobody owns or controls Bitcoin and everyone can take part.
Bitcoin is a network that enables a new payment system and a completely digital money.
1.1 Introduction
Bitcoin is a peer-to-peer payment system introduced as open source software in 2009 by
developer Satoshi Nakamoto. The digital currency created and used in the system is also called
bitcoin and is alternatively referred to as a virtual currency, electronic money, or cryptocurrency.
The bitcoin system is not controlled by a single entity, like a central bank, which has led the US
Treasuryto call bitcoin a decentralized currency. Economists generally agree that it does not meet
the definition of money
Bitcoins are created as a reward for payment processing work in which users who offer their
computing power verify and record payments into a public ledger. Called mining, individuals
engage in this activity in exchange for transaction fees and newly minted bitcoins. Besides
mining, bitcoins can be obtained in exchange for other currencies, products, and services. Users
can buy, send, and receive bitcoins electronically for a nominal fee using wallet software on
a personal computer, mobile device, or a web application.
1.2 History
Bitcoin was first mentioned in a 2008 paper published under the name Satoshi Nakamoto. In
2009, an exploit in an early bitcoin client was found that allowed large numbers of bitcoins to be
created.
The price of bitcoins has fluctuated wildly since its inception, going through various cycles of
appreciation and depreciation, which have been referred to by some as bubbles and busts. In
2011, the value of one bitcoin rapidly rose from about US$0.30 to US$32 before returning to
US$2. In the latter half of 2012 and during the 2012-2013 Cypriot Financial Crisis, the bitcoin
price began to rise, reaching a peak of US$266 on 10 April 2013, before crashing to around
US$50. In the end of 2013, the cost of one bitcoin rose to the all-round peak of US$1135, but fell
to the price of US$693 three days later.
Some mainstream websites began accepting bitcoins c. 2013. WordPress started in November
2012 followed by OKCupid in April 2013, TigerDirect in January 2014, andOverstock.com that
same month. Certain non-profit or advocacy groups such as the Electronic Frontier
4|Page
Foundation allow bitcoin donations. (Although this organization subsequently stopped accepting
bitcoin.)
October 31, 2008 The white paper is publishes
Nakamoto publishers a design paper through a metzdowd.com cryptography mailing list that
describes the Bitcoin currency and solves the problem of double spending so as to prevent the
currency from being copied.
5|Page
As such, the identity of Bitcoin's inventor is probably as relevant today as the identity of the person
who invented paper.
1.4 Mining
Bitcoin mining is the processing of transactions in the digital currency system, in which the
records of current Bitcoin transactions, known as a blocks, are added to the record of past
transactions, known as the block chain.
A Bitcoin is defined by the digitally signed record of its transactions, starting with its creation.
The block is an encrypted hash proof of work, created in a compute-intensive process. Miners
use software that accesses their processing capacity to solve transaction-related algorithms . In
return, they are awarded a certain number of Bitcoins per block. The block chain prevents
attempts to spend a Bitcoin more than once -- otherwise the digital currency could be
counterfeited by copy and paste.
Originally, Bitcoin mining was conducted on the CPUs of individual computers, with more cores
and greater speed resulting in more profitability. After that, the system became dominated by
multi-graphics card systems, then field-programmable gate arrays (FPGAs) and finally
application-specific integrated circuits (ASICs), in the attempt to find more hashes with less
electrical power usage.
Due to this constant escalation, it has become hard for prospective new miners to start. This
adjustable difficulty is an intentional mechanism created to prevent inflation. To get around that
problem, individuals often work in mining pools.
Bitcoin generally started with individuals and small organizations mining. At that time, start-up
could be enabled by a single high-end gaming system. Now, however, larger mining
organizations might spend tens of thousands on one high-performance, specialized computer.
In the malware world, one of the more prevalent current threats is mining botnet infections, in
which user systems mine for Bitcoin without the owners' knowledge and funds are channelled to
the botnet master.
6|Page
7|Page
CHAPTER NO.2
Working of Bitcoin
2.1 Introduction
The basics for a new userAs a new user, you can get started with Bitcoin without understanding the technical details. Once
you have installed a Bitcoin wallet on your computer or mobile phone, it will generate your first
Bitcoin address and you can create more whenever you need one. You can disclose your
addresses to your friends so that they can pay you or vice versa. In fact, this is pretty similar to
how email works, except that Bitcoin addresses should only be used once.
8|Page
9|Page
CHAPTER NO.3
Payment Method
BitcoinQT
Armory
Multibit
10 | P a g e
Software Wallets
For PC
For Mobile
Web wallets are always available online, making them probably the most convenient and userfriendly. All you need to do is set up an account and log in. They are, however, potentially
somewhat less secure than hardware wallets, though each of these is also compatible with most
Mobile phone providers. Web wallet options include:
Blockchain
Coinbase
Coinjar
Coinpunk
BitGo
11 | P a g e
Web Wallets
12 | P a g e
To purchase Bitcoin, it's helpful to visit a database of Bitcoin marketplaces, likethis one. You'll
simply complete a transaction at most marketplaces, in which your currency in converted into
Bitcoin. You can also convert cash into Bitcoin using a similar process.
To mine Bitcoin you can download and run a miner like CGMiner on a custom CPU that can
theoretically turn a profit without doing much of anything at all. While you used to be able to do
this on your home desktop, it's not much of a practical possibility anymore. You'll spend more on
electricity keeping the computer running than you will turning a profit.[1]
To trade Bitcoin, look for other people participating in Bitcoin interested in transactions. You
can find them at trading sites. In addition, if you sell goods or services, consider offering Bitcoin
as a method for accepting payment.
If you want, you can run a file encryption program. Click the menu option Settings ->
Encrypt Wallet.
It's also a good idea to try and keep two different wallets, one account for daily use and making
transactions and a separate savings account, offline, where you might consider storing the bulk of
your Bitcoin.
13 | P a g e
Coinbox is basically the Bitcoin equivalent of Square, a mobile app that lots of small businesses
use to process card payments quickly and affordably.
BitPagos is an international service that processes both Bitcoin and credit card transactions.
Exercise caution:
Bitcoin is innovative, exciting, and full of possibilities. It's also experimental and volatile. It's
important to know that Bitcoin payments are irreversible. So, if you get scammed by someone
trying to exploit Double Payment loopholes, it'll be impossible to get your money back. Try to
work a series of safeguard protocols into every Bitcoin transaction. Keep in mind the following
concerns if you're going to start accepting Bitcoin at your place of business, especially in terms
of what client to use for transactions:
14 | P a g e
15 | P a g e
CHAPTER NO.4
Advantages and Disadvantages
4.1 Advantages:
Payment freedom - It is possible to send and receive any amount of money instantly anywhere in
the world at any time. No bank holidays. No borders. No imposed limits. Bitcoin allows its users
to be in full control of their money.
Very low fees - Bitcoin payments are currently processed with either no fees or extremely small
fees. Users may include fees with transactions to receive priority processing, which results in faster
confirmation of transactions by the network. Additionally, merchant processors exist to assist
merchants in processing transactions, converting bitcoins to fiat currency and depositing funds
directly into merchants' bank accounts daily. As these services are based on Bitcoin, they can be
offered for much lower fees than with PayPal or credit card networks.
Fewer risks for merchants - Bitcoin transactions are secure, irreversible, and do not contain
customers sensitive or personal information. This protects merchants from losses caused by fraud
or fraudulent chargebacks, and there is no need for PCI compliance. Merchants can easily expand
to new markets where either credit cards are not available or fraud rates are unacceptably high.
The net results are lower fees, larger markets, and fewer administrative costs.
Security and control - Bitcoin users are in full control of their transactions; it is impossible for
merchants to force unwanted or unnoticed charges as can happen with other payment methods.
Bitcoin payments can be made without personal information tied to the transaction. This offers
strong protection against identity theft. Bitcoin users can also protect their money with backup and
encryption.
Transparent and neutral - All information concerning the Bitcoin money supply itself is readily
available on the block chain for anybody to verify and use in real-time. No individual or
organization can control or manipulate the Bitcoin protocol because it is cryptographically secure.
This allows the core of Bitcoin to be trusted for being completely neutral, transparent and
predictable.
16 | P a g e
4.2 Disadvantages:
Degree of acceptance - Many people are still unaware of Bitcoin. Every day, more businesses
accept bitcoins because they want the advantages of doing so, but the list remains small and still
needs to grow in order to benefit from network effects.
Volatility - The total value of bitcoins in circulation and the number of businesses using Bitcoin
are still very small compared to what they could be. Therefore, relatively small events, trades, or
business activities can significantly affect the price. In theory, this volatility will decrease as
Bitcoin markets and the technology matures. Never before has the world seen a start-up currency,
so it is truly difficult (and exciting) to imagine how it will play out.
Ongoing development - Bitcoin software is still in beta with many incomplete features in active
development. New tools, features, and services are being developed to make Bitcoin more secure
and accessible to the masses. Some of these are still not ready for everyone. Most Bitcoin
businesses are new and still offer no insurance. In general, Bitcoin is still in the process of
maturing.
17 | P a g e
CHAPTER NO.5
Economy of Bitcoin
5. Economics
5.1 Classification as money
Bitcoin is often referred to as a currency, but it does not conform to the definition of money.
Economists agree that to qualify as money, something must be a store of value, amedium of
exchange, and a unit of account. Bitcoin conforms to only one of these three criteria. It is used as
a medium of exchange. (About 1,000 brick and mortarbusinesses were willing to accept payment
in bitcoins as of November 2013 in addition to more than 35,000 online merchants.) The bitcoin
market currently suffers fromvolatility, limiting the ability of bitcoins to act as a stable store of
value, and it is not commonly used as a unit of account. Where people are allowed to buy with
bitcoins, prices are not denominated in bitcoins. The People's Bank of China has stated that
bitcoin "is fundamentally not a currency".
Laureate Robert Shiller said that bitcoin "exhibited many of the characteristics of a speculative
bubble." Others reject the label and see bitcoin's quick rise in price as nothing more than normal
economic forces at work.
5.5 As investment
One way of investing in bitcoins is to buy and hold them as a long-term, high-risk
investment. FINRA, a United States self-regulatory organization, warns that investing in bitcoins
carries significant risks. The European Banking Authority warns that the risks of investment go
beyond a potential fall in the value of bitcoins. Bitcoins may be of limited value to
unsophisticated investors. Risk hasn't deterred some such as the Winklevoss twins, who made
a US$1.5 million personal investment and attempted to launch a bitcoin ETF.[13] Other investors,
like Peter Thiel's Founders Fund, which invested US$3 million, don't purchase bitcoins
themselves instead funding bitcoin infrastructure like companies that provide payment systems
to merchants, exchanges, and wallet services, etc. Investors also invest in bitcoin mining.
5.6 Money supply
Growth of the bitcoin money supply is predefined by the bitcoin protocol, and in this way
inflation is kept in check. Currently there are over twelve million bitcoins in circulation with an
approximate creation rate of 25 every ten minutes. The total supply is capped at an arbitrary limit
of 21 million, and every four years the creation rate is halved. This means new bitcoins will
continue to be released for more than a hundred years.
5.7 Value forecasts
Financial journalists and analysts, economists, and investors have attempted to predict the
possible future value of bitcoin. Economist John Quiggin stated, "bitcoins will attain their true
value of zero sooner or later, but it is impossible to say when." In 2013, Bank of America FX and
Rate Strategist David Woo forecast a maximum fair value per bitcoin of $1,300. Bitcoin investor
Cameron Winklevoss stated in 2013 that the "[s]mall bull case scenario for bitcoin is... 40,000
USD a coin". In late 2013, finance professor Mark Williams forecast a bitcoin would be worth
less than ten US dollars by July 2014.
19 | P a g e
20 | P a g e
CHAPTER NO.6
Security
There are two main ways the blockchain ledger can be corrupted to steal bitcoins: by
fraudulently adding to or modifying it. The bitcoin system protects the blockchain against both
using a combination of digital signatures and cryptographic hashes.
6.1 The Addition Attack and digital signatures
Payers and payees are identified in the blockchain by their public cryptographic keys: most
bitcoin transfers are from one public key to a different public key. (Actually, hashes of these
keys are used in the blockchain, and are called "bitcoin addresses".) In principle, an attacker Eve
could steal money from Alice and Bob by simply adding transactions to the blockchain ledger
like Alice pays Eve 100 bitcoins, Bob pays Eve 100 bitcoins, and so on, using of course these
people's bitcoin addresses instead of their names. The bitcoin protocol prevents this kind of theft
by requiring every transfer to be digitally signed with the payer's private key; only signed
transfers can be added to the blockchain ledger. Since Eve cannot forge Alice's signature, Eve
cannot defraud Alice by adding an entry to the blockchain equivalent to Alice pays Eve 100
bitcoins. At the same time, anyone can verify Alice's signature using her public key, and
therefore that she has authorized any transaction in the blockchain where she is the payer.
6.2 The Modification Attack and mining
The other principal way to steal bitcoins would be to modify blockchain ledger entries. Eve
could buy something from Alice, like a sofa, by adding a signed entry to the blockchain ledger
equivalent to Eve pays Alice 100 bitcoins. Later, after receiving the sofa, Eve could modify that
blockchain ledger entry to read instead: Eve pays Alice 1 bitcoin, or even delete the entry. Digital
signatures cannot prevent against this attack: Eve can simply sign her entry again after modifying
it!
To prevent against modification attacks, the bitcoin system first requires entries be added to the
blockchain not one at a time, but in groups or blocks. More importantly, each block must be
accompanied by a cryptographic hash of three things: the hash of the previous block, the block
itself, and a number called a nonce. A hash of only the first two items will, like any
cryptographic hash, always have a fixed number of bits (e.g. 256 for SHA-256). The nonce is a
number which, when included, yields a hash with a specified number of leading zero bits.
Because cryptographic hashes are essentially random, in the sense that their output cannot be
predicted from their inputs, there is only one known way to find the nonce: to try out integers
one after the other, e.g. 1, then 2, then 3, and so on. This process is called mining. The larger the
21 | P a g e
number of leading zeros, the longer on average it will take to find a requisite nonce. The bitcoin
system constantly adjusts the number of leading zeros so that the average time to find a nonce is
about ten minutes. That way, as computer hardware gets faster over the years, the bitcoin
protocol will simply require more leading zero bits to make mining always last about ten
minutes.[19]
This system prevents modification attacks in part because an attacker has to recalculate all the
hashes of the blocks after the modified one. In the example above, if Eve wants to change 100
bitcoins to 1 bitcon, she will not only have to recompute the hash of the block that transaction is
in, but of all the blocks that come after it; she will have to recreate the chain of blocks. She can
do this, but it will take her time, about ten minutes on average per block. However, during that
time the network will continue to add blocks, and it will do so much faster than Eve alone can
mine. Eve would have to recalculate all the blocks before the network could add a new one, or at
least catch up with or overtake the network's miners. To do this, she would have to have roughly
as much computing power as much of the existing bitcoin miners combined. This would be very
expensive and, if the bitcoin network is large enough, likely infeasible. Furthermore, because of
financial incentives to mine described below, it will make more financial sense for Eve to devote
her resources to normal bitcoin mining instead. Thus the system protects against fraudulent
blockchain modifications by making them expensive and, if the attacker is rational, unappealing
because they make less financial sense than becoming a miner. The more miners there are, the
more expensive and less feasible such attacks become, making the whole system even more
secure.
6.3 Double-spending
Bitcoin system is based on an innovative solution of a problem common to all digital currency
and payment schemes: that of so-called double-spending. With paper money or physical coins,
when the payer transfers money to the payee, the payer cannot keep a copy of that dollar bill or
coin. With digital money, which is just a computer file, this is not the case, and the payer could
in principle spend the same money again and again, copying the file over and over. With bitcoin,
when Eve offers to pay Alice some bitcoins, Alice can always first check the blockchain ledger
to verify that Eve actually owns that many bitcoins. Of course, Eve could try to pay many people
simultaneously; but bitcoin can defend against that. If Eve offers to pay Alice some bitcoins in
exchange for goods, Alice can stipulate that she will not deliver the goods until Eve's payment to
Alice appears in the blockchain, which typically involves waiting about ten minutes.[181]
22 | P a g e
Types of attacks:
Race attack
If the transaction has no confirmations, shops and services which accept payment can be exposed
to a so-called race attack. For example, two transactions are created for the same funds to be sent
to different shops/services. System rules ensure that only one of those transactions can be added
to the block chain.
Shops can take numerous precautions to reduce this type of attack. It is always good to consider
whether you should accept transactions without any confirmation.
Finney attack
Another type of attack. Shops or services which accept transactions without any confirmation are
affected. A Finney attack is an attack which requires the participation of a minerto premine a
block sending the money to be defrauded back to the fraudster. The risk of such an attack cannot
be reduced to nothing regardless of the preventative measures taken by shops or services, but it
does require the participation of a miner and an ideal combination of contributing factors. It is no
mean feat, the miner risks a potential loss of the block reward. Just as with the other type of
attack, the shop or service must seriously consider its politics concerning transactions without
any confirmation.
Vector76 attack
Also called an attack with confirmation, this is a combination of the 2 aforementioned attacks
which gives the perpetrator the ability to spend funds twice simply with a confirmation.
23 | P a g e
The success of this attack depends on the speed (hash frequency) of the attacker and the number
of confirmations for the shop/service. For example, if the attacker possesses 10% of the
calculation power of the bitcoin network and the shop expects 6 confirmations for a successful
transaction, the probability of success of such an attack will be 0.1%.
>50% attack
If the perpetrator controls more than 50% of the bitcoin network power, the probability of
success of the aforementioned attack will be 100%. By virtue of the fact that the perpetrator can
generate blocks more often than the other part of the network, he can create his own block chain
until it becomes longer than the integral part of the network.
24 | P a g e
BIBLIOGRAPHY
https://bitcoin.org/en/
http://en.wikipedia.org/wiki/Bitcoin#History
http://whatis.techtarget.com/definition/Bitcoin-mining
https://products.butterflylabs.com/
https://bitcoin.org/en/faq#what-are-the-advantages-of-bitcoin
https://bitcoin.org/en/faq#what-are-the-disadvantages-of-bitcoin
http://en.wikipedia.org/wiki/Bitcoin#Economics
http://en.wikipedia.org/wiki/Bitcoin#Security
25 | P a g e
26 | P a g e