0% found this document useful (0 votes)
2 views24 pages

CBT Unit 2 Notes

The document outlines the various methods of creating cryptocurrencies, including building a native blockchain, modifying existing blockchains, creating tokens on existing platforms, or hiring developers. It details the complexities, advantages, and disadvantages of each approach, as well as the structure and process of Bitcoin transactions within a decentralized peer-to-peer network. Additionally, it discusses the core components of the cryptocurrency domain, emphasizing the importance of blockchain technology, cryptography, and consensus mechanisms.

Uploaded by

viswaaeswaran
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
2 views24 pages

CBT Unit 2 Notes

The document outlines the various methods of creating cryptocurrencies, including building a native blockchain, modifying existing blockchains, creating tokens on existing platforms, or hiring developers. It details the complexities, advantages, and disadvantages of each approach, as well as the structure and process of Bitcoin transactions within a decentralized peer-to-peer network. Additionally, it discusses the core components of the cryptocurrency domain, emphasizing the importance of blockchain technology, cryptography, and consensus mechanisms.

Uploaded by

viswaaeswaran
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 24

Creation of Coins

Cryptocurrencies can be created by anyone with access to the right tools and knowledge.
However, the creation of coins is not just a technical task; it involves strategic decisions,
legal compliance, and a clear understanding of blockchain architecture.

There are four primary approaches to creating a coin or token:

✅ Option 1: Create a Blockchain and Native Cryptocurrency


This is the most complex and powerful method. A native coin is built on a brand-new
blockchain created from scratch.

Steps involved:

●​ Design your consensus mechanism: Choose between Proof of Work (PoW), Proof of
Stake (PoS), or other mechanisms.​

●​ Develop blockchain architecture: Define how transactions, blocks, mining, and


validation work.​

●​ Decide the type of blockchain: Will it be public, where anyone can join, or
private/permissioned, controlled by a single organization?​

●​ Security audit: Analyze the code to avoid vulnerabilities.​

●​ Legal compliance: Check local and international laws on digital assets.​

●​ Coin distribution model: Decide whether to mint all coins at launch or release them
over time (inflationary vs. deflationary models).​

Example:

Bitcoin was the first cryptocurrency with its own blockchain. Ethereum also launched with a
custom blockchain that supports both coins (ETH) and tokens (ERC-20).

✅ Option 2: Modify the Code of an Existing Blockchain


Instead of starting from scratch, this approach involves forking an existing open-source
blockchain (like Bitcoin or Ethereum) and customizing it.

Process:

●​ Clone the source code of a blockchain (e.g., Bitcoin Core).​

●​ Change the rules (e.g., block size, mining algorithm, supply cap).​

●​ Rebrand the project and launch it as a new coin.​

Pros:

●​ Saves time and effort.​

●​ Offers full control over the coin’s behavior.​

Cons:

●​ Still requires technical knowledge.​

●​ Maintenance and upgrades must be handled independently.​

Example:

●​ Litecoin is a fork of Bitcoin with faster block times.​

●​ Bitcoin Cash was forked from Bitcoin to allow larger block sizes.​

✅ Option 3: Create a Token on an Existing Blockchain


This is the easiest and cheapest method to enter the crypto space. Instead of building a new
blockchain, you use an existing one to create a token (a digital asset that lives on another
chain).

Platforms commonly used:

●​ Ethereum (ERC-20, ERC-721)​


●​ Binance Smart Chain (BEP-20)​

●​ Polygon, Solana, Avalanche, etc.​

Basic Steps:

a) Choose the blockchain platform.​


b) Write and deploy a smart contract to define the token.​
c) Mint the token and distribute it as needed.

Advantages:

●​ No need to manage infrastructure.​

●​ Ideal for startups, fundraising (ICOs), and utility tokens.​

Disadvantages:

●​ Less control than native coins.​

●​ Dependent on the host blockchain's stability and fees.​

Example:

●​ Uniswap's UNI token was created on Ethereum.​

●​ Shiba Inu (SHIB) also launched as an ERC-20 token.​

✅ Option 4: Hire a Blockchain Developer or Use BaaS


(Blockchain-as-a-Service)

If you don’t have technical expertise, hiring a professional developer or using BaaS companies
can streamline the process.

Services offered by BaaS providers:

●​ Custom token or coin creation​

●​ Smart contract development​


●​ Hosting infrastructure and node management​

●​ Maintenance and upgrades​

Popular BaaS platforms:

●​ Amazon Web Services (AWS) Blockchain Templates​

●​ Microsoft Azure Blockchain Workbench​

●​ IBM Blockchain Platform​

●​ Chainzilla, Blockstream​

✅ Advantages of Creating a Cryptocurrency:


1.​ Customization: Full control over tokenomics (supply, fees, rewards).​

2.​ Learning Opportunity: Great for understanding blockchain deeply.​

3.​ Business Utility: Used for branding, fundraising (ICO/IDO), or creating new
ecosystems.​

4.​ Growth Potential: If successful, coins can gain massive value.​

✅ Disadvantages of Creating a Cryptocurrency:


1.​ Technical Complexity: Especially when building or modifying blockchains.​

2.​ Cost and Time: Creating, testing, auditing, and launching can be expensive.​

3.​ Ongoing Maintenance: Keeping the network secure and scalable is continuous work.​

4.​ Legal Risks: Many governments regulate ICOs and tokens; lack of compliance can
result in penalties.​
✅ Summary Table:
Approach Difficulty Cost Customizatio Infrastructure
n Required

Build own blockchain (Native High High Full Yes


Coin)

Modify existing blockchain Medium Mediu High Yes


m

Token on existing blockchain Low Low Limited No (uses host chain)

Hire developer / use BaaS Low-Med Mediu High Optional (outsourced)


m

✅ Real-World Applications:
●​ Startups: Launch tokens for product access or fundraising.​

●​ Games: In-game currencies and NFTs.​

●​ Supply Chains: Use blockchain for traceability, rewards.​

●​ Finance: Stablecoins and decentralized lending platforms.​

✅ Conclusion:
The process of coin creation offers multiple paths suited for various needs—from launching
your own blockchain with a native coin to minting a simple token for a project. The choice
depends on your goals, resources, technical capacity, and long-term vision. With growing
adoption of crypto assets, the ability to create and manage digital currencies is becoming a
valuable skill in today’s digital economy.
Transaction in Bitcoin Network
A Bitcoin transaction is a digital message that encodes the transfer of bitcoins from one
address to another. It involves cryptographic verification and is recorded in the blockchain, a
public and distributed ledger maintained by a decentralized peer-to-peer (P2P) network.

🔶 1. Basic Structure of a Transaction


A Bitcoin transaction contains:

1.​ Input(s): The source of bitcoins, taken from unspent outputs (UTXOs) of previous
transactions.​

2.​ Output(s): The recipient’s public address and the amount to be sent.​

3.​ Amount: The quantity of bitcoins to transfer.​

4.​ Digital Signature: Created using the sender’s private key, used to prove the
transaction's authenticity.​

5.​ Public Key: The public key associated with the sender's address, used to verify the
signature.​

6.​ Transaction ID (TXID): A unique identifier for each transaction, derived from hashing the
transaction data.​

🔶 2. Process of a Bitcoin Transaction


🧾 Step-by-step Flow:
1.​ Initiation:​

○​ A user initiates a transaction using a Bitcoin wallet.​

○​ They select a UTXO as the input, specify the amount, and provide the recipient’s
address.​

2.​ Signature Creation:​


○​ The transaction is signed with the sender’s private key, securing the transaction
and confirming ownership.​

3.​ Broadcasting:​

○​ The transaction is sent (broadcast) to the Bitcoin P2P network.​

○​ Nodes (peers) relay it until it reaches miners.​

4.​ Validation:​

○​ Nodes and miners verify:​

■​ The input UTXO is valid and unspent.​

■​ The digital signature is correct.​

■​ No double-spending is attempted.​

5.​ Inclusion in Mempool:​

○​ Verified transactions are added to the mempool, waiting to be mined.​

6.​ Mining:​

○​ Miners bundle transactions into a block.​

○​ They solve a proof-of-work puzzle.​

○​ The first miner to solve it mines the block and broadcasts it to the network.​

7.​ Block Confirmation:​

○​ Once the block is added to the blockchain, the transaction is considered


confirmed.​

○​ More blocks on top = more confirmations = more security.​

🔶 3. Example Scenario
Suppose Rupali wants to send 0.5 BTC to Rakshita:
●​ Input: Rupali’s UTXO of 1 BTC.​

●​ Output: Rakshita’s Bitcoin address receives 0.5 BTC.​

●​ Change: Remaining 0.49 BTC is sent to Rupali's change address (assuming 0.01 BTC
is the miner fee).​

●​ Signature: Rupali signs the transaction with her private key.​

This transaction:

●​ Gets broadcast to the network.​

●​ Verified and added to the mempool.​

●​ Included in a block by miners.​

●​ Once mined and confirmed, it becomes part of the immutable blockchain.​

🔶 4. Key Terms in Bitcoin Transactions


Term Description

UTXO (Unspent Transaction Represents spendable BTC, used as inputs in a new


Output) transaction.

Transaction Inputs Refer to previous UTXOs being spent.

Transaction Outputs Refer to newly created UTXOs going to the recipient (or
change address).

Mempool Temporary pool of unconfirmed transactions.

Fee Rate Users can specify fees to prioritize their transactions.

🔶 5. Additional Technical Points


●​ Bitcoin does not use accounts like banks. Instead, it uses UTXO-based accounting.​

●​ Once a transaction is created, it is indivisible – UTXOs must be fully consumed.​


●​ Higher transaction fees mean faster processing, especially during congestion.​

●​ Block Size Limit: Each block can store ~1 MB of data, limiting the number of
transactions per block.​

●​ Transactions are transparent but pseudonymous – addresses are not directly linked to
identities.​

🔶 7. Advantages of Bitcoin Transactions


●​ ✅ Decentralized verification – no need for third parties.​
●​ ✅ Immutable and secure – cannot be altered once confirmed.​
●​ ✅ Low transaction costs, especially cross-border.​
●​ ✅ Fast settlement compared to traditional banking systems.​
🔶 8. Challenges
●​ ⛔ Scalability – limited transaction capacity per block.​
●​ ⛔ Transaction delays in times of high network traffic.​
●​ ⛔ Complexity – for users unfamiliar with cryptographic systems.​

🔶 Conclusion
Bitcoin transactions are the core of the cryptocurrency system, providing a secure,
decentralized, and transparent way of transferring value. With mechanisms like UTXO,
cryptographic signatures, mining, and confirmation, the Bitcoin network ensures that every
transaction is valid, verifiable, and immutable.
Bitcoin P2P (Peer-to-Peer) Network
The Bitcoin Peer-to-Peer (P2P) network forms the backbone of the entire Bitcoin ecosystem.
It enables decentralized communication and coordination among participants for the exchange
of Bitcoin transactions and the maintenance of the blockchain ledger without any central
authority.

🔶 1. Introduction
The Bitcoin network is decentralized, meaning there is no central server or controlling authority.
Instead, it relies on a distributed network of nodes (computers) that work collaboratively to:

●​ Broadcast and verify transactions​

●​ Maintain and update the blockchain​

●​ Mine new blocks​

●​ Ensure network consensus​

Each node communicates with several other nodes in a peer-to-peer topology, similar to a
mesh network.

🔶 2. Architecture of the Bitcoin P2P Network


The P2P network comprises the following components:

Component Description

Nodes Devices that participate in the network by relaying information,


validating transactions, or mining.

Full Nodes Maintain a full copy of the blockchain and validate all rules of the
Bitcoin protocol.

Lightweight Nodes Rely on full nodes to verify transactions, only download block
(SPV) headers.

Miners Specialized nodes that gather transactions and create blocks by


solving proof-of-work puzzles.
Wallets Software that lets users store, send, and receive bitcoins by
interacting with nodes.

🔶 3. Working of the Bitcoin P2P Network


The network functions through the following steps:

✅ Step 1: Transaction Creation


●​ A user creates a transaction using their Bitcoin wallet.​

●​ The wallet signs the transaction using the user's private key.​

✅ Step 2: Transaction Broadcasting


●​ The transaction is broadcast to connected nodes.​

●​ These nodes validate the transaction and propagate it to their peers.​

✅ Step 3: Mempool Storage


●​ Valid transactions are stored in a temporary space called the mempool.​

●​ All unconfirmed transactions wait here to be mined.​

✅ Step 4: Mining and Block Creation


●​ Miners select transactions from the mempool and assemble them into a block.​

●​ They compete to solve a cryptographic puzzle using the Proof-of-Work algorithm.​

✅ Step 5: Block Propagation


●​ Once a miner finds a valid solution, the new block is broadcast to the entire P2P
network.​

●​ Other nodes verify the block and add it to their copy of the blockchain.​

✅ Step 6: Consensus Maintenance


●​ If nodes agree that the block is valid, they continue building on it.​

●​ Forks are resolved by following the longest valid chain.​

🔶 4. Features of Bitcoin P2P Network


Feature Description

Decentralization No single point of control; all nodes are equal participants.

Redundancy Multiple nodes store and maintain copies of the blockchain.

Fault Tolerance The system is resilient to node failures or attacks.

Transparency All confirmed transactions are publicly viewable on the blockchain.

Open Participation Anyone can join and run a node by downloading the software.

🔶 5. Types of Nodes in P2P Network


Type Role

Full Node Validates every block and transaction, stores full blockchain data.

Mining Node Special type of full node that performs mining.

Lightweight Node Verifies transactions using Merkle proofs and block headers.
(SPV)

Archival Node Stores additional historical data beyond the standard blockchain
size.
🔶 7. Advantages of Bitcoin P2P Network
●​ ✅ No Central Authority: Eliminates risks of centralized control.​
●​ ✅ Censorship Resistant: No single entity can block or reverse transactions.​
●​ ✅ Trustless System: Participants do not need to trust each other—rules and
cryptography govern the system.​

●​ ✅ Robust and Scalable: Can withstand node failures or malicious attacks.​

🔶 8. Challenges of Bitcoin P2P Network


●​ ⛔ Latency: Transaction confirmation can take time depending on network congestion.​
●​ ⛔ Bandwidth Usage: Full nodes require significant data transfer.​
●​ ⛔ Storage Requirements: Full nodes need large disk space to store the blockchain.​
●​ ⛔ Network Forks: Temporary disagreements among nodes may cause forks.​

🔶 9. Conclusion
The Bitcoin P2P network is a revolutionary model that enables secure, decentralized financial
transactions without intermediaries. It maintains the integrity of the blockchain by allowing open
participation, fault-tolerant communication, and distributed consensus. This architecture is the
foundation of Bitcoin’s reliability, transparency, and global accessibility.
Cryptocurrency Domain
The cryptocurrency domain encompasses all technologies, concepts, systems, and
applications involved in the creation, transfer, and management of digital currencies that operate
on decentralized blockchain platforms. It includes both the technological infrastructure and the
financial ecosystem surrounding digital money.

🔶 1. Introduction to Cryptocurrency
A cryptocurrency is a digital or virtual currency that uses cryptographic techniques for
secure transactions. Unlike fiat currencies issued by governments, cryptocurrencies operate
without central authorities such as banks or financial institutions.

The first and most widely known cryptocurrency is Bitcoin, introduced in 2009 by an
anonymous person or group known as Satoshi Nakamoto.

🔶 2. Core Components of the Cryptocurrency Domain


✅ a) Blockchain Technology
●​ The foundational technology behind cryptocurrencies.​

●​ A decentralized, immutable ledger that stores all transaction data in blocks.​

●​ Ensures transparency, traceability, and trust without third parties.​

✅ b) Cryptography
●​ Provides security and privacy.​

●​ Uses public-key cryptography to verify ownership and sign transactions.​

●​ Ensures integrity through hash functions like SHA-256.​

✅ c) Consensus Mechanisms
●​ Methods by which nodes agree on the state of the blockchain.​
●​ Common types include:​

○​ Proof of Work (PoW) – used in Bitcoin.​

○​ Proof of Stake (PoS) – used in Ethereum 2.0.​

○​ Delegated Proof of Stake (DPoS), Proof of Authority (PoA), etc.​

✅ d) Tokens and Coins


●​ Coins: Native digital currencies (e.g., Bitcoin, Ether).​

●​ Tokens: Built on top of other blockchains (e.g., ERC-20 tokens on Ethereum).​

✅ e) Wallets
●​ Software or hardware used to store and manage cryptocurrency private/public keys.​

●​ Types: Hot wallets (online), Cold wallets (offline like USB or paper).​

🔶 3. Categories of Cryptocurrencies
Category Description Example

Currency Coins Used for value exchange Bitcoin (BTC), Litecoin

Utility Tokens Provide access to a Binance Coin (BNB)


product/service

Security Represent ownership or equity tZERO


Tokens

Stablecoins Pegged to a real-world asset USDT, USDC

CBDCs Central Bank Digital Currencies e-RUPI (India concept), Digital Yuan

🔶 4. Applications of Cryptocurrency
●​ 💱 Digital Payments: Fast and borderless transactions.​
●​ 🛡️ Secure Record-Keeping: Transactions stored immutably.​
●​ 💰 Fundraising via ICOs/IDOs: Initial Coin Offerings for projects.​
●​ 🌐 Decentralized Finance (DeFi): Lending, borrowing, and trading without
intermediaries.​

●​ 🎮 NFTs and Gaming: Digital ownership of virtual items.​


●​ 📦 Supply Chain: Tracking provenance and product flow.​

🔶 5. Advantages of Cryptocurrency Domain


Advantage Description

Decentralization No central authority required

Security Cryptographic protection of data

Transparency All transactions are visible on the ledger

Lower Transaction Especially for cross-border payments


Cost

Speed Transactions complete faster than traditional


methods

Financial Inclusion Access to people without bank accounts

🔶 6. Challenges in Cryptocurrency Domain


Challenge Description

Volatility Prices fluctuate rapidly

Regulation Governments still debating legal status

Scalability Network congestion and slow transaction


speeds

Security Threats Hacking, phishing, and scams

Environmental Impact Especially PoW-based mining


🔶 7. Legal and Regulatory Perspective
●​ Some countries like El Salvador have adopted Bitcoin as legal tender.​

●​ Others like India and USA are in the process of developing strict regulations.​

●​ Key issues: Taxation, AML/KYC compliance, consumer protection.​

🔶 8. Future of the Cryptocurrency Domain


●​ Growth in DeFi, Web3, and NFT ecosystems.​

●​ Shift from PoW to green consensus mechanisms like PoS.​

●​ Integration with IoT, AI, and metaverse platforms.​

●​ Rise of Central Bank Digital Currencies (CBDCs).​

🔶 9. Conclusion
The cryptocurrency domain is a dynamic and transformative field that is reshaping how value
is exchanged globally. By combining advanced cryptography, decentralization, and innovative
financial systems, it provides a more transparent, secure, and inclusive alternative to traditional
money systems. Despite challenges like regulation and scalability, its future remains bright and
filled with potential.
Payments and Double Spending
With Types of Double Spending

🔶 1. Introduction
Cryptocurrency systems like Bitcoin allow users to perform peer-to-peer (P2P) digital
payments without relying on centralized intermediaries such as banks. However, this digital
nature of currency brings a unique challenge — double spending, which refers to spending the
same digital token more than once.

This problem is solved using blockchain technology, consensus mechanisms, and


cryptographic validations.

🔶 2. Payments in Cryptocurrency
A cryptocurrency payment involves the transfer of coins from one wallet to another. The steps
involved are:

✅ Process of Making a Payment:


1.​ Initiating the Transaction: The sender creates a transaction containing the recipient’s
address and the amount.​

2.​ Digital Signature: The transaction is signed using the sender’s private key to ensure
authenticity.​

3.​ Broadcasting: The transaction is broadcast to the network.​

4.​ Verification: Network nodes validate the transaction using the sender’s public key.​

5.​ Block Inclusion: A miner includes the verified transaction in a new block.​

6.​ Confirmation: Once the block is added to the blockchain, the transaction is considered
confirmed.​
🔶 3. What is Double Spending?
Double spending is the attempt to spend the same unit of cryptocurrency more than once.
In digital systems, unlike physical cash, it is possible to copy and resend the same digital
token.

If not prevented, double spending would compromise the trust and integrity of the
cryptocurrency system.

🔶 4. How Blockchain Prevents Double Spending


●​ Decentralized Ledger: All transactions are recorded publicly on a shared blockchain.​

●​ Timestamping: Each block is timestamped to ensure transaction order.​

●​ Consensus Mechanism: Miners/nodes verify and agree on a single valid transaction


history.​

●​ Unspent Transaction Outputs (UTXO): Once coins are spent, their outputs are marked
as “used” and cannot be reused.​

🔶 5. Types of Double Spending


There are several types of double-spending attacks in cryptocurrency networks:

🔹 a) Race Attack
●​ The attacker sends two transactions simultaneously:​

○​ One to a merchant.​

○​ Another to their own address.​

●​ The goal is for the second transaction (to self) to be confirmed first.​

●​ Common when merchants accept 0-confirmation transactions (before block inclusion).​

🔹 b) Finney Attack
●​ Requires mining power.​

●​ The attacker pre-mines a block that contains a transaction to themselves.​

●​ Then, they perform a purchase and immediately broadcast the pre-mined block —
invalidating the merchant’s unconfirmed transaction.​

●​ Prevented by waiting for 1+ confirmations before accepting payment.​

🔹 c) Vector76 Attack
●​ A combination of race and Finney attacks.​

●​ Used on SPV (Simplified Payment Verification) clients, which do not download full
blockchain data.​

●​ Exploits a time window where an SPV wallet sees a confirmed transaction that later gets
overwritten.​

🔹 d) 51% Attack
●​ The attacker controls more than 50% of the total mining power.​

●​ They can reverse transactions by reorganizing the blockchain, enabling double


spending.​

●​ This attack threatens the entire network integrity.​


🔶 6. Preventing Double Spending
Technique Description

Confirmations Wait for multiple block confirmations (usually 6 in Bitcoin).

UTXO Tracking Spent coins are removed from available balance.

Broadcast Watch for duplicate/unconfirmed transactions.


Monitoring

Consensus Security Strong proof-of-work/stake mechanisms reduce manipulation


chances.

Using Full Nodes Reduces SPV vulnerabilities and verifies the entire blockchain.

🔶 7. Implications of Double Spending


●​ Loss of Trust in digital currency systems.​

●​ Financial Losses to merchants.​

●​ Network Instability and reputation damage.​

●​ Can trigger regulatory actions and reduce cryptocurrency adoption.​

🔶 8. Real-World Examples
●​ Some early Bitcoin exchanges were attacked using race attacks due to lack of
confirmation wait time.​

●​ Smaller PoW coins like Bitcoin Gold have suffered 51% attacks, leading to millions in
losses.​
🔶 9. Conclusion
Payments and double spending are core concerns in the cryptocurrency domain. Blockchain's
innovation lies in solving this digital dilemma by using cryptographic signatures, decentralized
consensus, and immutable records. Understanding the types of double-spending and adopting
proper preventive strategies is essential to securing the digital payment ecosystem.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy