بازگشت به دوره

Bitcoin and Cryptocurrencies

0% تکمیل شده
0/ 144 گام
  1. Introduction: welcome to the course
    introduction
    5 موضوع‌ها
  2. Bitcoin Protocol & Consensus: A High Level Overview
    Intro
    1 موضوع
  3. Basic Concepts
    2 موضوع‌ها
  4. Bitcoin From The Ground Up
    11 موضوع‌ها
  5. Bitcoin Review
    5 موضوع‌ها
  6. QUIZ
  7. BLOCKCHAIN HISTORY: FROM THE CYPHERPUNK MOVEMENT to JPMORGAN CHASE
    Intro
    2 موضوع‌ها
  8. Pre-Bitcoin
    4 موضوع‌ها
  9. Early Bitcoin
    4 موضوع‌ها
  10. Scalability Debate and Ethereum
    4 موضوع‌ها
  11. Enterprise Blockchain
    3 موضوع‌ها
  12. State of the Industry
    3 موضوع‌ها
  13. Review, Readings, & More
    3 موضوع‌ها
  14. Quiz
  15. BITCOIN MECHANICS AND OPTIMIZATION: technical overview
    Intro
    2 موضوع‌ها
  16. Cryptographic Hash Functions
    9 موضوع‌ها
  17. A Tamper-Evident Database
    12 موضوع‌ها
  18. Signatures, ECDSA, and Addresses
    9 موضوع‌ها
  19. Bitcoin Script
    7 موضوع‌ها
  20. Advanced Bitcoin Script
    6 موضوع‌ها
  21. Review, Readings, & More
    4 موضوع‌ها
  22. Quiz
  23. bitcoin in real life: wallet mechanics, mining, & more
    Intro
  24. Types of Users
  25. Wallets
  26. Wallet Mechanics
  27. Mining
  28. Real World Mining
  29. Bitcoin Governance
  30. Review, Readings, & More
  31. Quiz
  32. game theory and network attacks: how to destroy bitcoin
    Intro
  33. Pool Strategies
  34. Double Spending
  35. Censorship
  36. Selfish Mining
  37. Defenses
  38. Review, Readings, & More
  39. Quiz
  40. ethereum and smart contracts: enabling a decentralized future
    Intro
  41. Smart Contracts
  42. Ethereum
  43. Ethereum Virtual Machine
  44. Ethereum Use Cases
  45. Ethereum Ecosystem
  46. Review, Readings, & More
  47. Quiz
  48. The End
    Beginning of something new
درس 21, موضوع 4
در حال پیشرفت

When Hashes Collide

نویسنده دسامبر 4, 2020
درس پیشرفت
0% تکمیل شده

Bitcoin operates under certain assumptions, such as an honest majority of computational power. The assumption we discussed in this last lecture was that cryptographic hashes are unique, given the properties of preimage, second preimage, and collision resistance.

Let’s say that you manage to break computer science as we know it and devise a way to make any input look like your preferred output. Formally, you can always construct an input y such that you can control the value of H(y) to be in your favor. You can create collisions at will. How can you then manipulate the Bitcoin protocol in your favor? There are several different answers, but you only need to provide one example.

Feel free to discuss amongst each other in the discussion board topic below. We’ll be grading the responses you paste into the text input.