Saturday, December 17, 2022

Blockchain

 

 BLOCKCHAIN 


Bitcoin and other cryptocurrencies received a lot of criticism during the last 9 years. It is not surprising that this criticism came from organizations that are threatened by the crypto revolution (Banks, government, central banks, finance companies, etc.). Nevertheless, it is very surprising to hear criticism from economics schools, which oppose central banking and advocate free choice in currencies (such as the Austrian school of economics). Unlike the ordinary criticism (that Bitcoin is a scam, a bubble, etc.), which can easily be refuted, the criticism of part of the Austrian school economists are based on interesting arguments, which requires a different level of explanation. For example, it was claimed that Bitcoin should be worthless; otherwise, it contradicts Mises’ regression theorem. The object of the chapter is twofold: first to explain why the criticism is unfounded and second to analyze the origin of the value of Bitcoin and other crypto-coins from the perspective of the Austrian school of economics. In particular, it is explained that Bitcoin does not contradict the regression theorem for two reasons. First, the initial value estimation can be a random event, and second, the Bitcoin network (even now) has a nonmonetary value.

Blockchain is a digital ledger in which transactions made in Bitcoin or another cryptocurrency are recorded chronologically and publicly. Bitcoin is a decentralized peer-to-peer digital crypto currency that is powered by its users with no central authority or middle men. The Bitcoin network shares a public ledger called blockchain. This ledger contains every transaction ever processed, allowing a user's computer to verify the validity of each transaction. The authenticity of each transaction is protected by digital signatures corresponding to sending addresses, allowing all users to have full control over sending Bitcoins from their own Bitcoin addresses. In addition, anyone can process transactions using the computing power of specialized hardware and earn a reward in Bitcoins for this service. This is often called "mining" is the process of spending computation power to secure Bitcoin transactions against reversal and introducing new Bitcoins to the system.

Bitcoin is based on three technologies: the Internet, encryption methods, and the new blockchain technology. Unlike these technologies, the Bitcoin revolution was both a technological revolution and a monetary one. It completely changed the monetary world, and it seems that its invention opened a Pandora box, whose effect cannot be underestimated or predicted.

 While some cryptocurrencies or tokens do seem to be a Ponzi scheme, Bitcoin is definitely not. Everything about Bitcoin: its algorithm, its network, and its development projects are completely transparent. The network, the mining process, and the entire project are all decentralized. There are no managers, no organizers, and no control. Therefore, there could be no fraud. Bitcoin is a decentralized network, where all the Bitcoins’ owners have the same status. Moreover, the founders of a crypto network may not even own a share in this network, or they can sell their share, if they have one. they are backed by nothing: “They are neither backed by gold nor are they backed by governments.” crypto advocates that Bitcoin is backed by proof-of-work, or, that it is backed by energy or by the mining’s electricity. The essence of the blockchain technology is the creation of scarce digital assets. That is, the blockchain creates artificial scarcity. Bitcoin is a global, decentralized, highly liquid, and pseudo-anonymous asset. Therefore, in any transaction, which requires all these properties, the benefits of using Bitcoin over other currencies are clear. Moreover, that is exactly the reason that most people do not appreciate these properties. First, most people are unaware of the damage caused by centralized monetary systems. Second, only rarely do they perform international financial transactions in large volumes. Third, most people are against anonymous transactions.

 A similar reasoning appears in a different argument against Bitcoin: The Bitcoin mining costs are extremely high, and even now, its electricity consumption is equal to that of a small country (like Ireland). Within several years, the costs would be gigantic, and it would be unprofitable to mine additional coins. At any given time, the users of the Bitcoin network are the ones who determine the amount of money they are willing to invest in the network security. That is, first, the mining cost cannot increase beyond the amount the users are willing to pay, and second, the electricity cost is not a wasted investment; it is a measure of the network security. The more people trust the Bitcoin network, the more they are willing to invest in it.

 The newly created random symmetric key may, in turn, be used in employing efficient advanced encryption standard (AES) over a single communication link. Unlike the functions used in asymmetric encryption, AES is crafted, rather than relying on number theory challenge, and believed to imply quantum-safe encryption. The key length should still be carefully selected to accommodate the quadratic speedup of search of Grover’s algorithm. Note that secure hash algorithms (SHA) are crafted, similarly to AES, and are also believed to be quantum safe, reducing the risk of finding an efficient number theory solution for a natural problem, such as discrete logarithm.

 Thus, Lamport’s signature can employ secure hash function, such as SHA. The use of Merkle trees with multiple private keys in the leaves (leaves that can also be produced by several nested hash functions) and the root of the tree serving as the public key yields an efficient, quantum-safe signature scheme.

Abstract

The need for a quantum-safe Internet is emerging, and this is a great opportunity to re-examine the legacy of public key infrastructure. There is a need for perspective on the evolution of cryptography over the years, including the perfect information-theoretical secure schemes and the computationally secure schemes, in particular. There is also a need to examine the evolving Internet infrastructure to identify efficient design and secure cryptographic schemes over the existing Internet infrastructure. A combination of overlay security, blockchain, and Merkle trees with Lamport’s signatures offers just such an easily implementable quantum-safe Internet.

1.  Introduction

Securing the digital world is essential as critical infrastructures are based on communicating with remote computers. The trust in the computer network is based on having a secure and authenticated communication. The change in social activity, where the big four companies Google, Amazon, Facebook, and Apple (GAFA) influence many aspects in modern society implies the need for secure computer and network infrastructures. The past interest in quantum cryptography has grown significantly in recent years. National Institute of Standards and Technology (NIST) authors wrote an overview on the subjects in 2009 [25], and the activity expanded dramatically, having dedicated conferences on the subject [27]. The most challenging component of Internet security that needs to be considered is the replacement of the existing asymmetric encryption scheme, namely, to replace an RSA [29]. For this there are several candidates: lattice-based cryptography (e.g., shortest vector problem, closest vector problem), code-based cryptography (e.g., McEliece, Niederreiter), and more (see, e.g., [24]). The second challenging task is a replacement for signature scheme; here hash-based Lamport’s one-time signature together with the Merkle tree is believed to address that need (see [39] for an overview). The integration of the post-quantum cryptographic ingredients into a complete infrastructure are also challenging (as we detail in the sequel).

 We present a design for quantum-safe communication over the existing Internet infrastructure. No hardware changes are required, only software updates over the heterogeneous Internet architecture. Different aspects of the solution are presented in the sequel

2. Quantum computing today

 The emergence of quantum computers is a beyond the commercial non-universal commercial quantum computer of several thousand qubits (quantum bits) of D-Wave IBM commercializes 50 qubits quantum computers. The quantum computer race leads to exponential growth in the number of qubits, where in 2018 Intel presented 49 qubits quantum computer and Google announced 72 qubits computers. In addition, several startups including Rigetti announced a 36 qubits quantum computer and a quantum processing unit.

 Many quantum computers restrict the qubits that participate as inputs for quantum gate operations and employ qubit teleportation to allow quantum gate operations over non-neighboring quantum bits. The advance in techniques for producing entangled qubits and teleportation may assist in using several quantum computers to cooperate on a task by teleporting qubits from one to another, thus building a virtual quantum computer with the needed qubits for the task. In particular, for breaking the asymmetric encryption schemes in use almost immediately, much earlier than estimated.

 3. Quantum algorithms

 Shor’s algorithm designed for quantum computers, changed the way modern cryptography and Internet security are captured. New algorithms for quantum computers are frequently invented.

Computationally secure cryptography is based on the unproven assumption of the existence of one-way function, a function that can be computed easily but is hard to be inverted. The risk that an algorithm that breaks a considered one-way function will be found always exists, e.g. Even one-way functions proposed for post-quantum cryptosystems are at risk of the discovery of new efficient inverse algorithms. One famous example of an open problem for decades is the primality test that had no polynomial deterministic algorithm, until just such an algorithm was found.

 4. Perspective on encryption

The asymmetric encryption schemes, proposed by Merkle, Diffie and Hellman, and Rivest et al, revolutionized cryptography. The idea to use computational tasks in order to establish a symmetric key started with the suggestion of Merkle to use computation puzzles. Merkle’s puzzle scheme started with Alice choosing at random many computation puzzles, possibly hashed random numbers (With tuned lengths) each concatenated with a sequence number, such that bob is able to randomly choose one of the puzzles and reverse this number in reasonable time. Then, Bob sends a few of the bits of the revealed random number back to Alice, identifying the puzzle Bob decided to solve. Both Alice and Bob will be using the unrevealed bits of the solved puzzle as their symmetric key. Eve on the other hand will not know which of the puzzles was chosen by Bob, will likely have to solve many puzzles before identifying the puzzle randomly chosen by Bob, and revealing the symmetric key they use. Later Diffie and Helman and then Rivest, Shamir and Adelman suggested more efficient schemes based on number theory assumptions.

 Asymmetric encryption enabled the creation of a symmetric key among communicating parties over tapped communication links and is even able to identify the intervention of malicious parties in the communication. The identification of such malicious parties was due to the capability of to sign certificates that monolithically associated a public key with the entity identity description to which the public key belongs. The signature was issued by a trusted third party, the certificate authority. This public key infrastructure is the de facto security infrastructure today, securing Internet activity, including military, governmental, social, financial, and, in fact, all activities in the Internet.

 

Thus, the appearance of quantum computers and fitting quantum algorithms, which may break the basic mathematical foundations of, has great implications. Post-quantum cryptosystems are examined, e.g., replacing the believed to be one-way functions that are currently used by other functions, which are also believed to be one-way functions. Provable perfect encryption does exist, namely, encryption based on the classical one-time paid, as long as the one-time pad is a true random sequence. True random sequences are possibly produced by the use of quantum effects, e.g.

Another difficulty in using one-time pad is the need to share the one-time pad prior to communication. The one-time pad can be shared prior to communication by physically delivering a copy of the one-time pad. Distribution of a one-time pad to many users may risk the loss or duplication of one copy of the one-time pad, nullifying the secrecy of the encryption.

 Quantum key distribution suggests using quantum bits superposition for detecting a tapper in the communication of random bits; however, this scheme can only be used in direct links of at most 100 km. Recently, succeeded in using satellites and quantum bits entanglement to share a key over longer distances. This key can be viewed as a short one-time pad, as the rate of the received random bits are limited. One difficulty is the need to mobilize the symmetric key received from the satellite in one satellite receiver to the actual place the key should be used and the fact that the key authenticates the satellite receiver, but may not yield the identification of other users.

 5. Overlay security

Occasionally, one needs to send a credit number electronically, sending one email with the first digits of the credit card and then another email with the rest. Still, the email servers and the Internet server providers may act as a man in the middle and tap in, capturing part or all of the digits of the credit card. It is possible to send a random string (one-time pad) via WhatsApp (owned by Facebook) and the bitwise x-or of the credit card with the random string via Gmail. On one hand, this resembles sending entangled bits in two channels. On the other hand, just like content distribution networks (CDN), e.g., Akamai, that uses overlay network of the Internet ISPs as their source for extra reliability and services, overlay security uses the accumulated secrecy, authenticity, and identification of the diverse capabilities of the communication channels, applications, and protocols.

The maturity and evolvement of the Internet technology enabled the CDN company to use the Internet infrastructure as a playground for delivering contents at will. In the last decades, more and more communication channels identify, authenticate, and secure the communication between entities. Email, SMS, push notifications, and messengers (WhatsApp, Facebook Messenger, Skype, Snapchat, LINE, LinkedIn, Telegram, Weibo, Slack, etc.) form logical secured channels. Each of the channels, even if they use the same physical channel, implies already built trust in the identification and authentication of the entity communicated through the channel. Moreover, the maintenance and repair of the security of each channel are guaranteed by the channel supplier.

Still, each channel may act as a man-in-the-middle accumulating the communications transmitted through the channel servers. The use of a random one-time pad over channels nullifies information accumulated by the server of each channel.

This is the current playground suggested to be used by the overlay security concept, to create a symmetric key based on perfectly secure information-theoretical secure scheme, namely, quantum-safe replacements for asymmetric encryption. In addition, the security of new channels can be obtained inductively by the security of existing channels, employing them to create a random shared key for the new channel.

6. Redundancy and secret sharing

 Overlay security uses several channels and random numbers to obtain a high level of confidence in identification, authentication, and secrecy, a level implied by all the used channels. However, if one of the channels, say Android push notification, is not available (possibly in China), then the communication is blocked. Secret sharing schemes imply a tunable threshold for the number of channels needed to reconstruct the secret. Shamir secret sharing is based on polynomials over a finite field, where each participant, in our case channel, receives one point of the polynomial and the secret is the free coefficient of the polynomial. For example, if the polynomial is a random linear function with the secret being the free coefficient, any two participants/channels can reveal

the secret, but a single participant/channel has absolutely no information on the secret. Polynomials with greater degrees used over many channels may imply more trust in the aggregated identification, authentication, and secrecy while allowing several of the channels to be blocked or even to corrupt the information conveyed through them.

7. Authentication Bay

 Identifying and authenticating an entity in the physical world by the digital world are the biggest challenges in information security. Having secured robust and reliable identification and authentication of a person, an institute, a company, or a device are the first chain in securing digital representation and processing of information. For example, a bank client needs to be identified and authenticated for performing digital operations on their account. The linkage between the physical entity and the digital representation of an entity allows processing of digital and physical assets in the computers and the Internet.

 The need for identification and authentication of an entity started before computers exist. Certificates signed by trusted authorities were used by governments to monitor the activity of the society, to enable law and order. Certificates used to authenticate entities were and are part of business infrastructure. The procedures used to authenticate an entity were and are defined by societies. A newborn child does not need a certificate to be born, obviously when the child is born at home. Moreover, a newborn may not have a certificate with identifying details, including identifying number, without enforcing society’s regulations. Some societies pay parents of newborns when they register the child, an attractive payment that almost ensures that newborn will be registered.

 In the scope of people, biometric identifications, by using fingerprints, face recognition, iris, and palm, are becoming standard. The identification starts with the registration process in which there is a need to identify and link the person with the biometric information recorded during the registration process. This is an error-prone process that encapsulates the challenge in the authentication bay. There is a need for a trusted authority (e.g., government, banks) or trusted manufacturer (e.g., Apple, Samsung) to collect biometric samples while authenticating the person by other means (e.g., driving license, passport) and digitally link them in a digital record. The actual biometric sampling would be better stored in a form of one-way hash, just like passwords; otherwise, they can be copied and used without the actual involvement of the biometric identification device (e.g., fingerprint reader, camera). Keeping the biometric database private and secure is another challenging task, as once a biometric data is leaked to untrusted entities, the search for confusing biometric data to fake identification can be feasible.Moreover, current technologies for identifying a person biometrically are not perfect. Biometric identifications have false positives, when a non-authorized person is identified as another authorized person and performs an action they are not allowed to perform. Biometric identifications also have false negatives, when a person is not correctly identified as the person registered and cannot perform actions they are authorized to take. DNA identification will also be possible in the near future; still identical twins share the same DNA.

 Having unique attributes is only one facet of the identification and authentication process, as there should be trust in the digital identification and authorization process. For example, consider a program identifying a person having DNA linked to the registered digital record of a person with a certain identity number, and then send an approval on the check. There are several questions to ask on the program actions. Does the program have the means to verify that the input device (e.g., fingerprint, camera) observed the person, or is it a mock-up? Were the input device being compromised and a replay attack performed? Another question is whether the program verified the collected data from the input device against the right registration record or was maybe hacked to output approval with no actual checking. This chain of trust is yielded from the trust in the biometric device producer. In the framework of the Internet of Things (IoT), the identification of things is even more challenging, as devices and items tend to be produced identically. Vehicle networking is now emerging, and the means to identify a car (by another car) is one of the basic ingredients that the trust vehicles have in inter-vehicle communication. Recent works suggested to monolithically sign the car description (e.g., driving license, color, and brand) and the public key associated with the car description in one monolithically signed certificate. The signing authority can be the governmental vehicle registration [10]. The car description should allow for a unique identification by means of an out-of-band channel such as a camera. Note that the identity of a device can be challenging; for example, consider two cars of the same model; if one exchanges the doors of these cars, does that alter the identity of the car? What about changing the engine? And so on.

 Another possibility for identifying IoT devices requires trust in the producer, which embeds a unique serial identification number, A unique identifying numbers in unaltered barcode, QR code, RFID, and ROM that can be used as part of the identification and authentication process.

 The cloud and blockchain infrastructures enable a new opportunity for representing each person, entity, and organization by a digital avatar. The avatar, being a digital historical record of events, digital assets, and procedures/functions defined to be executed upon given events. The identity linkage between the avatar and the physical entity accumulates trust over time, letting the physical entity monitor the possibility of identity theft, as recorded actions for the avatar can be examined by the actual entity represented by the avatar.

 Fake avatars already exist, and they are represented by profiles in social networks, Facebook, LinkedIn, etc., and may interact with persons as bots do. This is one light form of identity theft where-there may be no real entity linked to the avatar. Identity theft has been a trust problem in societies from the years of the bible where Jacob represented himself as Esav to Itzhak. Nowadays, the remote actions enabled in the digital interaction make the identity theft phenomena a major concern.

 In some cases, e.g., cryptocurrency, anonymity is an important aspect, as cash money, or digital money, appearing in an account had better not carry its history. Thus, every coin or bill having an identical value. Blockchain associates an account with a public key, where the matching private key is held by the owner of a wallet. This somewhat anonymous linkage between an entity and digital assets is only by the means of the private key. The vulnerability of such a solution erases the famous cases of lost/stolen private keys.

 Private keys are also a means to sign transactions binding the holder (even in court) to the transaction; thus, the way to secure the private key, possibly in enclaved memory, is very important.

Moreover, having a quantum-safe signature is a must, as the bidding is a very important aspect of the trust infrastructure, and if the bidding is broken, deniability of actions is possible. A client that transferred a million dollars from their account may rightly claim that someone else preformed the transfer to this account on their behalf, with no permission.

 Another aspect of the authentication bay is the usage of passwords. The illusion that passwords can contribute to the security of the communication is misleading. Many of the passwords are subject to dictionary attacks. Users tend to forget and manage passwords in vulnerable storage, leading to many password lists being sold on the black net. The typical password renewal procedure involves password reset invocation and a temporal password sent through email. Such single channel security is another weak chain in the security infrastructure, a weak chain that may dramatically benefit using the multichannel security and authenticity yielded from the overlay security concept.

 8. Distributed trust, blockchain, beyond social identity

Certificate authorities are a major source of trust for the public key infrastructure. The certificate authority identifies an entity and signs a certificate that associates a public key with the entity description. The history of the Internet testifies to examples of the vulnerability of the trust associated with certificate authorities. For example, private keys that were used to sign certificates were stolen, and significant percentage of the Internet were not secure. Recently, Estonia, Canada, and other countries started to use distributed trust among several trusted and heterogeneous entities as a source for identification. Such distributed trust is enabled by blockchain technology. Identity, verified by several trusted entities, possibly including governmental, financial, and notary entities, among others, is logged in a distributed fashion.

To communicate with an entity, a search of several participants in the distributed ledger returns contact information for the entity. Using the communication channels in the contact information and secret sharing enables the creation of a symmetric key. The newly created random symmetric key may, in turn, be used in employing efficient advanced encryption standard (AES) over a single communication link. Unlike the functions used in asymmetric encryption, AES is crafted, rather than relying on number theory challenge, and believed to imply quantum-safe encryption. The key length should still be carefully selected to accommodate the quadratic speedup of search of Grover’s algorithm [13]. Note that secure hash algorithms (SHA) are crafted, similarly to AES, and are also believed to be quantum safe, reducing the risk of finding an efficient number theory solution for a natural problem, such as discrete logarithm.

9. Quantum-safe signatures

 The ability to perform a transaction in an undeniable fashion over the Internet is important, especially when financial transactions are executed. Lamport’s one-time signature [21] is not tied to a particular one-way function. Thus, Lamport’s signature can employ secure hash function, such as SHA. The use of Merkle trees with multiple private keys in the leaves (leaves that can also be produced by several nested hash functions) and the root of the tree serving as the public key yields an efficient, quantum-safe signature scheme.

 In greater detail, the private key is an array of pairs of random numbers. The first random number pair is used to sign the first bit of the message; the second random number pair is used to sign the second bit of the message and so on. Note that, for reasons of efficiency, typically, the hash of the message is signed instead of signing the longer original message. Each random number in each pair is hashed (in fact, any other one-way functions can be used instead of hash), and the resulting array of hashed values serve as the public key. Once the public key is published in a way that links the signing entity to the public key, the construction can serve in signing any single binary string, a string that may be the hash of the original message to be signed. The actual signature is a sequence of random numbers from the private key, one from each pair, attached to the message to be signed. The first random number in the signature is the first (second) random number in the first pair if the first bit to be signed is zero (one, respectively). Similarly, the second random number in the signature is the first (second) random number in the second pair if the first bit to be signed is zero (one, respectively) and so on. Since the array of numbers in the public key are results of one-way hash function, no one but the producer of the public key is able (under standard computation assumptions) to know and expose the right portions of the private key. Hence, the signature is binding.

 Still, the need to identify an entity and associate the entity to the public key is the most challenging stage in authentication. Lamport’s signature essentially requires such an identification process for each signature. Fortunately, many of Lamport’s signatures may share a single public key, which consists of the roots of Merkle tree, one tree for each position of a random number in each pair of the private keys. The first positions, representing the private keys used to sign a zero value of the strings, consist of random numbers, such that such numbers belonging to the first two private keys are concatenated and hashed to yield the value of their common parent in the first Merkle tree. Similarly, for the second positions, the two random numbers are concatenated and hashed to yield the value of their parent in a second Merkle tree and so on. The parent of any such two leaves is concatenated to the hash obtained from the next two random numbers that reside in the same positions in the next two private keys and hashed yielding the value of the grandparent of these four values and so on.

 A signature will use one of the leaves, where each leaf is connected by a path to the roots of Merkle trees, one tree for each random number in the leaf. When using a leaf to sign, the appropriate random number in each pair of the leaf is exposed together with the missing hash values that are concatenated in each level of the tree. Thus, allowing the verifier to check that indeed any revealed random number leads to the corresponding value of the Merkle tree root public value.

The root value may be stored with the contact information that resides in the blockchain. The contact information with the public value of the root will be added to the distributed ledger after the blockchain participants verify and approve the identity of the contact information and root value owner.

Nowadays, every other crypto company wishes to launch their own coin with their own brand name; so, quite naturally, with the growing influx of new investors in the market, the more advanced and secured cryptocurrency wallets is on the rise.

Cryptocurrency hardware wallets are quite popular among investors since they provide advanced security. They provide facility to store private key offline and away from the internet. Which reduces their high chances of getting hacked.

There are some popular hardware crypto wallets are:

Ledger Nano X, Trezor Model T, Steel Bitcoin Wallet, Ellipal Titan, SafrPal S1, CoolWalletPro, Ledger Nano S, D'Cent Biometric Wallet etc..few to name it.


Conclusion:

Overlay security combined with distributed trust forms an immediate quantum-safe alternative to the public key infrastructure. The existing technologies enable the use of multi-logical/multi- physical channels to create a random secret at will, use of the blockchain distributed ledger as a replacement for single point of failure trusted authority, and to produce quantum-safe signatures.

Bitcoin is not a scheme; it is a great monetary invention, which has a clear economic value. It cannot and should not be banned by governments. In fact, any government’s manipulation and regulation emphasize and increase the need for cryptocurrencies. Criminals are not the only ones who see the benefits in using cryptocurrencies. In the third world (e.g., Venezuela and Zimbabwe), cryptos are lifesavers. In general, cryptos are extremely valuable wherever censorship resistance is required, and in a global market economy, that fact creates value for everyone. Bitcoin does suffer from infancy problems (high volatility and high transaction costs); however, these issues are not fundamental and will be resolved eventually (we already see many signs for that). The fact that the crypto market exceeded 800B$, despite these issues, only emphasizes the need of the markets in them. The energy which is spent in crypto mining is not a wasted energy. It is the source of the network’s security which increases the trust in the system, and in a market economy trust is a very valuable commodity. The easiness in the creation of new coins is not equivalent to fiat money inflation. Fiat inflation is a counterfeiting process, while the creation of new cryptos is equivalent to the creation of a new invention, which may be better, but it has to surmount the former coins’ network effect. Bitcoin does not contradict any economical law. In particular, it does not contradict Mises’ regression theorem for two grounds: first, Bitcoin was valuable for the first miners even before it was used as a medium of exchange, and the regression process can be kindled by any subjective whim; second, even now. Bitcoin has a nonmonetary value (just like gold) as a “real-estate” on the Bitcoin network.

 

No comments:

Post a Comment

Dark Matter

DARK MATTER: Dark matter hypothesis, we can try to justify using newtons universal law of gravity: There is a stronger gravitational field a...