Lecture 2
Lecture 2
Ross Anderson 1990’s – Multiple cryptographic articles, During the 1990’s and early 2000’s, Ross Anderson, a Professor of Security
early 2000’s arguing that financial institutions Engineering at Cambridge’s Computer Laboratory, published dozens of papers on
such as banks had significant cybersecurity and cryptosystems in general. These focused on how systems are
cybersecurity risks susceptible to intrusion and hacking, steganography, public key encryption
He noted that, in particular, financial institutions such as banks had significant
cybersecurity risks, and these risks did not primarily result from failures in
cryptography but rather in failures in the implementation of the security processes
and systems. Anderson would go on to argue for a new paradigm in processes and
protocols for cybersecurity, particularly in regard to hacking and intrusion.
Other Precedents
Author & Year Concept Significance
Adam Back, 1997 Hashcash was designed to In order to post to a site or mail server, posters needed to solve a small
disincentivize spammers by cryptographic puzzle prior to each post. The puzzle only took a second to solve,
requiring posters to solve a little and for individuals, would never be noticed; but spammers, issuing perhaps
proof-of-work puzzle which cost millions of mass emails, would incur significant costs. Cf.
electrical cycles... http://www.hashcash.org/papers/announce.txt
Michael Doyle, 1998 Chain of Evidence Protocols In 1998, Michael Doyle filed a patent for an invention that used public key digital
utilizing public key cryptography signature time-stamps that were based on the concept of transient time-interval-
for signing digital documents related secret cryptographic keys. These keys were then used to digitally sign
documents during specific time intervals and then are permanently destroyed.
The public key that corresponds to each time interval stamp (derived from the
private key) is saved for future authentication of the content of time-stamped data
and time of creation of time-stamped data. The validity of the public keys is
ensured through the certification of each time interval’s public key using the
previous time interval’s secret key, immediately before that secret key is destroyed
This invention hearkened back to the Haber and Stornetta article on time-
stamping documents, which relies on cryptography instead of trusted third parties
Other Precedents
Author & Year Concept Significance
Wei Dai, 1998 b-money ran anonymous peer-to-peer In his paper on b-money, Dai laid out the core properties of cryptocurrency
transactions where distributed systems, “a scheme for a group of untraceable digital pseudonyms to pay each other
nodes would maintain the ledger with money and to enforce contracts amongst themselves without outside help.”
and were validated through Satoshi Nakamoto referenced Dai’s work in his Bitcoin paper. Cf.
computational work http://www.weidai.com/bmoney.txt
Ian Grigg, 2005 Companies would keep a private Grigg believed that a third public ledger that would cryptographically sign every
double-entry journal of transaction in the public ledger would lead to a programmable public record that
transactions, but would add a third would make fraud less likely. Imagine this applicability in light of Bernie Madoff.
public ledger which could be Cf. http://iang.org/papers/triple_entry.html
verified by anyone
King, Oksman & Bry, The technology surrounding public On August 15, 2008, a patent was requested by Neal King, Vladimir Oksman, and
2008 and private keys described in this Charles Bry on Updating and Distributing Encryption Keys. Their patent focused
patent closely resembles what came on a method for providing secure communications through an exchange protocol
to be known (just a few months such as a password authenticated key exchange protocol, which is used to create a
later) as bitcoin keys and addresses. shared secret. From this shared secret, two keys are created: a utilized key (public)
and a stored key (private). The utilized key is used to encrypt messages between
nodes. When it is time to replace the utilized key to maintain security, the stored
key is used to encrypt messages for generating and distributing a new shared secret.
The new shared secret is then used to generate a new public key and a new private
key. There is some speculation that King et. al. registered the site Bitcoin.org,
buying the domain name anonymously over anonymousspeech.com...
Historical Developments Leading to Blockchain & Bitcoin
• Predecessor Papers
• Leslie Lamport and the Byzantine General’s Problem
• Haber & Stonetta, 1991
• Adam Back, Hashcash, 1997
• Wei Dai, b-money, 1998
• Michael Doyle patent, 1998
• Nick Szabo, The God Protocol, 1998
• David Chaum, DigiCash, 1999
• Ian Grigg and the third book, the public one, 2005
• Then, on October 31, 2008, Satoshi Nakamoto, whom no one had ever heard of before,
publishes a whitepaper on “Bitcoin,” an electronic peer-to-peer cash system and
subsequently, on January 9, 2009, publishes reference code for bitcoin on SourceForge,
written in C++ targeting the Microsoft Windows Visual Studio environment
So, Who is Satoshi Nakamoto?
• Fascinating to contemplate, a lot of linguistic research and speculation has gone into
this, but if you’re interested, some of the leading contenders are:
• Michael Clear, former cryptography student at Trinity College, Dublin. The New
Yorker's Joshua Davis did a linguistic analysis of Satoshi’s writings and Michael Clear’s
writings
• Adam Penenberg at FastCompany speculates that Satoshi is King, Oksman and Bry,
through more linguistic analysis, identifying one phrase “computationally impractical
to reverse,” which appeared in Satoshi’s writings as well as their patent
• Jed McCaleb, a resident of Japan, who created the troubled bitcoin exchange Mt. Gox
and later co-founded decentralized payment systems Ripple and Stellar
• Professors of CS Donal O'Mahony and Michael Peirce, of Trinity College, Dublin
(where Michael Clear was a student...)
• Wei Dai, creator of b-money
So, Who is Satoshi Nakamoto?
• Nick Szabo, founder of Bitgold, “I’ve concluded there is only one person in the whole
world that has the sheer breadth but also the specificity of knowledge and it is this
chap.”—Financial author Dominic Frisby
• Michael Weber, a Swiss software developer with odd ties to the origination of
bitcoin.org
• Dorian Prentice Satoshi Nakamoto, a reclusive Japanese-American computer engineer
from Temple City, CA, population ~35K in 2010
• Hal Finney, Satoshi’s first correspondent and first Bitcoin tester, who passed away in
August of 2014 from ALS, who, most incredibly, also lived in Temple City, CA
• In what is kind of like a real-life Byzantine General’s Problem, every single one of these
“Satoshi Candidates” have one thing remarkably in common...
• Whoever he, or she is, or they are, they all deny being the Satoshi Nakamoto...
• For more information, see a nice summary at coindesk.com:
https://www.coindesk.com/information/who-is-satoshi-nakamoto/ and
https://en.wikipedia.org/wiki/Satoshi_Nakamoto#Dorian_Nakamoto
WHAT IS MONEY?
“For the desire of money is the roote of all euill, which while some lusted after, they erred from the faith, and pearced
themselues through with many sorowes.”
—1 Timothy, 6:10, Geneva Bible, 1599
“The shock of Lehman wasn’t so much that it happened, but that even most experts trusted the ledgers so
completely until it was too late.”—Casey and Vigna, The Truth Machine, 2018