SlideShare a Scribd company logo
2
Most read
3
Most read
4
Most read
Understanding Blockchain Security
ITU Workshop on “Security Aspects of Blockchain”
(Geneva, Switzerland, 21 March 2017)
Understanding Blockchain Security
Dr. Rolf Lindemann
Nok Nok Labs, rolf@noknok.com
Geneva, Switzerland, 21 March 2017
How does it work?
Node 1
Who can
write to?
Each block
contains hash
of previous
block
What is the
“previous” block?
What is the
“previous”
block?
Element to be
“logged”
including
implicit “rules”
encoded in it.
The
genesis
Orphan
blocks
Orphan
blocks
Main
chain
Node 2
Node N
How many
nodes?
Who can
operate a
node?
Who can
operate a
node?
Who can
operate a
node?
What is the
“previous”
block?
What
input
checks?
Who can
read?
Summary (1)
• The term blockchain is not well defined today.
• We have to be careful what to put into publicly readable
blockchains.
– Cryptographic algorithms get weaker over time, but the data remains
in the blockchain.
– Originally we thought that hashed passwords are secure, we shouldn’t
repeat that mistake.
– Analyzing “big data” sometimes can de-anonymize records.
– People and systems fail, we need to make sure the impact of a failure
remains acceptable (even from a privacy perspective).
• Democracy is based on “one vote per head”. One vote per
“computing power unit” is not the same as you can buy computing
power with money.
Rolf Lindemann,
Nok Nok Labs
Summary (2)
• Several enhancements of Bitcoin blockchains have
been proposed.
• Standardizing replacement of deprecated crypto
algorithms should be investigated.
• Standardizing authentication (for non-public
blockchains) supports interoperability
• Typically blockchain elements are signed. Sometimes it
is helpful to require some “Level of Assurance” for
related keys. Standardizing key attestation supports
interoperability.
Rolf Lindemann,
Nok Nok Labs
Weaknesses
• No transactions can be deleted-ever  Node
data volume and required processing time for
verifications always increases. This is already
causing intense debates.
Rolf Lindemann,
Nok Nok Labs
Weaknesses
• Cost per transaction is relatively high – too
high fir micropayments
Rolf Lindemann,
Nok Nok Labs
Weaknesses
• Equal Rights
– Assume “Miners Club A“ owns 50% computing power
of the Blockchain system.
– Assume “Miners Club B” owns 30% computing power
of the Blockchain systems.
– Assume “Miners Club C” owns 10% computing
power of the Blockchain system
– Assume all those Miners Clubs decided following a
“My Miners Club First” strategy, i.e. whenever some
other miner has successfully added a new block N
they start adding new blocks ignoring block N.
Rolf Lindemann,
Nok Nok Labs
Opportunities
• Several initiatives (Otonomos, Mirror, Symbiont,
Eris/monax.io, …) look into smart contracts.
• Today the rules in Bitcoin and smart contracts
cannot easily reflect the strength of a signature
(of the block to be written to the blockchain).
But we know that in today’s world the “Level of
Assurance” plays an important role.
• There is a potential of adding attestation (for
signing keys) to blockchain.
Rolf Lindemann,
Nok Nok Labs
Opportunities
Node 1
Require
acceptable
signature
Potentially
require valid
authentication.
The
genesis
Element to be
logged (i.e. a
bitcoin
transaction
In some environments you might
require the signing key to be
kept securely or to even involve
user approval for signing. So we
might want to standardize key
attestation for such cases.
Some environments prefer
private blockchains (see
Hyperledger Fabric, Symbiont,
…).
Standardizing authentication will
help interoperability.
Attack Classes
Remotely attacking central servers
steal data for impersonation
1
Physically attacking user
devices
misuse them for
impersonation
6
Physically attacking user
devices
steal data for
impersonation
5
Remotely
attacking lots of
user devices
steal data for
impersonation
Remotely
attacking lots of
user devices
misuse them for
impersonation
Remotely
attacking lots of
user devices
misuse
authenticated
sessions
2 3 4
Scalable attacks
Physical attacks
possible on lost or
stolen devices
(3% in the US in 2013)
12

More Related Content

PDF
Introduction to Blockchain and Smart Contracts
PDF
Blockchain Security and Privacy
PPTX
Blockchain Security
PPTX
What is the future of blockchain in cybersecurity
PPTX
Blockchain in cyber security
PDF
Blockchain Security Issues and Challenges
PDF
Blockchain Scalability - Architectures and Algorithms
PDF
blockchain technology -unit-3-notes.pdf for engineering students
Introduction to Blockchain and Smart Contracts
Blockchain Security and Privacy
Blockchain Security
What is the future of blockchain in cybersecurity
Blockchain in cyber security
Blockchain Security Issues and Challenges
Blockchain Scalability - Architectures and Algorithms
blockchain technology -unit-3-notes.pdf for engineering students

What's hot (20)

PPTX
Introduction to Blockchain
PDF
An Introduction to Blockchain
PDF
Blockchain, cryptography, and consensus
 
PDF
Blockchain in Banking, Business and Beyond
PPTX
Blockchain Consensus Protocols
PPTX
Blockchain Technology
PDF
Blockchain Technology | Blockchain Explained | Blockchain Tutorial | Blockcha...
PPTX
Blockchain
PDF
Blockchain Presentation
PPTX
Blockchain technology
PDF
How does blockchain work
PPTX
Blockchain Introduction Presentation
PPTX
Basic introduction in blockchain, smart contracts, permissioned ledgers
PDF
Examples of Smart Contracts
PPTX
Blockchain and distributed ledgers
PDF
Introduction to Blockchain
PPTX
Overview of Blockchain Consensus Mechanisms
PPTX
PDF
Blockchain
Introduction to Blockchain
An Introduction to Blockchain
Blockchain, cryptography, and consensus
 
Blockchain in Banking, Business and Beyond
Blockchain Consensus Protocols
Blockchain Technology
Blockchain Technology | Blockchain Explained | Blockchain Tutorial | Blockcha...
Blockchain
Blockchain Presentation
Blockchain technology
How does blockchain work
Blockchain Introduction Presentation
Basic introduction in blockchain, smart contracts, permissioned ledgers
Examples of Smart Contracts
Blockchain and distributed ledgers
Introduction to Blockchain
Overview of Blockchain Consensus Mechanisms
Blockchain
Ad

Viewers also liked (20)

PDF
Blockchain and Security : A Virtuous Circle?
 
PDF
Blockchain: Definitions, Use Cases & Challenges
 
PDF
Blockchains : Risk or Mitigation?
 
PDF
Regulatory & Legal Aspects of Distributed Ledger Technology
 
PDF
5G and Automative : Cellular V2X (vehicle-to-everything)
 
PDF
Blockchain overview, use cases, implementations and challenges
PDF
Sitios web
PDF
Block Chain as a Platform February 2015 - LERNER Consulting
PDF
AESIN MWC2016 Presentations AESIN, Visteon, Plextek
PPTX
Network Architecture Work in ITU Focus Group IMT-2020
 
PDF
BCA Global's Food & Wine Experience
PDF
S4 tarea4 toork
PPTX
Incluyendo la diversidad, dinámica de conscientización
PDF
NGFI (Next Generation Fronthaul Interface) native RoE (Radio over Ethernet)
 
PPTX
Unidad v plan de negocios
PDF
Blockchain in Tunisia: From Experimentations to a Challenging Commercial Launch
 
PDF
Blockchain’s Brave New World
 
PDF
Using ICN to meet the IMT-2020 goals
 
PDF
Blockchain and Distributed Ledger Technologies: An EU Policy Perspective
 
PDF
AI and Automated Driving : An Ethically Aligned Design
 
Blockchain and Security : A Virtuous Circle?
 
Blockchain: Definitions, Use Cases & Challenges
 
Blockchains : Risk or Mitigation?
 
Regulatory & Legal Aspects of Distributed Ledger Technology
 
5G and Automative : Cellular V2X (vehicle-to-everything)
 
Blockchain overview, use cases, implementations and challenges
Sitios web
Block Chain as a Platform February 2015 - LERNER Consulting
AESIN MWC2016 Presentations AESIN, Visteon, Plextek
Network Architecture Work in ITU Focus Group IMT-2020
 
BCA Global's Food & Wine Experience
S4 tarea4 toork
Incluyendo la diversidad, dinámica de conscientización
NGFI (Next Generation Fronthaul Interface) native RoE (Radio over Ethernet)
 
Unidad v plan de negocios
Blockchain in Tunisia: From Experimentations to a Challenging Commercial Launch
 
Blockchain’s Brave New World
 
Using ICN to meet the IMT-2020 goals
 
Blockchain and Distributed Ledger Technologies: An EU Policy Perspective
 
AI and Automated Driving : An Ethically Aligned Design
 
Ad

Similar to Understanding Blockchain Security (20)

PPTX
1910990335_ppt on blockchain and its issue.ppt
PDF
IRJET- Security Threats on Blockchain and its Countermeasures
PDF
Comprehensive List Of Blockchain Security Tools
PPTX
Introduction to Blockchain technology .pptx
PPTX
Introduction to Blockchain technology.pptx
PPTX
Blockchain Security and Demonstration
PPTX
Blockchain and its application
PPTX
BLOCKCHAIN PPT.pptx
PDF
2019 blockchain economy
PPTX
Blockchain Advances & its Applications.pptx
PPTX
Security and privacy with blockchain
PDF
Blockchain As An Enabler_16 July 2016_David Lee_Final
PPTX
Block chain introduction to the world and how we can utilise it
PPTX
Blockchain overview - types, use-cases, security and usabilty
PPTX
SMART Seminar Series: "Blockchain and its Applications". Presented by Prof Wi...
PPTX
Distributed systems and blockchain technology
PDF
IDC - Blockchain Threat Model
PPTX
Understanding 51% Attacks on Blockchain: Vulnerabilities, Impacts, and Mitiga...
PPTX
Landgate Presentation on Blockchain
PPTX
Block chain introduction to the world and how we can utilise it
1910990335_ppt on blockchain and its issue.ppt
IRJET- Security Threats on Blockchain and its Countermeasures
Comprehensive List Of Blockchain Security Tools
Introduction to Blockchain technology .pptx
Introduction to Blockchain technology.pptx
Blockchain Security and Demonstration
Blockchain and its application
BLOCKCHAIN PPT.pptx
2019 blockchain economy
Blockchain Advances & its Applications.pptx
Security and privacy with blockchain
Blockchain As An Enabler_16 July 2016_David Lee_Final
Block chain introduction to the world and how we can utilise it
Blockchain overview - types, use-cases, security and usabilty
SMART Seminar Series: "Blockchain and its Applications". Presented by Prof Wi...
Distributed systems and blockchain technology
IDC - Blockchain Threat Model
Understanding 51% Attacks on Blockchain: Vulnerabilities, Impacts, and Mitiga...
Landgate Presentation on Blockchain
Block chain introduction to the world and how we can utilise it

More from ITU (20)

PDF
Do we need a wakeup call to keep driver-less cars protected?
 
PDF
Global Virtual Mobile Network for Car manufacturers
 
PDF
Coordination of Threat Analysis in ICT Ecosystems
 
PDF
Learning from the past: Systematization for Attacks and Countermeasures on Mo...
 
PDF
Trustworthy networking and technical considerations for 5G
 
PDF
The role of Bicycles and E-Bikes in the future development of Intelligent Tra...
 
PDF
Connected Cars & 5G
 
PDF
5G for Connected and Automated Driving
 
PDF
Securing the future of Automotive
 
PDF
The Connected Vehicle - Challenges and Opportunities.
 
PDF
Machine learning for decentralized and flying radio devices
 
PDF
AI and machine learning
 
PDF
Machine learning for 5G and beyond
 
PDF
Efficient Deep Learning in Communications
 
PDF
AI for Good Global Summit - 2017 Report
 
PDF
Standardization of XDSL and MGfast in ITU-T SG15
 
PPTX
One World One Global Sim
 
PPTX
ICTs, LDCs and the SDGs
 
PDF
Collection Methodology for Key Performance Indicators for Smart Sustainable C...
 
PDF
Enhancing innovation and participation in smart sustainable cities
 
Do we need a wakeup call to keep driver-less cars protected?
 
Global Virtual Mobile Network for Car manufacturers
 
Coordination of Threat Analysis in ICT Ecosystems
 
Learning from the past: Systematization for Attacks and Countermeasures on Mo...
 
Trustworthy networking and technical considerations for 5G
 
The role of Bicycles and E-Bikes in the future development of Intelligent Tra...
 
Connected Cars & 5G
 
5G for Connected and Automated Driving
 
Securing the future of Automotive
 
The Connected Vehicle - Challenges and Opportunities.
 
Machine learning for decentralized and flying radio devices
 
AI and machine learning
 
Machine learning for 5G and beyond
 
Efficient Deep Learning in Communications
 
AI for Good Global Summit - 2017 Report
 
Standardization of XDSL and MGfast in ITU-T SG15
 
One World One Global Sim
 
ICTs, LDCs and the SDGs
 
Collection Methodology for Key Performance Indicators for Smart Sustainable C...
 
Enhancing innovation and participation in smart sustainable cities
 

Recently uploaded (20)

PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
NewMind AI Monthly Chronicles - July 2025
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PPTX
MYSQL Presentation for SQL database connectivity
PPTX
Big Data Technologies - Introduction.pptx
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Empathic Computing: Creating Shared Understanding
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
Electronic commerce courselecture one. Pdf
PDF
KodekX | Application Modernization Development
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PPT
Teaching material agriculture food technology
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
NewMind AI Monthly Chronicles - July 2025
Reach Out and Touch Someone: Haptics and Empathic Computing
Agricultural_Statistics_at_a_Glance_2022_0.pdf
MYSQL Presentation for SQL database connectivity
Big Data Technologies - Introduction.pptx
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Diabetes mellitus diagnosis method based random forest with bat algorithm
“AI and Expert System Decision Support & Business Intelligence Systems”
Empathic Computing: Creating Shared Understanding
Network Security Unit 5.pdf for BCA BBA.
Chapter 3 Spatial Domain Image Processing.pdf
Electronic commerce courselecture one. Pdf
KodekX | Application Modernization Development
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Advanced methodologies resolving dimensionality complications for autism neur...
Building Integrated photovoltaic BIPV_UPV.pdf
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Teaching material agriculture food technology
The Rise and Fall of 3GPP – Time for a Sabbatical?

Understanding Blockchain Security

  • 2. ITU Workshop on “Security Aspects of Blockchain” (Geneva, Switzerland, 21 March 2017) Understanding Blockchain Security Dr. Rolf Lindemann Nok Nok Labs, [email protected] Geneva, Switzerland, 21 March 2017
  • 3. How does it work? Node 1 Who can write to? Each block contains hash of previous block What is the “previous” block? What is the “previous” block? Element to be “logged” including implicit “rules” encoded in it. The genesis Orphan blocks Orphan blocks Main chain Node 2 Node N How many nodes? Who can operate a node? Who can operate a node? Who can operate a node? What is the “previous” block? What input checks? Who can read?
  • 4. Summary (1) • The term blockchain is not well defined today. • We have to be careful what to put into publicly readable blockchains. – Cryptographic algorithms get weaker over time, but the data remains in the blockchain. – Originally we thought that hashed passwords are secure, we shouldn’t repeat that mistake. – Analyzing “big data” sometimes can de-anonymize records. – People and systems fail, we need to make sure the impact of a failure remains acceptable (even from a privacy perspective). • Democracy is based on “one vote per head”. One vote per “computing power unit” is not the same as you can buy computing power with money. Rolf Lindemann, Nok Nok Labs
  • 5. Summary (2) • Several enhancements of Bitcoin blockchains have been proposed. • Standardizing replacement of deprecated crypto algorithms should be investigated. • Standardizing authentication (for non-public blockchains) supports interoperability • Typically blockchain elements are signed. Sometimes it is helpful to require some “Level of Assurance” for related keys. Standardizing key attestation supports interoperability. Rolf Lindemann, Nok Nok Labs
  • 6. Weaknesses • No transactions can be deleted-ever  Node data volume and required processing time for verifications always increases. This is already causing intense debates. Rolf Lindemann, Nok Nok Labs
  • 7. Weaknesses • Cost per transaction is relatively high – too high fir micropayments Rolf Lindemann, Nok Nok Labs
  • 8. Weaknesses • Equal Rights – Assume “Miners Club A“ owns 50% computing power of the Blockchain system. – Assume “Miners Club B” owns 30% computing power of the Blockchain systems. – Assume “Miners Club C” owns 10% computing power of the Blockchain system – Assume all those Miners Clubs decided following a “My Miners Club First” strategy, i.e. whenever some other miner has successfully added a new block N they start adding new blocks ignoring block N. Rolf Lindemann, Nok Nok Labs
  • 9. Opportunities • Several initiatives (Otonomos, Mirror, Symbiont, Eris/monax.io, …) look into smart contracts. • Today the rules in Bitcoin and smart contracts cannot easily reflect the strength of a signature (of the block to be written to the blockchain). But we know that in today’s world the “Level of Assurance” plays an important role. • There is a potential of adding attestation (for signing keys) to blockchain. Rolf Lindemann, Nok Nok Labs
  • 10. Opportunities Node 1 Require acceptable signature Potentially require valid authentication. The genesis Element to be logged (i.e. a bitcoin transaction In some environments you might require the signing key to be kept securely or to even involve user approval for signing. So we might want to standardize key attestation for such cases. Some environments prefer private blockchains (see Hyperledger Fabric, Symbiont, …). Standardizing authentication will help interoperability.
  • 11. Attack Classes Remotely attacking central servers steal data for impersonation 1 Physically attacking user devices misuse them for impersonation 6 Physically attacking user devices steal data for impersonation 5 Remotely attacking lots of user devices steal data for impersonation Remotely attacking lots of user devices misuse them for impersonation Remotely attacking lots of user devices misuse authenticated sessions 2 3 4 Scalable attacks Physical attacks possible on lost or stolen devices (3% in the US in 2013)
  • 12. 12