SlideShare a Scribd company logo
The Blockchain and the
Future of Cybersecurity
6 August 2017
Introduction
 Jason Cuneo
 West Point, 1998, B.S. Electrical Engineering
 U.S. Army Officer, 1998 – 2004
 UAH, 2006, M.S. Electrical Engineering
 Auburn, Current, PhD Program, C.S. & Software Engineering
 Expertise
• Advanced Networking
• Vulnerability Assessments
• Course Development
• Cyber Exercises and Training
• Computer Network Defense
• Legacy System Security Testing
• Microelectronics
Overview
 Blockchain technologies have
expanded significantly since the
initial introduction of the
Bitcoin whitepaper in October
2008
 Most associate blockchain
technologies solely with
cryptocurrency ledgers and
accounting
 Bitcoin
 Ethereum
 Dash
 ZCash
 Blockchain applications have
expanded to security of numerous
domains including networks,
applications, agreements, and
proof of ownership
What is a Ledger?
https://blockgeeks.com/guides/what-is-blockchain-technology
Blockchain Introduction
 A blockchain provides a mechanism to distribute
digital information and decentralize security
Blockchain Introduction
 The blockchain becomes a
decentralized database with
all transactions that have
occurred up to that point
 Each blockchain has a
specified time between each
new block
 After the block time has
been reached, all new
transactions during that
time are added to the hashed
value of the previous blocks
 Transactions are only added
after network consensus is
reached
New Transactions
Proof of Work Blockchains
 Proof of work (PoW) indicates the method employed by
blockchain to verify that calculations were
successfully completed
 Each node MUST demonstrate their PoW to all other
nodes on the blockchain in order to be given “credit”
for their processing power
 For the Bitcoin protocol, a value called a “nonce”
is added to the transaction ledger to find a specific
hash property namely, a set number of leading zeros
in the resulting hash
Block + Nonce
Fixed Variable
00000a2bc5d……
Block Chain Demonstration
https://anders.com/blockchain/block.html
Practical Distributed Ledgers
 Each node maintains access to
the distributed “ledger”
 New blocks are distributed to
every node for processing
 The ultimate objective of node
processing is a reduced “hash”
that “proves” that work has been
applied to the blockchain
Proof of Work
 There are other forms of
confirmation
Proof of Stake
Blockchain Adoption
Current market
capitalization for
blockchain
cryptocurrencies as of
today is $112 B
http://coinmarketcap.com
Under Armour: $9 B
Target: $53 B
General Motors: $60 B
Nike: $89 B
Amazon: $400 B
Google: $580 B
Apple: $730 B
NYSE: $21 T
Decentralized Applications
 Bitcoin decentralized networking demonstrated the
feasibility of secure applications
 Showed how to distribute and maintain an accounting
of continuously added transactions
 Blockchain technologies have expanded to in many
domains:
 Decentralized Banking
 Network Security
 Identity Protection
 Distributed Storage
 “Smart” Contracts
http://www.huffingtonpost.com/ameer-rosic-/5-blockchain-applications_b_13279010.html
Proof of Work Monitoring
 Real Time Monitoring
of POW applications
 Identification of
network security
 Tracking of worker
efficiency
 API development and
improvement
Address Generation
 The generation of addresses for
any blockchain depends on the
implementation of the
cryptographic algorithm
 For example, in order to create
a bitcoin address for the
sending and receiving of
bitcoin, an Elliptical Curve
Cryptography (ECC) algorithm
used
 Before an address can be
generated, it is necessary to
have a public / private key pair
 There is a mathematical
relationship between the public
and private key, but is
currently computationally
infeasible to calculate the
private key from the public key
https://en.bitcoin.it/wiki/File:PubKeyToAddr.png
Random Private Key Generation
Address Generation Demonstration
Public / Private Key Pair
Blockchain Security Innovations
 Blockchain-based
applications distribute
security
Blockchain-Based PKI
o Certificate Authority
centralization creates a single
point of failure
o Key verification through consensus
Secure identities
Data integrity
o Hashing techniques must contend
with collision avoidance
o Distributed data and comparison
techniques
Transaction signing
https://venturebeat.com/2017/01/22/blockchains-brilliant-approach-to-cybersecurity
Blockchain Integration
 A number of projects are
currently building their
technology into existing
infrastructure
 Secure identify management
 Transaction Signing
 Interaction with
decentralized applications
that support specific
blockchains
Distributed Applications
 What can be decentralized?
 How can distributed applications be integrated into
existing technology?
 What needs to change to bring about adoption?
https://dapps.ethercasts.com/
Blockchain Effects on Cybersecurity
 Completely open source
confirmation of transactions
 Not every application needs
to be decentralized, but a
number of key cybersecurity
applications will benefit
 Instead of transactions,
blockchain explorers can be
modified to provide
distributed confirmation of:
Personal Identity
Data Integrity and Sharing
Network Security
Non-Bitcoin Blockchains
 There is enormous interest in the development of
non-bitcoin blockchains to aid in a wide variety of
current technical problems:
 Ethereum – Decentralized Applications
 Digital Cash – Private Payment
 Zcash – Zero Knowledge Cryptography
 Monero – Privacy
 Ripple – Global Payment Blockchain (Japanese Banks)
 Auger – Prediction Market Blockchain (Ethereum-Based)
 IOTA – Decentralized Internet of Things (IoT) security
 NEO – China’s Ethereum
Bitcoin Market Dominance
SEC Bitcoin
ETF Decision
Source: CoinMarketCap
Practical Blockchain Considerations
 Continued Blockchain Adoption
 Upcoming Bitcoin “Upgrades”
 Cryptocurrency Markets and Investing
 Corporate Support of Blockchain Projects
 Regulations
Questions?

More Related Content

What's hot (20)

PPTX
Cybersecurity aspects of blockchain and cryptocurrency
Tony Martin-Vegue
 
PPTX
What is the future of blockchain in cybersecurity
Blockchain Council
 
PDF
Blockchain: The New Technology and Its Applications for Libraries
Bohyun Kim
 
PDF
Blockchain Technology Fundamentals
Experfy
 
PDF
Blockchain and Cryptocurrency for Dummies
Narudom Roongsiriwong, CISSP
 
PDF
Blockchain
Venkatesh Jambulingam
 
PDF
Blockchain Security Issues and Challenges
Merlec Mpyana
 
PDF
An Introduction to Blockchain Technology
Niuversity
 
PPTX
Blockchain ppt
Wajihawaseem
 
PDF
Blockchain Explained | Blockchain Simplified | Blockchain Technology | Blockc...
Edureka!
 
PDF
Blockchain Presentation
Zied GUESMI
 
PPTX
Blockchain
PedramDehghanpour
 
PDF
An Introduction to Blockchain
NexThoughts Technologies
 
PPTX
Hyperledger Fabric
Murughan Palaniachari
 
PPTX
Blockchain in cyber security
zaarahary
 
PPTX
Blockchain concepts
Murughan Palaniachari
 
PPTX
Ppt on blockchain technology
RATAN AGARWALA
 
PDF
Understanding Blockchain Security
ITU
 
PPTX
Blockchain Technology
PalakGulati10
 
PPTX
Blockchain Technology
Mithileysh Sathiyanarayanan
 
Cybersecurity aspects of blockchain and cryptocurrency
Tony Martin-Vegue
 
What is the future of blockchain in cybersecurity
Blockchain Council
 
Blockchain: The New Technology and Its Applications for Libraries
Bohyun Kim
 
Blockchain Technology Fundamentals
Experfy
 
Blockchain and Cryptocurrency for Dummies
Narudom Roongsiriwong, CISSP
 
Blockchain Security Issues and Challenges
Merlec Mpyana
 
An Introduction to Blockchain Technology
Niuversity
 
Blockchain ppt
Wajihawaseem
 
Blockchain Explained | Blockchain Simplified | Blockchain Technology | Blockc...
Edureka!
 
Blockchain Presentation
Zied GUESMI
 
Blockchain
PedramDehghanpour
 
An Introduction to Blockchain
NexThoughts Technologies
 
Hyperledger Fabric
Murughan Palaniachari
 
Blockchain in cyber security
zaarahary
 
Blockchain concepts
Murughan Palaniachari
 
Ppt on blockchain technology
RATAN AGARWALA
 
Understanding Blockchain Security
ITU
 
Blockchain Technology
PalakGulati10
 
Blockchain Technology
Mithileysh Sathiyanarayanan
 

Similar to The Blockchain and the Future of Cybersecurity (20)

PDF
Blockchain Technology Sharing Dang - Minh Tam
Nguyễn Quang Huy
 
PPTX
Blockchain technology
Dr. Mohamed Torky
 
PDF
slidesgo-understanding-blockchain-fundamentals-and-architectural-principles-2...
jksam37
 
PPT
Block_Chain_Technology and its concepts in reality
nazimsattar
 
PDF
Blockchain for ePedigree - Whitepaper
Mike Nejad
 
PDF
How Blockchain Technology Is Evolving In The Cloud
ShikhaKonda
 
PDF
How Blockchain Technology Is Evolving In The Cloud - GoDgtl.pdf
PeeterParkar
 
PDF
170321 cebit blockchain summit frank bolten
Frank Bolten
 
PDF
The Future Is Blockchain Era
Briskinfosec Technology and Consulting
 
PPTX
Security and privacy with blockchain
Celine George
 
PPTX
module 5_Introduction-to-Blockchains.pptx
RAJPUTMANITA
 
PPTX
Overview-of-Blockchain-Technology-and-Ethereum.pptx
xhamm1994
 
PPT
BLOCKCHAIN TECHNOLOGY.ppt
jishnub8
 
PDF
Introducing Blockchain Development – A Complete Guide in 2024.pdf
Qubited
 
PDF
IRJET- Secure Online Voting Systems using Block of Chunks
IRJET Journal
 
PDF
IRJET- Blockchain Technology
IRJET Journal
 
DOCX
Supply Chain Management using Blockchain
Yugn27
 
PDF
Blockchain-Based Internet of Things: Review, Current Trends, Applications, an...
AlAtfat
 
PDF
Blockchain-Based Internet of Things: Review, Current Trends, Applications, an...
AlAtfat
 
PPTX
Blockchain on Azure
Nuri Cankaya
 
Blockchain Technology Sharing Dang - Minh Tam
Nguyễn Quang Huy
 
Blockchain technology
Dr. Mohamed Torky
 
slidesgo-understanding-blockchain-fundamentals-and-architectural-principles-2...
jksam37
 
Block_Chain_Technology and its concepts in reality
nazimsattar
 
Blockchain for ePedigree - Whitepaper
Mike Nejad
 
How Blockchain Technology Is Evolving In The Cloud
ShikhaKonda
 
How Blockchain Technology Is Evolving In The Cloud - GoDgtl.pdf
PeeterParkar
 
170321 cebit blockchain summit frank bolten
Frank Bolten
 
The Future Is Blockchain Era
Briskinfosec Technology and Consulting
 
Security and privacy with blockchain
Celine George
 
module 5_Introduction-to-Blockchains.pptx
RAJPUTMANITA
 
Overview-of-Blockchain-Technology-and-Ethereum.pptx
xhamm1994
 
BLOCKCHAIN TECHNOLOGY.ppt
jishnub8
 
Introducing Blockchain Development – A Complete Guide in 2024.pdf
Qubited
 
IRJET- Secure Online Voting Systems using Block of Chunks
IRJET Journal
 
IRJET- Blockchain Technology
IRJET Journal
 
Supply Chain Management using Blockchain
Yugn27
 
Blockchain-Based Internet of Things: Review, Current Trends, Applications, an...
AlAtfat
 
Blockchain-Based Internet of Things: Review, Current Trends, Applications, an...
AlAtfat
 
Blockchain on Azure
Nuri Cankaya
 
Ad

Recently uploaded (20)

PDF
July Patch Tuesday
Ivanti
 
PDF
Achieving Consistent and Reliable AI Code Generation - Medusa AI
medusaaico
 
PDF
NewMind AI Journal - Weekly Chronicles - July'25 Week II
NewMind AI
 
PDF
Fl Studio 24.2.2 Build 4597 Crack for Windows Free Download 2025
faizk77g
 
PPTX
Building Search Using OpenSearch: Limitations and Workarounds
Sease
 
PDF
Impact of IEEE Computer Society in Advancing Emerging Technologies including ...
Hironori Washizaki
 
PDF
Building Real-Time Digital Twins with IBM Maximo & ArcGIS Indoors
Safe Software
 
PDF
Exolore The Essential AI Tools in 2025.pdf
Srinivasan M
 
PDF
Presentation - Vibe Coding The Future of Tech
yanuarsinggih1
 
PPTX
Top iOS App Development Company in the USA for Innovative Apps
SynapseIndia
 
PPTX
MSP360 Backup Scheduling and Retention Best Practices.pptx
MSP360
 
PDF
Human-centred design in online workplace learning and relationship to engagem...
Tracy Tang
 
PDF
Empower Inclusion Through Accessible Java Applications
Ana-Maria Mihalceanu
 
PPTX
Building a Production-Ready Barts Health Secure Data Environment Tooling, Acc...
Barts Health
 
PDF
Complete Network Protection with Real-Time Security
L4RGINDIA
 
PPTX
Webinar: Introduction to LF Energy EVerest
DanBrown980551
 
PDF
Building Resilience with Digital Twins : Lessons from Korea
SANGHEE SHIN
 
PDF
New from BookNet Canada for 2025: BNC BiblioShare - Tech Forum 2025
BookNet Canada
 
PDF
SFWelly Summer 25 Release Highlights July 2025
Anna Loughnan Colquhoun
 
PPTX
UiPath Academic Alliance Educator Panels: Session 2 - Business Analyst Content
DianaGray10
 
July Patch Tuesday
Ivanti
 
Achieving Consistent and Reliable AI Code Generation - Medusa AI
medusaaico
 
NewMind AI Journal - Weekly Chronicles - July'25 Week II
NewMind AI
 
Fl Studio 24.2.2 Build 4597 Crack for Windows Free Download 2025
faizk77g
 
Building Search Using OpenSearch: Limitations and Workarounds
Sease
 
Impact of IEEE Computer Society in Advancing Emerging Technologies including ...
Hironori Washizaki
 
Building Real-Time Digital Twins with IBM Maximo & ArcGIS Indoors
Safe Software
 
Exolore The Essential AI Tools in 2025.pdf
Srinivasan M
 
Presentation - Vibe Coding The Future of Tech
yanuarsinggih1
 
Top iOS App Development Company in the USA for Innovative Apps
SynapseIndia
 
MSP360 Backup Scheduling and Retention Best Practices.pptx
MSP360
 
Human-centred design in online workplace learning and relationship to engagem...
Tracy Tang
 
Empower Inclusion Through Accessible Java Applications
Ana-Maria Mihalceanu
 
Building a Production-Ready Barts Health Secure Data Environment Tooling, Acc...
Barts Health
 
Complete Network Protection with Real-Time Security
L4RGINDIA
 
Webinar: Introduction to LF Energy EVerest
DanBrown980551
 
Building Resilience with Digital Twins : Lessons from Korea
SANGHEE SHIN
 
New from BookNet Canada for 2025: BNC BiblioShare - Tech Forum 2025
BookNet Canada
 
SFWelly Summer 25 Release Highlights July 2025
Anna Loughnan Colquhoun
 
UiPath Academic Alliance Educator Panels: Session 2 - Business Analyst Content
DianaGray10
 
Ad

The Blockchain and the Future of Cybersecurity

  • 1. The Blockchain and the Future of Cybersecurity 6 August 2017
  • 2. Introduction  Jason Cuneo  West Point, 1998, B.S. Electrical Engineering  U.S. Army Officer, 1998 – 2004  UAH, 2006, M.S. Electrical Engineering  Auburn, Current, PhD Program, C.S. & Software Engineering  Expertise • Advanced Networking • Vulnerability Assessments • Course Development • Cyber Exercises and Training • Computer Network Defense • Legacy System Security Testing • Microelectronics
  • 3. Overview  Blockchain technologies have expanded significantly since the initial introduction of the Bitcoin whitepaper in October 2008  Most associate blockchain technologies solely with cryptocurrency ledgers and accounting  Bitcoin  Ethereum  Dash  ZCash  Blockchain applications have expanded to security of numerous domains including networks, applications, agreements, and proof of ownership
  • 4. What is a Ledger? https://blockgeeks.com/guides/what-is-blockchain-technology
  • 5. Blockchain Introduction  A blockchain provides a mechanism to distribute digital information and decentralize security
  • 6. Blockchain Introduction  The blockchain becomes a decentralized database with all transactions that have occurred up to that point  Each blockchain has a specified time between each new block  After the block time has been reached, all new transactions during that time are added to the hashed value of the previous blocks  Transactions are only added after network consensus is reached New Transactions
  • 7. Proof of Work Blockchains  Proof of work (PoW) indicates the method employed by blockchain to verify that calculations were successfully completed  Each node MUST demonstrate their PoW to all other nodes on the blockchain in order to be given “credit” for their processing power  For the Bitcoin protocol, a value called a “nonce” is added to the transaction ledger to find a specific hash property namely, a set number of leading zeros in the resulting hash Block + Nonce Fixed Variable 00000a2bc5d……
  • 9. Practical Distributed Ledgers  Each node maintains access to the distributed “ledger”  New blocks are distributed to every node for processing  The ultimate objective of node processing is a reduced “hash” that “proves” that work has been applied to the blockchain Proof of Work  There are other forms of confirmation Proof of Stake
  • 10. Blockchain Adoption Current market capitalization for blockchain cryptocurrencies as of today is $112 B http://coinmarketcap.com Under Armour: $9 B Target: $53 B General Motors: $60 B Nike: $89 B Amazon: $400 B Google: $580 B Apple: $730 B NYSE: $21 T
  • 11. Decentralized Applications  Bitcoin decentralized networking demonstrated the feasibility of secure applications  Showed how to distribute and maintain an accounting of continuously added transactions  Blockchain technologies have expanded to in many domains:  Decentralized Banking  Network Security  Identity Protection  Distributed Storage  “Smart” Contracts http://www.huffingtonpost.com/ameer-rosic-/5-blockchain-applications_b_13279010.html
  • 12. Proof of Work Monitoring  Real Time Monitoring of POW applications  Identification of network security  Tracking of worker efficiency  API development and improvement
  • 13. Address Generation  The generation of addresses for any blockchain depends on the implementation of the cryptographic algorithm  For example, in order to create a bitcoin address for the sending and receiving of bitcoin, an Elliptical Curve Cryptography (ECC) algorithm used  Before an address can be generated, it is necessary to have a public / private key pair  There is a mathematical relationship between the public and private key, but is currently computationally infeasible to calculate the private key from the public key https://en.bitcoin.it/wiki/File:PubKeyToAddr.png Random Private Key Generation
  • 15. Public / Private Key Pair
  • 16. Blockchain Security Innovations  Blockchain-based applications distribute security Blockchain-Based PKI o Certificate Authority centralization creates a single point of failure o Key verification through consensus Secure identities Data integrity o Hashing techniques must contend with collision avoidance o Distributed data and comparison techniques Transaction signing https://venturebeat.com/2017/01/22/blockchains-brilliant-approach-to-cybersecurity
  • 17. Blockchain Integration  A number of projects are currently building their technology into existing infrastructure  Secure identify management  Transaction Signing  Interaction with decentralized applications that support specific blockchains
  • 18. Distributed Applications  What can be decentralized?  How can distributed applications be integrated into existing technology?  What needs to change to bring about adoption? https://dapps.ethercasts.com/
  • 19. Blockchain Effects on Cybersecurity  Completely open source confirmation of transactions  Not every application needs to be decentralized, but a number of key cybersecurity applications will benefit  Instead of transactions, blockchain explorers can be modified to provide distributed confirmation of: Personal Identity Data Integrity and Sharing Network Security
  • 20. Non-Bitcoin Blockchains  There is enormous interest in the development of non-bitcoin blockchains to aid in a wide variety of current technical problems:  Ethereum – Decentralized Applications  Digital Cash – Private Payment  Zcash – Zero Knowledge Cryptography  Monero – Privacy  Ripple – Global Payment Blockchain (Japanese Banks)  Auger – Prediction Market Blockchain (Ethereum-Based)  IOTA – Decentralized Internet of Things (IoT) security  NEO – China’s Ethereum
  • 21. Bitcoin Market Dominance SEC Bitcoin ETF Decision Source: CoinMarketCap
  • 22. Practical Blockchain Considerations  Continued Blockchain Adoption  Upcoming Bitcoin “Upgrades”  Cryptocurrency Markets and Investing  Corporate Support of Blockchain Projects  Regulations