About the Course:
Blockchain having wide impact and potential growth for change around the world. It is changing how business is executed. It's important to understand why Blockchain is different and how it works in comparison with technologies of the past.
Learn a conceptual view of Blockchain for the new applications that they enable.
Apply the Blockchain for various applications to provide a secure way of data access using cryptographic functions.
Learn various consensus mechanisms to implement for various real time applications.
Familiarize with the Blockchain deployment tools.
Learn various vulnerabilities and security mechanisms of Blockchain.
At the end of this course, the student will be able to:
Analyze how the traditional databases can be replaced with Blockchain for the real time applications.
Integrate various cryptographic algorithms in to Blockchain.
Apply various consensus mechanisms to the real world Blockchain applications.
Evaluate the setting where a Blockchain based structure may be applied, its potential and its limitation.
Identify the threats of Blockchain and deploy security mechanisms.
Blockchain Introduction - 10 Hours
Key Blockchain Concepts, Nodes, Cryptocurrency, tokens, Public Ledger, Peer to peer Network, Types of Blockchain, Permissioned Blockchain model, Permission-less Blockchain model, Blockchain Construction.
Cryptography - 12 Hours
Machines that encrypted data in the past, Modern encryption, Private and public keys, Hash functions, From blocks to hashes, Hash Pointer, Markle tree, Ledgers, Transactions and trade, The public witness, Computers that witness, Distributed Consensus, Smart contract design, Bitcoin Blockchain Network.
The structure of the network: consensus algorithm - 12 Hours
Proof of Work, Proof of Stake, Delegated Proof of Stake, Proof of Authority, Proof of Elapsed Time, Proof of Capacity, Proof of Space, Proof of Burn, RAFT, PAXOS, Byzantine Fault Tolerance System, PBFT.
Second generation applications of Blockchain technology - 12 Hours
Smart contracts: origins and how they function, Creating and deploying smart contracts, Tokens, Token standards, Second generation tokens Decentralized applications, How are DApps constructed?, Decentralized Autonomous Organizations (DAOs), Hyperledger Fabric: Blockchain-as-a-service (BaaS), Architecture and core components, Hyperledger fabric model, Working on hyper ledger and transaction processing.
Blockchain Security - 10 Hours
Blockchain vulnerabilities, Smart contract vulnerabilities, Blockchain on CIA security triad, Blockchain based DNS security platform, deploying Blockchain based DDOS protection.
1: “Introduction to Blockchain Technology”, Tiana Laurence, 1st edition, Van Haren Publishing, 2019
1: “Hands-On Cyber security with Blockchain: Implement DDoS protection, PKI-based identity, 2FA, and DNS security using Blockchain”, Rajneesh Gupta, 1st edition, 2018.
2: "Bitcoin and Cryptocurrency Technologies: A Comprehensive Introduction", Narayanan, Bonneau, Felten, Miller and Goldfeder, Princeton University Press (19 July 2016).
Tools & Languages:
Desirable Knowledge : UE19CS202-Data Structures and its Applications.