...

The Bitcoin Whitepaper Part 2

Bitcoin

Affiliate Disclosure Program

Cryptonerdian.com is reader-supported. When you buy through links on our site, we may earn an affiliate commission. Learn more

In the first part of the Bitcoin whitepaper, we have looked at the topics overview, introduction, and transactions. In the following 2nd part we will look at the topics timestamp server, proof-of-work, networks, and incentives. The chapter numbers are based on those of the whitepaper.

3. Timestamp server

Annotation: Before diving into the whitepaper chapter, Satoshi had implemented as a timestamp in the first Genesis Block created the headline of the London Times ” Chancellor on brink of second bailout for banks”. This had a symbolic character in addition to its function as a reference. But now to the chapter content

the timestamp server takes the hash of a block and posts it widely in a newspaper or Usenet post. The block contains records that are time-stamped. This proves that the data existed at that time. Otherwise, there would be no hash of them. Each timestamp also contains the preceding timestamp in its hash and forms a chain. This reinforces the previous timestamp in each case.

Annotation: This mentioned chain already suggests the famous word blockchain. The information in an individual block are the timestamps for each transaction.Timestamps prevent the so-called double-spending. With double-spending, a user would perform two similar transactions simultaneously with the use of only one token. The timestamp prevents the falsification of files

Timestampserver.drawio

4. Proof-of-Work

To implement a distributed timestamp server on a peer-to-peer basis, a proof-of-work system similar to Adam Back’s hashcash system [6] must be used. the proof of work involves searching for a value that is hashed by, for example, SHA-256. this hash starts with a number of zero bits.
 
The average work required is exponential to the number of zero bits required. It can be verified by executing a single hash. By incrementing a nonce until a value is found, the hash block is given the required zero bits and the proof-of-work is implemented. As soon as the CPU has fulfilled the proof of work, respectively has done its job, the block can no longer be changed. Otherwise, the work would have to be executed again. Due to the concatenation of all blocks, the regeneration of all blocks would have to be executed.
 

The proof of work solves the problem of determining the representatives in the case of majority decisions. A CPU basically has one vote and the majority decision is represented by the longest chain. This is the chain in which the most effort was invested. An attacker would have to recreate the block itself and all blocks after it to change a past block in order to catch up and overtake the honest nodes. The possibility of an attacker catching up decreases exponentially as more subsequent blocks are added.

The difficulty level, which is determined by a moving average, can be used to compensate for the increasing hardware performance and the time-varying interest to run a node.

The moving average targets an average number of blocks per hour. If the blocks are generated too fast, the difficulty increases.

 
 
 
Annotation: One of the revolutionary solutions implemented by Satoshi and presented to the world is the problem of the Byzantine generals. In a nutshell, this is the problem of finding a common consensus in distributed networks. With the concept of the distributed timestamp system for contracts, the problem is now solved. Consensus finding is based on proof of work.
 
The generals can be equated to the miners.The Byzantine general problem will not be described in detail here and can be looked upon on the Internet. In short, a miner includes the suggestion of an attack time in the hash-based computation task. As a reminder, the validation of a transaction is ensured by miners by calculating a complex computational task. 
The solution of the calculation task takes about 10 minutes if all miners calculate at the same time. If one of the miners has found the solution, he tells it to the other miners. The other miners check the correctness of the solution and integrate it as a basis for the next calculation. If this rudimentary process is continued, a chain of proofs of work is created, the blockchain.
 
If a miner has different proofs of work, he simply takes the longest chain and bases his further calculations on it. Why the longest chain? The longest chain of proofs of work is obviously based on the attack time that most miners have agreed on.
 
[6] A. Back, “Hashcash – a denial of service counter-measure,” http://www.hashcash.org/papers/hashcash.pdf, 2002.

5. Network

Network operation:
 
  1. All nodes receive all transaction
  2. All new transactions are collected in a block per node.
  3. Each block tries to find a difficult proof of work for its block
  4. Once the proof of work is found, it transmits the block to all nodes
  5. A block is only accepted by the nodes if the transactions it contains are valid and have not already been made.
  6. The block is accepted by the other nodes by creating the next block in the chain which uses the hash of the accepted block as the preceding hash. 

By assuming that the longest chain is the correct one, the nodes work to further extend it. If two nodes receive different versions first at the same time, they continue to work on the version received first. However, they save the other branch in case it becomes longer. As soon as one of the two branches becomes longer, all nodes will switch to the longer branch and continue working there. 

New transactions do not always have to reach every node. As long as they reach many nodes they will be included in a block. The network is also fault-tolerant against lost messages. Nodes recognize when they are missing a block and request it.

Annotation: The Bitcoin network is the first global system for consensus building and beyond far beyond the payment function. It is a freely programmable economic and financial system that can be further developed by anyone. Through the peer-to-peer design, each participant of the network is directly connected to other equal participants.

My generation can still remember Napster the so-called file sharing system which made the sharing of audio, movies, and other files possible. This was a centralized P2P system that required a central server to manage the data. With Napster, the peer-to-peer architecture became popular in 1999. However, there are different forms and the algorithm of Napster is still controversial for the designation of true P2P. Other well-known P2P networks include BitTorrent, Tor, and Bitcoin. However, there are countless more and P2P is a universe in itself.

Further information on P2P and Filesharing can be found on wiki
 

6. Incentives

The Genesis Block Satoshis started the creation of new coins. New coins are created by the node operators through the validation of transactions. Just as gold was mined in the past, node operators are now mining new coins with their transaction validations. That is why they are also called miners. The mining of coins serves as an incentive to the miners to provide their CPU power and electricity.

In addition, the transaction fees can lead to further incentives. This means that the miner receives incentives from both the mining and the transaction fees. Later, once a predetermined number of coins are in circulation, the incentives can be completely covered by the transaction fees and thus be completely inflation-free.

These incentives also serve the aspect of motivating honesty. If an attacker were able to spend more CPU power than all honest miners, he would have the opportunity to steal back his transactions or mine new coins. By making the incentive to cheat more profitable, such behavior is prevented. The technological challenge of generating so much power to launch an attack will not be discussed here.

Annotation: For a closer look at the interplay between mining and transaction fees, the following articles may be helpful.

 
 
In the next part The Bitcoin whitepaper Part 3 we will go through the chapters Reclaiming Disk Space, Simplified Payment Verification, Combining and Splitting Value
 

The original whitepaper about Bitcoin can be downloaded in different languages here: bitcoin.org

 

By Dindu

Passionate Crypto Blogger

We have made it our business to provide interested crypto beginners with the necessary background knowledge about the world of cryptonomics to get a better picture of this exciting world. Come along and dive with us into the world of cryptos!

Dindu

Top 10 Coin Picks
bitcoinBitcoin
$ 97,995.26
$ 97,995.26
1.24%
ethereumEthereum
$ 3,431.72
$ 3,431.72
4.43%
tetherTether
$ 1.00
$ 1.00
0.06%
solanaSolana
$ 256.81
$ 256.81
1.41%
bnbBNB
$ 658.93
$ 658.93
5.76%
xrpXRP
$ 1.49
$ 1.49
4.33%
dogecoinDogecoin
$ 0.43148
$ 0.43148
7.08%
usd-coinUSDC
$ 1.00
$ 1.00
0.08%
cardanoCardano
$ 1.06
$ 1.06
9.58%
staked-etherLido Staked Ether
$ 3,429.76
$ 3,429.76
4.31%
Product Picks
Favorite Posts
Explore Categories
Seraphinite AcceleratorOptimized by Seraphinite Accelerator
Turns on site high speed to be attractive for people and search engines.