Towards Secure Blockchains

Total Page:16

File Type:pdf, Size:1020Kb

Towards Secure Blockchains Towards Secure Blockchains Concepts, Requirements, Assessments | EDITORIAL Editorial Blockchain is currently one of the most widely Consequently, the analysis on the following discussed topics in the area of information pages presents blockchain technology in detail technology. This technology for distributed data and extensively studies its aspects relevant to IT storage originated from the cryptocurrency security. It also assesses to what extent blockchain Bitcoin, which became famous especially due to technology is able to achieve the security prop- the record highs its market value attained in 2017. erties ascribed to it and how it may be evaluated Based on its promise of preventing manipulation within the current legal framework. of data on a purely technical level using its decen- tralised structure, offering maximum transpar- This document thus supports developers and ency and replacing intermediaries within business potential users of blockchain solutions in per- processes, many ideas for applying blockchain forming a well-founded assessment of risks technology in fairly different areas have been and in taking IT security into account from the developed in recent years. start. Furthermore, the dynamic development of blockchain technology offers the possibility Politics has also increasingly taken up blockchain of using the results of this analysis as a basis for technology. For instance, the term blockchain is future discussions on both the national and inter- used several times within the coalition agreement national level. With blockchain—as with other of the 19th election period of the German parlia- topics in IT security—the BSI thus strives to shape ment dating from 2018, and the German federal information security for government, business government has set itself the target of developing and society. a comprehensive blockchain strategy until sum- mer 2019. I wish you an insightful reading experience. As with many topics receiving high attention by the media, it is important to take into account the technical foundations when discussing block- chain. In particular, this holds for IT security, since one often hopes to increase security by using blockchain. However, numerous incidents, which have caused damages in the millions, show that the mere use of blockchain does not imply that one can forgo measures for establishing IT security. As a first step for pointing out the basic issues in this area, the Federal Office for Information Security (BSI) published a list of key points in February 2018. As a result of numerous Arne Schönbohm, president of the Federal discussions with different stakeholders offering Office for Information Security (BSI) blockchain solutions or considering their use, the BSI found a more in-depth analysis of the security features of blockchain was required. Arne Schönbohm 1 | EXecUTIVE SUMMARY Executive Summary Blockchain is a new technology for data man- may for instance concern external interfaces for agement which achieves the greatest possible entering and reading out data. Concrete incidents independence from a central party using dis- bear witness to the fact that the possibilities for tributed storage of data in combination with attacks are not only theoretical. cryptographic routines and additional technical measures. On the one hand, this serves to make It is important to note that blockchain technology targeted manipulations significantly harder. On exhibits a wide array of designs. Features often the other hand, this feature of blockchains gave used for classification include the visibility of data rise to proposals for their use in different appli- (reading permissions) as well as the updatability cations in which several parties of conflicting (writing permissions) of the blockchain. However, interests are involved and cannot agree on a a number of approaches, which may strongly central party controlling the application. In other differ among each other, likewise exist for con- applications which do feature a central party, the sensus mechanisms and smart contracts. They use of blockchains was proposed for improving correlate with the basic design of a blockchain efficiency by making parties interact directly with to some extent, but also offer further degrees of each other. freedom. If blockchain is to be used in a concrete application, it is hence necessary to carefully Due to the expectations associated with block- analyse which design is most suitable. The design chain technology, it has currently become a hot of Bitcoin, which receives most attention in the topic intensely studied by a plethora of parties media, will probably not be reasonable for most from science, business and administration. Use applications. of the technology is being discussed and studied in many areas. At the present time, the only area In the area of consensus mechanisms, the to practically employ blockchains to a somewhat algorithm proof-of-work is predominant in larger extent though is that of finance, in particu- public discussion. Proof-of-work is used among lar cryptocurrencies. others by Bitcoin and criticised in particular for its enormous energy consumption. The algorithm In this document, the BSI studies blockchains allows keeping data consistent in a setting primarily from the point of view of IT security, without authentication of individual parties but also considers further implications of the while at the same time preventing manipulations. basic technical design, e.g. on efficiency or com- What often goes unnoticed is the fact that pliance with requirements from data protection. blockchains managing permissions more strictly In general, blockchains offer benefits as compared and authenticating individual parties, which seem to databases in terms of availability and resilience to be necessary for many applications, allow using against misuse, whereas they show disadvantages so-called message-based consensus mechanisms, in terms of confidentiality and efficiency. which are significantly more efficient and well- studied. The mere use of blockchain does not solve IT security problems. On the contrary, well-known Several blockchain systems allow using smart problems like hardware and software security contracts, which aim to make possible the tam- continue to exist. In addition, new attack vectors per-proof execution of contracts between parties targeting different components of the system unknown to or mistrusting each other. Smart arise. Besides consensus mechanisms, which contracts are not equivalent to legal contracts ensure consistency of the distributed data cop- though, and many contractual concepts cannot ies, and smart contracts, which allow executing be represented via a smart contract. In addition, programs within the blockchain network, attacks analyses of existing contracts revealed a large 2 | EXecUTIVE SUMMARY number of security problems. They range from Legal questions concerning blockchains result bugs in the code—which cannot be corrected for among other things from the lack of a central, technological reasons—and manipulable random legally responsible party during normal opera- numbers to a lack of authenticity for data which tion, which has various implications. This topic is is entered from the real world and processed in currently the subject of controversial discussion. the contract. In order to handle smart contracts Problems connected to data protection, like the responsibly, it is imperative that these limitations implementation of requirements as defined in the and vulnerabilities be taken into account. General Data Protection Regulation (GDPR), arise from the transparency and tamper resistance of Since the security of blockchains strongly relies blockchains, which are among their main features. on the cryptographic algorithms used, these Such problems are also intensely studied at the algorithms have to be carefully selected in order moment. to attain the desired security level with respect to the security goals integrity, authenticity and con- Extensive and creative research projects targeting fidentiality. For detailed recommendations, the a broad range of technical limitations and prob- reader is referred to several Technical Guidelines lems of blockchain technology are being con- published by the BSI and cited in the text. Most ducted at present. Current research topics include stakeholders in the area of blockchain have paid e.g. scalability, efficiency, pseudonymity and hardly any attention to long-term security of data confidentiality. At the moment it is not possible so far. In order to protect sensitive data for the to estimate when and if significant improvements long term, it is necessary to have at one’s disposal may result from these projects. measures for replacing cryptographic algorithms which are no longer secure. When doing so, it is A further issue to be noted is the lack of stand- imperative to bear in mind that replacing cryp- ards in the blockchain area. This leads to incom- tographic routines does not automatically pre- patibility among different blockchains and to serve the original security properties for old data. a quite confusing plethora of solutions, which Besides cryptographic routines, the security prop- make choosing a concrete product for the longer erties of consensus mechanisms likewise need to term difficult for users. Regarding IT security, the be well-understood and taken into account. These BSI provides the document at hand as a deci- aspects should hence be considered from the start sion-making aid and as a well-founded
Recommended publications
  • Blockchain in an Internet-Of-Things Network Based on User Participation
    Blockchain in an Internet-of-Things Network Based on User Participation Robert Ljungblad Computer Science and Engineering, bachelor's level 2019 Luleå University of Technology Department of Computer Science, Electrical and Space Engineering ABSTRACT The internet-of-things is the relatively new and rapidly growing concept of connecting everyday devices to the internet. Every day more and more devices are added to the internet-of-things and it is not showing any signs of slowing down. In addition, advancements in new technologies such as blockchains, artificial intelligence, virtual reality and machine learning are made practically every day. However, there are still much to learn about these technologies. This thesis explores the possibilities of blockchain technology by applying it to an internet-of-things network based on user participation. More specifically, it is applied to a use case derived from Luleå Kommun’s wishes to easier keep track of how full the city’s trash cans are. The goal of the thesis is to learn more about how blockchains can help an internet-of-things network as well as what issues can arise. The method takes an exploratory approach to the problem by partaking in a workshop with Luleå Kommun and by performing a literature study. It also takes a qualitative approach by creating a proof-of-concept solution to experience the technology firsthand. The final proof-of-concept as well as issues that arose during the project are analysed with the help of information gathered and experience gained throughout the project. It is concluded that blockchain technology can help communication in an internet-of-things network based on user participation.
    [Show full text]
  • Crypto-Asset Markets: Potential Channels for Future Financial Stability
    Crypto-asset markets Potential channels for future financial stability implications 10 October 2018 The Financial Stability Board (FSB) is established to coordinate at the international level the work of national financial authorities and international standard-setting bodies in order to develop and promote the implementation of effective regulatory, supervisory and other financial sector policies. Its mandate is set out in the FSB Charter, which governs the policymaking and related activities of the FSB. These activities, including any decisions reached in their context, shall not be binding or give rise to any legal rights or obligations under the FSB’s Articles of Association. Contacting the Financial Stability Board Sign up for e-mail alerts: www.fsb.org/emailalert Follow the FSB on Twitter: @FinStbBoard E-mail the FSB at: [email protected] Copyright © 2018 Financial Stability Board. Please refer to: www.fsb.org/terms_conditions/ Contents Executive Summary ................................................................................................................... 1 1. Introduction ......................................................................................................................... 3 2. Primary risks in crypto-asset markets ................................................................................. 5 2.1 Market liquidity risks ............................................................................................... 5 2.2 Volatility risks .........................................................................................................
    [Show full text]
  • An Anonymous Trust-Marking Scheme on Blockchain Systems
    An Anonymous Trust-Marking Scheme on Blockchain Systems Teppei Sato Keita Emura Tomoki Fujitani Kazumasa Omote University of Tsukuba National Institute of University of Tsukuba University of Tsukuba Japan Information and National Institute of National Institute of Communications Technology Information and Information and Japan Communications Technology Communications Technology Japan Japan Abstract—During the Coincheck incident, which recorded During the Coincheck incident, which recorded the largest the largest damages in cryptocurrency history in 2018, it was damages in cryptocurrency history in 2018, some volun- demonstrated that using Mosaic token can have a certain effect. teers tracked leaked New Economy Movement (NEM) cryp- Although it seems attractive to employ tokens as countermea- sures for cryptocurrency leakage, Mosaic is a specific token tocurrencies using Mosaic, which is a NEM-specific fea- for the New Economy Movement (NEM) cryptocurrency and ture allowing a self-made token to be sent on the NEM is not employed for other blockchain systems or cryptocurren- blockchain. These volunteers sent Mosaic to addresses that cies. Moreover, although some volunteers tracked leaked NEM received leaked NEMs from Coincheck addresses and warned using Mosaic in the CoinCheck incident, it would be better the recipients that these should not be exchanged for other to verify that the volunteers can be trusted. Simultaneously, if someone (e.g., who stole cryptocurrencies) can identify the cryptocurrencies or legal currencies. A criminal can discard volunteers, then that person or organization may be targets of such marked addresses, so it can be seen as a cat-and- them. In this paper, we propose an anonymous trust-marking mouse game.
    [Show full text]
  • Cryptocurrency: the Economics of Money and Selected Policy Issues
    Cryptocurrency: The Economics of Money and Selected Policy Issues Updated April 9, 2020 Congressional Research Service https://crsreports.congress.gov R45427 SUMMARY R45427 Cryptocurrency: The Economics of Money and April 9, 2020 Selected Policy Issues David W. Perkins Cryptocurrencies are digital money in electronic payment systems that generally do not require Specialist in government backing or the involvement of an intermediary, such as a bank. Instead, users of the Macroeconomic Policy system validate payments using certain protocols. Since the 2008 invention of the first cryptocurrency, Bitcoin, cryptocurrencies have proliferated. In recent years, they experienced a rapid increase and subsequent decrease in value. One estimate found that, as of March 2020, there were more than 5,100 different cryptocurrencies worth about $231 billion. Given this rapid growth and volatility, cryptocurrencies have drawn the attention of the public and policymakers. A particularly notable feature of cryptocurrencies is their potential to act as an alternative form of money. Historically, money has either had intrinsic value or derived value from government decree. Using money electronically generally has involved using the private ledgers and systems of at least one trusted intermediary. Cryptocurrencies, by contrast, generally employ user agreement, a network of users, and cryptographic protocols to achieve valid transfers of value. Cryptocurrency users typically use a pseudonymous address to identify each other and a passcode or private key to make changes to a public ledger in order to transfer value between accounts. Other computers in the network validate these transfers. Through this use of blockchain technology, cryptocurrency systems protect their public ledgers of accounts against manipulation, so that users can only send cryptocurrency to which they have access, thus allowing users to make valid transfers without a centralized, trusted intermediary.
    [Show full text]
  • A Cryptocurrency Spectrum Short Analysis
    Journal of Risk and Financial Management Review A Cryptocurrency Spectrum Short Analysis 1 2 3 Mircea Constantin S, cheau , Simona Liliana Crăciunescu , Iulia Brici and Monica Violeta Achim 3,* 1 Faculty of Automation, Computers and Electronics, University of Craiova, 200585 Craiova, Romania; [email protected] 2 Simona Liliana Crăciunescu, The Bucharest University of Economic Studies, 010374 Bucharest, Romania; [email protected] 3 Faculty of Economics and Business Administration, Babes, -Bolyai University, 400591 Cluj-Napoca, Romania; [email protected] * Correspondence: [email protected] Received: 30 June 2020; Accepted: 11 August 2020; Published: 17 August 2020 Abstract: Technological development brings about economic changes that affect most citizens, both in developed and undeveloped countries. The implementation of blockchain technologies that bring cryptocurrencies into the economy and everyday life also induce risks. Authorities are continuously concerned about ensuring balance, which is, among other things, a prudent attitude. Achieving this goal sometimes requires the development of standards and regulations applicable at the national or global level. This paper attempts to dive deeper into the worldwide operations, related to cryptocurrencies, as part of a general phenomenon, and also expose some of the intersections with cybercrime. Without impeding creativity, implementing suggested proposals must comply with the rules in effect and provide sufficient flexibility for adapting and integrating them. Different segments need to align or reposition, as alteration is only allowed in a positive way. Adopting cryptocurrency decisions should be unitary, based on standard policies. Keywords: cryptocurrencies; fraud; algorithms; correlations; impact; risks; regulation; blockchain 1. Introduction In the area of influence of computer science, the terms undergo rapid mutations, both in sense and interpretability.
    [Show full text]
  • Whitepaper [2], Nakamoto Explains That
    Introduction Since its inception in 2009, Bitcoin [1] and the concept of a blockchain, was developed in response to an inherent flaw in the way transactions were processed on the Internet. In his whitepaper [2], Nakamoto explains that Commerce on the Internet has come to rely almost exclusively on financial institutions serving as trusted third parties to process electronic payments. While the system works well enough for most transactions, it still suffers from the inherent weaknesses of the trust based model (Nakamoto, 2007) Bitcoin has been rapidly adopted into today’s modern marketplaces. A primary issue with Bitcoin’s rapid adoption is the increase of demand on the original blockchain to handle varying degrees of large transactions. With increased demand comes increased transactional waiting periods, and this has resulted in higher transactional fees in attempts to try and speed-up transaction confirmation times. Official Verge Blackpaper 5.0 2 Table of contents Introduction 2 1.0 Overview 4 1.1 Multi-Algo PoW 4 1.2 Tailored transactional applications 4 1.3 Simple transactions 4 1.4 Stealth transactions 5 1.5 Anon transactions 5 2.0 The Verge Network 6 2.1 TOR Integration 6 2.2 I2P Integration 7 2.3 Electrum 7 2.4 TOR Android 9 3.0 Encrypted Messaging 10 3.1 Message Propagation 11 4.0 Dual-Key Stealth Addressing 12 4.1 Dual-Key Stealth Address Protocol 13 4.2 Key Agreements 14 4.3 The Diffie-Hellman algorithm 14 4.4 Elliptic-Curve Diffie-Hellman (ECDH) 15 4.5 Key Take-aways 17 5.0 Atomic Swaps 18 5.1 What is a Hash Time-Locked Contract (HTLC)? 18 5.2 How do Hash Time-Locked Contracts work? 18 5.3 What are the benefits of HTLC’s? 19 5.4 What are the benefits of Atomic Swaps? 19 5.5 What are the limitations of on-chain Atomic Swaps? 19 5.6 What is the Lightning Network? 19 6.0 Rootstock (RSK) 21 7.0 Ring confidential transactions 24 7.1 Ring Signatures 25 7.2 Pendersen Commitment 25 7.3 Range Proofs 26 Conclusion 26 References 28 Personal Note 30 Official Verge Blackpaper 5.0 3 1.0 Overview The core innovation behind Bitcoin is its decentralized structure.
    [Show full text]
  • Coinbase Explores Crypto ETF (9/6) Coinbase Spoke to Asset Manager Blackrock About Creating a Crypto ETF, Business Insider Reports
    Crypto Week in Review (9/1-9/7) Goldman Sachs CFO Denies Crypto Strategy Shift (9/6) GS CFO Marty Chavez addressed claims from an unsubstantiated report earlier this week that the firm may be delaying previous plans to open a crypto trading desk, calling the report “fake news”. Coinbase Explores Crypto ETF (9/6) Coinbase spoke to asset manager BlackRock about creating a crypto ETF, Business Insider reports. While the current status of the discussions is unclear, BlackRock is said to have “no interest in being a crypto fund issuer,” and SEC approval in the near term remains uncertain. Looking ahead, the Wednesday confirmation of Trump nominee Elad Roisman has the potential to tip the scales towards a more favorable cryptoasset approach. Twitter CEO Comments on Blockchain (9/5) Twitter CEO Jack Dorsey, speaking in a congressional hearing, indicated that blockchain technology could prove useful for “distributed trust and distributed enforcement.” The platform, given its struggles with how best to address fraud, harassment, and other misuse, could be a prime testing ground for decentralized identity solutions. Ripio Facilitates Peer-to-Peer Loans (9/5) Ripio began to facilitate blockchain powered peer-to-peer loans, available to wallet users in Argentina, Mexico, and Brazil. The loans, which utilize the Ripple Credit Network (RCN) token, are funded in RCN and dispensed to users in fiat through a network of local partners. Since all details of the loan and payments are recorded on the Ethereum blockchain, the solution could contribute to wider access to credit for the unbanked. IBM’s Payment Protocol Out of Beta (9/4) Blockchain World Wire, a global blockchain based payments network by IBM, is out of beta, CoinDesk reports.
    [Show full text]
  • Liquidity Or Leakage Plumbing Problems with Cryptocurrencies
    Liquidity Or Leakage Plumbing Problems With Cryptocurrencies March 2018 Liquidity Or Leakage - Plumbing Problems With Cryptocurrencies Liquidity Or Leakage Plumbing Problems With Cryptocurrencies Rodney Greene Quantitative Risk Professional Advisor to Z/Yen Group Bob McDowall Advisor to Cardano Foundation Distributed Futures 1/60 © Z/Yen Group, 2018 Liquidity Or Leakage - Plumbing Problems With Cryptocurrencies Foreword Liquidity is the probability that an asset can be converted into an expected amount of value within an expected amount of time. Any token claiming to be ‘money’ should be very liquid. Cryptocurrencies often exhibit high price volatility and wide spreads between their buy and sell prices into fiat currencies. In other markets, such high volatility and wide spreads might indicate low liquidity, i.e. it is difficult to turn an asset into cash. Normal price falls do not increase the number of sellers but should increase the number of buyers. A liquidity hole is where price falls do not bring out buyers, but rather generate even more sellers. If cryptocurrencies fail to provide easy liquidity, then they fail as mediums of exchange, one of the principal roles of money. However, there are a number of ways of assembling a cryptocurrency and a number of parameters, such as the timing of trades, the money supply algorithm, and the assembling of blocks, that might be done in better ways to improve liquidity. This research should help policy makers look critically at what’s needed to provide good liquidity with these exciting systems. Michael Parsons FCA Chairman, Cardano Foundation, Distributed Futures 2/60 © Z/Yen Group, 2018 Liquidity Or Leakage - Plumbing Problems With Cryptocurrencies Contents Foreword ..............................................................................................................
    [Show full text]
  • Reputation Driven Dynamic Access Control Framework for Iot Atop Poa Ethereum Blockchain
    Reputation Driven Dynamic Access Control Framework for IoT atop PoA Ethereum Blockchain Auqib Hamid Lonea,∗, Roohie Naaza aDepartment of Computer Science and Engineering., NIT Srinagar, Jammu and Kashmir,India,190006 Abstract Security and Scalability are two major challenges that IoT is currently fac- ing. Access control to critical IoT infrastructure is considered as top security challenge that IoT faces. Data generated by IoT devices may be driving many hard real time systems, thus it is of utmost importance to guarantee integrity and authenticity of the data and resources at the first place itself. Due to heterogeneous and constrained nature of IoT devices, traditional IoT security frameworks are not able to deliver scalable, efficient and manage- able mechanisms to meet the requirements of IoT devices. On the other hand Blockchain technology has shown great potential to bridge the missing gap towards building a truly decentralized, trustworthy, secure and scalable environment for IoT. Allowing access to IoT resources and data managed through Blockchain will provide an additional security layer backed by the strongest cryptographic algorithms available. In this work we present a rep- utation driven dynamic access control framework for IoT applications based on Proof of Authority Blockchain, we name it as Rep-ACM. In Rep-ACM framework we build two major services, one for Reputation building (for bet- ter IoT device behaviour regulations) and other for Misbehaviour detection (for detecting any Misbehaviour on object resource usage). Both of these services work in coordination with other services of proposed framework to determine who can access what and under what conditions access should be granted.
    [Show full text]
  • Blockchain in Japan
    Blockchain in Japan " 1" Blockchain in Japan " "The impact of Blockchain is huge. Its importance is similar to the emergence of Internet” Ministry of Economy, Trade and Industry of Japan1 1 Japanese Trade Ministry Exploring Blockchain Tech in Study Group, Coindesk 2" Blockchain in Japan " About this report This report has been made by Marta González for the EU-Japan Centre for Industrial Cooperation, a joint venture between the European Commission and the Japanese Ministry of Economy, Trade and Industry (METI). The Centre aims to promote all forms of industrial, trade and investment cooperation between Europe and Japan. For that purpose, it publishes a series of thematic reports designed to support research and policy analysis of EU-Japan economic and industrial issues. To elaborate this report, the author has relied on a wide variety of sources. She reviewed the existing literature, including research papers and press articles, and interviewed a number of Blockchain thought leaders and practitioners to get their views. She also relied on the many insights from the Japanese Blockchain community, including startups, corporation, regulators, associations and developers. Additionally, she accepted an invitation to give a talk1 about the state of Blockchain in Europe, where she also received input and interest from Japanese companies to learn from and cooperate with the EU. She has also received numerous manifestations of interest during the research and writing of the report, from businesses to regulatory bodies, revealing a strong potential for cooperation between Europe and Japan in Blockchain-related matters. THE AUTHOR Marta González is an Economist and Software Developer specialized in FinTech and Blockchain technology.
    [Show full text]
  • CRYPTO CURRENCY Technical Competence & Rules of Professional Responsibility
    CRYPTO CURRENCY Technical Competence & Rules of Professional Responsibility Marc J. Randazza Rule 1.1 Comment 8 To maintain the requisite knowledge and skill, a lawyer should keep abreast of changes in the law and its practice, including the benefits and risks associated with relevant technology, engage in continuing study and education and comply with all continuing legal education requirements to which the lawyer is subject. Crypto Currency 1. What is Crypto Currency? 2. How does it work? 3. How could you screw this up? Blockchain •Decentralized •Transparent •Immutable Blockchain Blockchain • Time-stamped series of immutable records of data • Managed by a cluster of de-centralized computers • Each block is secured and bound to another, cryptographically • Shared • Immutable • Open for all to see – how you keep it honest Blockchain Blockchain • Transparent but also pseudonymous • If you look on the ledger, you will not see “Darren sent 1 BTC to Trixie” • Instead you will see “1MF1bhsFLkBzzz9vpFYEmvwT2TbyCt7NZJ sent 1 BTC” • But, if you know someone’s wallet ID, you could trace their transactions Crypto Roller Coaster – 5 years Crypto Roller Coaster – 1 day How can you screw this up? Quadriga You can lose it & Bankruptcy Your mind • C$190 million turned to digital dust • Thrown away with no back up • Death of CEO turned death of • $127 million in the trash – gone business • 7,500 BTC – Fluctuates WILDLY Ethical Considerations You might be surprised at what violates Rule 1.8 Which Rules? Rule 1.2 (d) – Criminal or Fraudulent Activity Rule 1.5 (a) – Reasonable Fee Rule 1.6 – Confidentiality Rule 1.8 (a) – Business Dealings With Clients Rule 1.8(f) – Compensation From Other Than Your Client Rule 1.15 (a) – Safekeeping Property Rule 1.15 (c) – Trust Accounts Rule 1.2(d) – Criminal or Fraudulent Activity • Crypto *can* be used for criminal activity • Tends to be difficult, but not A lawyer shall not ..
    [Show full text]
  • Facilitating Cross-Chain Cryptocurrency Exchanges: an Inquiry Into Blockchain Technology and Interoperability with an Emphasis on Cryptocurrency Arbitrage
    Eastern Michigan University DigitalCommons@EMU Senior Honors Theses & Projects Honors College 2020 Facilitating cross-chain cryptocurrency exchanges: An inquiry into blockchain technology and interoperability with an emphasis on cryptocurrency arbitrage Samuel Grone Follow this and additional works at: https://commons.emich.edu/honors Part of the Computer Sciences Commons Facilitating cross-chain cryptocurrency exchanges: An inquiry into blockchain technology and interoperability with an emphasis on cryptocurrency arbitrage Abstract Since the introduction and proliferation of the blockchain-based cryptocurrency Bitcoin, alternative cryptocurrencies also based on blockchain technology have exploded in number. It was once believed that one, or very few, cryptocurrencies would eventually dominate the market and drive out competitors. This assumption, however, was incorrect. Thousands of cryptocurrencies exist concurrently. The vast number of cryptocurrencies leads to a problem—what if the cryptocurrency that an individual possesses does not meet their current needs as well as another cryptocurrency might? The attempt to solve this problem has led to the rise of many cryptocurrency exchanges and exchange schemes. In this paper, we will discuss the motivations for an individual to be interested in exchanging two or more cryptocurrencies by describing and comparing various popular cryptocurrencies with different desirable attributes. While we will discuss these attributes, this paper will give special focus to arbitrage in particular. In addition, we will describe various cryptocurrency exchange schemes and their advantages and disadvantages. Finally, we contribute to the understanding of cryptocurrency exchangeability and interoperability by comparing the historical price data of several cryptocurrencies to determine how often arbitrage has been possible in the past. Degree Type Open Access Senior Honors Thesis Department Computer Science First Advisor Weitian Tong Second Advisor S.
    [Show full text]