Security Analysis "Peer-to-Peer" Electronic Cash System for the master thesis on the Bitcoin platform provides an overview of the security model of peer-to-peer cryptographic currencies. In this master thesis introduces Bitcoin and its design principles, as well as its cryptographic primitives. The focus of the work is analyzing Bitcoin security. It aims to develop a better understanding of how Bitcoin is secured by analyzing various attacking methods related to the system, their relationships and defense mechanisms in Bitcoin system design. We describe that cryptography used in Bitcoin is strong that cannot be breakable, but the system is not tolerant against attacked with computing power and attack by special machines connected to the network. However, lient-side attacks are much more severe because users are highly responsible in Bitcoin. This thesis look into detail of those attacks and explain about defense against them.
Anotace v angličtině
Security Analysis "Peer-to-Peer" Electronic Cash System for the master thesis on the Bitcoin platform provides an overview of the security model of peer-to-peer cryptographic currencies. In this master thesis introduces Bitcoin and its design principles, as well as its cryptographic primitives. The focus of the work is analyzing Bitcoin security. It aims to develop a better understanding of how Bitcoin is secured by analyzing various attacking methods related to the system, their relationships and defense mechanisms in Bitcoin system design. We describe that cryptography used in Bitcoin is strong that cannot be breakable, but the system is not tolerant against attacked with computing power and attack by special machines connected to the network. However, lient-side attacks are much more severe because users are highly responsible in Bitcoin. This thesis look into detail of those attacks and explain about defense against them.
Klíčová slova
Bitcoin,Cryptography,Security
Klíčová slova v angličtině
Bitcoin,Cryptography,Security
Rozsah průvodní práce
60
Jazyk
AN
Anotace
Security Analysis "Peer-to-Peer" Electronic Cash System for the master thesis on the Bitcoin platform provides an overview of the security model of peer-to-peer cryptographic currencies. In this master thesis introduces Bitcoin and its design principles, as well as its cryptographic primitives. The focus of the work is analyzing Bitcoin security. It aims to develop a better understanding of how Bitcoin is secured by analyzing various attacking methods related to the system, their relationships and defense mechanisms in Bitcoin system design. We describe that cryptography used in Bitcoin is strong that cannot be breakable, but the system is not tolerant against attacked with computing power and attack by special machines connected to the network. However, lient-side attacks are much more severe because users are highly responsible in Bitcoin. This thesis look into detail of those attacks and explain about defense against them.
Anotace v angličtině
Security Analysis "Peer-to-Peer" Electronic Cash System for the master thesis on the Bitcoin platform provides an overview of the security model of peer-to-peer cryptographic currencies. In this master thesis introduces Bitcoin and its design principles, as well as its cryptographic primitives. The focus of the work is analyzing Bitcoin security. It aims to develop a better understanding of how Bitcoin is secured by analyzing various attacking methods related to the system, their relationships and defense mechanisms in Bitcoin system design. We describe that cryptography used in Bitcoin is strong that cannot be breakable, but the system is not tolerant against attacked with computing power and attack by special machines connected to the network. However, lient-side attacks are much more severe because users are highly responsible in Bitcoin. This thesis look into detail of those attacks and explain about defense against them.
Klíčová slova
Bitcoin,Cryptography,Security
Klíčová slova v angličtině
Bitcoin,Cryptography,Security
Zásady pro vypracování
Carry out a literary search for cryptographic payment instruments.
Describe the technology used by Peer to Peer platform Bitcoin.
Analyze the current system security and possible security risks of the Bitcoin platform.
Design a way to safely use Peer to Peer payment tools.
Assess the benefits of your work and the potential of its use in industry.
Zásady pro vypracování
Carry out a literary search for cryptographic payment instruments.
Describe the technology used by Peer to Peer platform Bitcoin.
Analyze the current system security and possible security risks of the Bitcoin platform.
Design a way to safely use Peer to Peer payment tools.
Assess the benefits of your work and the potential of its use in industry.
Seznam doporučené literatury
asa
BASHIR, Imran. Mastering blockchain: distributed ledgers, decentralization and smart contracts explained. Birmingham: Packt Publishing, 2017. ISBN 978-1-78712-544-5.
BLANCHARD, Benjamin S. a John BLYLER. System engineering management. Fifth edition. Hoboken, New Jersey: Wiley, 2016. ISBN 9781119047827.
COMBS, Brett a Tom MITSOFF. Bitcoin decoded. San Bernandino, CA: Propellerhead Marketing Group, c2014. ISBN 978-0-615-95524-7.
LEE, David a Robert DENG, ed. Handbook of blockchain, digital finance, and inclusion. London: Academic Press, \matsymb{lbrack}2018\matsymb{rbrack}. ISBN 978-0-12-812282-2.
SOMMERVILLE, Ian. Software engineering. Tenth edition. Boston: Pearson, \matsymb{lbrack}2016\matsymb{rbrack}. ISBN isbn-978-0133943030.
STALLINGS, William. Effective cybersecurity: a guide to using best practices and standards. Indianapolis, IN: Pearson Education, 2018. ISBN 978-0134772806.
Seznam doporučené literatury
asa
BASHIR, Imran. Mastering blockchain: distributed ledgers, decentralization and smart contracts explained. Birmingham: Packt Publishing, 2017. ISBN 978-1-78712-544-5.
BLANCHARD, Benjamin S. a John BLYLER. System engineering management. Fifth edition. Hoboken, New Jersey: Wiley, 2016. ISBN 9781119047827.
COMBS, Brett a Tom MITSOFF. Bitcoin decoded. San Bernandino, CA: Propellerhead Marketing Group, c2014. ISBN 978-0-615-95524-7.
LEE, David a Robert DENG, ed. Handbook of blockchain, digital finance, and inclusion. London: Academic Press, \matsymb{lbrack}2018\matsymb{rbrack}. ISBN 978-0-12-812282-2.
SOMMERVILLE, Ian. Software engineering. Tenth edition. Boston: Pearson, \matsymb{lbrack}2016\matsymb{rbrack}. ISBN isbn-978-0133943030.
STALLINGS, William. Effective cybersecurity: a guide to using best practices and standards. Indianapolis, IN: Pearson Education, 2018. ISBN 978-0134772806.
Přílohy volně vložené
-
Přílohy vázané v práci
grafy
Převzato z knihovny
Ne
Plný text práce
Přílohy
Posudek(y) oponenta
Hodnocení vedoucího
Záznam průběhu obhajoby
A student fluently and meaningfully defended his thesis and answer following questions:
Can you say something about blockchain technology in this system? (Jašek)
What is a zero step in blockchain? (Jašek)
What consists first block of blockchain? (Jašek)
What are most important benefits of your work? (Chramcov)
Does your work includes some recommendation for industry? (Chramcov)