Mathematical basis of the crypto network

The mathematical principles of the operation of cryptocurrencies. Mathematical formulas for calculating the public key from the private key. Properties of elliptic curves and the principle of their application during the creation of cryptocurrency.

Рубрика Математика
Вид статья
Язык английский
Дата добавления 10.05.2023
Размер файла 307,2 K

Отправить свою хорошую работу в базу знаний просто. Используйте форму, расположенную ниже

Студенты, аспиранты, молодые ученые, использующие базу знаний в своей учебе и работе, будут вам очень благодарны.

Размещено на http://www.allbest.ru/

National Technical University of Ukraine "Igor Sikorsky Kyiv Polytechnic Institute"

MATHEMATICAL BASIS OF THE CRYPTO NETWORK

Valentyna LYSTOPADOVA

Diana KHALAIM

Анотація

Валентина ЛИСТОПАДОВА, Діана ХАЛАЇМ Національний технічний університет України "Київський політехнічний інститут імені Ігоря Сікорського"

МАТЕМАТИЧНА ОСНОВА КРИПТОМЕРЕЖІ

Людську спільноту неможливо уявити без грошових операцій. Гроші - це специфічний термін, який є універсальним еквівалентом вартості послуг чи товарів. Історія розвитку коштів тісно пов'язана з невпинним розвитком людської цивілізації. Продукти, товари, зброя, бумажняні банкноти, акції - це всього лиш частина того, що раніше використовувалось людиною і продовжує мати попит до сьогоднішнього часу.

Розвиток технологій не стоїть на місці. Тож нині дедалі актуальними є так звані “електронні кошт и“, які не випускаються національними центральними банками. Реальні гроші та монети поступово відходять на задній план. Їм на заміну стають пластикові картки та платіжні системи в мережі Інтернет.

Сьогодні спостерігається пришвидшений ріст криптовалюти. Вона є новою платіжною системою, яка має ряд переваг на відміну від інших електронних грошей. Криптовалютою користуються мільйони людей у всьому світі. Однією з причин такої популярності є сувора математична база, за допомогою якої будується біткоїн.

Математика є основою будь-якої платформи на основі блокчейну. Замість посередників, регуляторів, законів чи лідерів ці платформи покладаються на незаперечну логіку математичних моделей для створення екосистеми, яка працює для кожного користувача. Біткоїн є, мабуть, найяскравішим прикладом того, як ці моделі можуть змінити світ. Генерація монети повністю залежить від обчислювальної потужності ноутбука, що використовується для вирішення математичних задач.

У поданій статті основний акцент зроблено не лише на історії появи біткоїну, а й на математичному апараті дії криптосистеми.

Розглянуто математичні принципи роботи криптовалют на прикладі біткоїна, який сьогодні володіє найпоширенішою мережею.

Розглянуто головний інструмент криптографії, який є базовим при розробці біткоїну - еліптичні криві.

Наведено одні з основних властивостей даних кривих, а також принцип їх застосування під час створення криптовалюти.

Вказані математичні формули обчислення публічного ключа з приватного ключа.

Виділено основні причини використання еліптичних кривих, покладених в основу роботи криптосистеми.

Ключові слова: криптовалюта; біткоїн; еліптична крива; електронні гроші; приватний та публічний ключ.

Annotation

Human society cannot be imagined without monetary transactions. Money is a specific term that is universally equivalent to the value of services or goods. The history of the development of funds is closely related to the continuous development of human civilization. Products, goods, weapons, paper money, shares are just a part of what was used by man and continues to be in demand to this day.

The development of technology does not stand still. Therefore, the so-called "electronic funds", which are not issued by national central banks, are becoming increasingly relevant. Real money and coins are gradually receding into the background. They are being replaced by plastic cards and payment systems on the Internet.

Today there is an accelerated growth of cryptocurrency. It is a new payment system that has a number of advantages in contrast to other electronic money. Cryptocurrency is used by millions of people around the world. One of the reasons for this popularity is the rigorous mathematical basis on which Bitcoin is built.

Mathematics is the foundation of any blockchain-based platform. Instead of intermediaries, regulators, laws or leaders, these platforms rely on the undeniable logic of mathematical models to create an ecosystem that works for each user. Bitcoin is perhaps the clearest example of how these models can change the world. The generation of the coin depends entirely on the computing power of the laptop, which is used to solve mathematical problems.

In the presented article, the main emphasis is placed not only on the history of the appearance of bitcoin, but also on the mathematical apparatus of the cryptosystem.

The mathematical principles of the operation of cryptocurrencies are considered using the example ofbitcoin, which today has the most widespread network.

The main tool of cryptography, which is basic in the development ofbitcoin, is considered - elliptic curves.

Some of the main properties of these curves are given, as well as the principle of their application during the creation of cryptocurrency.

Mathematical formulas for calculating the public key from the private key are specified. mathematical elliptic curve cryptocurrency

The main reasons for the use of elliptic curves, which are the basis of the operation of the cryptosystem, are highlighted.

Key words: cryptocurrency; bitcoin; elliptic curve; electronic money; private key; public key.

Formulation the problem

The issue of creation and popularization of cryptocurrency from a mathematical point of view is extremely relevant. In particular, we are talking about the most famous cryptocurrency today - Bitcoin. This topic is quite important at the moment, because there is a demand in society for a decentralized alternative means of payment, which, regardless of the state and in terms of content, resembles the system of the gold standard with a limited supply of currency.

In modern conditions of digitization of all spheres of social life, virtual objects have been formed. Not everyone knows the definition of cryptocurrency, virtual wallet, bitcoin. All these things have gained considerable popularity due to the fact that without having professional knowledge and without making special efforts, you can get rich quickly.

This digital currency, which is based in turn on cryptography, is completely protected from hacking. It has no physical analogues, and its value lies in the anonymity of paying for goods and services without a commission, as well as in obtaining profit from investments.

Analysis of relevant research

The main formulations and ideas related to blockchain technologies were highlighted by such scientists as S. Nakamoto, M. Swan, D. Chiesa. The peculiarities of using a mathematical base for the formation of cryptocurrencies, the calculation of private and public keys, and the construction of elliptic curves were substantiated in his works by S. Nakamoto [4].

In 2020, Evan Malloy, in his publication Blockchain: The Mathematics of the Fundamentals, described that blockchain technology is based on more than just computer code. It is mostly closely related to mathematics [2].

In 2022, a collection entitled “Mathematics, cryptocurrencies and blockchain technology” was published, which contains a significant contribution by scientists Jose Luis Miralles-Quiros and Maria Mar Miralles-Quiros [3]. In their publication, they focused on basic mathematical and computational methods that can be useful tools for forecasting or for estimating the reasonable value of crypto-currencies.

In turn, Valtteri Niemi actively used cryptographic technologies in the blockchain theory [5]. The main goals of his work are the description of the three main features of cryptography: confidentiality, integrity and accessibility of the ecosystem in various implemented mechanisms.

When writing the article, various publications and materials on cryptography, cryptocurrencies and mathematics were analyzed. Some of my own thoughts and research are also presented.

The aim of the article

The purpose of the article is to prove about the importance of cryptocurrency in modern times and rethinking its popularity. To analyze how mathematics is used in the formation of electronic currency and wallets. Explore the basic mathematical element of cryptocurrency - elliptic curves.

Research methods

Analysis of research by scientists and methodologists, analysis of educational programs. To achieve the goal of the study, the authors analyzed scientific publications related to a) analysis of cryptocurrency systems; b) construction of elliptic curves; c) mathematical methods, tools and technologies that are the basis for cryptocurrency systems.

Presenting main material

Mathematics is a very important concept behind Bitcoin and cryptocurrency technology. Especially when it comes to protecting digital assets [1].

Bitcoin is a new decentralized payment network that started working in January 2009. This new technology was created by an author under the pseudonym or a group of authors called Satoshi Nakamoto [4]. The Bitcoin protocol is a mathematical algorithm that manages these transactions and forms a consensus among users of this system. Its main feature is decentralization, which means no organization or central structure. Network nodes are voluntary participants who enjoy equal rights and obligations. The network is open and anyone can participate. It is persistent and unstoppable.

Keeping track of cash is easy. Let us have 5 dollars. If we give 2, the result will be 3 dollars. This example shows the physical calculation of funds. But how to check whether this cash is legal, that is, whether it was minted on legal grounds? The bills would have to be physically checked to ensure their legitimacy. Counterfeiting bills is not a very difficult task, so "real money" is not a reliable thing in the twenty-first century. A cryptocurrency such as Bitcoin is significantly different from paper money. It cannot be physically counted and verified for legitimacy. So how is it even possible to keep records of cryptocurrency transactions and what ensures the security of "electronic money"? The main security components are cryptography, blockchain and mathematical principles that track Bitcoin transactions and ensure that every Bitcoin is legitimate and no one is creating malicious transactions [6].

Bitcoin transactions are public information. Sending secret messages is a less important process than verifying information, which uses principles of cryptography and mathematics. Cryptography is the process of transmitting messages between parties, in which any outsiders do not have to understand their content [9]. This may involve the use of complex mathematics and algorithms to ensure data confidentiality, authenticity, integrity and non-repudiation.

Bitcoin is intangible and has no attachment to any currencies. Its course is extremely mobile and is determined solely by the balance of supply and demand. The circulation of this currency is not controlled by any bodies, departments or organizations and is carried out exclusively between crypto-gamers of network participants. It is not possible to cancel a coin transaction.

Bitcoins themselves are not stored centrally or locally - and therefore it is impossible to say who is responsible for their trusted storage. Bitcoins exist only as entries in a distributed ledger called a block chain, copies of which are distributed among a voluntary network of connected computers. Being the "owner" of bitcoins simply means having the ability to transfer control of these records to someone else by recording the fact of this transfer on the block chain. What gives this ability? Exclusive access to the ECDSA key pair: secret and public [10].

Blockchain is a conditionally growing ledger for recording cryptocurrency transactions. Each of its blocks consists of a hash function, which is based on the previous block, a timestamp, and the actual transaction data. The hash function acts as a digital signature that verifies that the transaction data has not been tampered with. It can be compared to a handwritten confirmation text.

A hash must meet certain requirements in order for it to be considered secure. First, it must be deterministic. That is, the same message is encoded to get the same hash:

Hello Youtube!

Hello Youtube!

79EA6E331E9F0B271400F0995EE2E0A1DB5890AEA5FA42A0275DFC6CD5BE61FA

79EA6E331E9F0B271400F0995EE2E0A1DB5890AEA5FA42A0275DFC6CD5BE61FA

Second, it must be one-sided, so it cannot be inverted or reversed. Third, it must be fast to compute. Fourth, it is not possible to find two messages with the same hash. Fifth, it must give way to an avalanche effect, that is, even with a small change in the original message, the new hash will be significantly different from the previous one:

Hello Youtube!

Hello Youtube!!

79EA6E331E9F0B271400F0995EE2E0A1DB5890AEA5FA42A0275DFC6CD5BE61FA

9774F8ECEF10CC80C45C06E7842D317E3DFFBB891D070DC8264EDCF5E5D22ED4

Not all hash functions are created equal. One of the best ways to leave digital signatures that exists at the moment is the use of cryptography, namely the elliptic curve. This allows having a 256-bit private key as secure as a 3072-bit private key using RSA protocols.

ECDSA is a certain algorithm with a public key, which is designed to create a digital signature, which is defined in a group of points of an elliptic curve [7]. It is this process that uses elliptic curves and finite fields to sign data in such a way that others can easily verify the signature. The algorithm has two procedures for signature and its verification. Arithmetic operations are the basis of every operation. The signature algorithm uses the secret key, while the verification algorithm uses only the public key.

An elliptic curve is a curve that satisfies the following equation [8]:

y2 = x3 - ax - b, (1)

where 4a3 - 27b2 ? 0. These options prevent function complexity. They are symmetric about the x-axis and work on finite fields and cryptographic parameters, and have intuitively simple ways to add two points on a line.

In fig. 1 shows the graph of the function: y2 = x3 - 7 - the curve on which bitcoin is based (a = 0, b = 7).

In order to use this algorithm, the Bitcoin protocol must fix a set of parameters for the elliptic curve and its final field, so that these parameters are known and applied by all users of the protocol. Otherwise, everyone will solve their own equations that will not agree with each other. The parameters include the following: the equation of the curve, the value of the field modulus, and the base point that lies on this curve. An equally important parameter is the order of the base point, that is, how many times a point can be added to itself until its tangent curve becomes vertical. This parameter is selected so that it is a very simple number.

Fig. 1 Graph of the function уг = *3 - 7

Consider the case when we need to add two units to our equation. Let's draw a straight line between them and wherever this straight line crosses the curve at the third point (Fig. 2). From this point we draw a perpendicular to the x axis.

Fig. 2 The graph of the function уг = *3 - 7, which intersects the straight line

Let point P have coordinates (-1.164; 2.328), point G has coordinates (1.773; -3.546). Then the line passing through them leads to the point (3.391; -6.783), which we will set equal to K. To get the graphical sum of these points, you need to display it through the X axis (Fig. 3):

Fig. 3 Mapping point K onto the X axis

This leads to some point R with coordinates (3.391; 6.783). We see that the y-coordinate acquires a positive value. This is the sought amount. Therefore, the sum of the points is P - G = R, which we found graphically using K. However, algebraically, this is true only for elliptic curves that meet a certain condition: they act within the finite fields on which these curves act. If we try to add P - G not graphically, we notice that the answer will not make sense (^R) from the very beginning.

Elliptic curves work on a principle called point addition, which is significantly different from regular addition. This process involves finding the equation of the line passing through the 2 points (P, G) using the slope point form and substituting this equation for y in the original equation y2 = x3 - ax - b. The next step is to find the third root of the equation (the first root is P, the second root is G).

Let's consider another example. Let's add point P to itself twice. To do this, let's take another point and use the same curve. Let's take the coordinates of point P (-1.13; 2.357). It is chosen randomly. To add this point to itself, use a tangent line to find the coordinates of another point. This tangent is a straight line that connects the point to itself. We see that the line tangent to P crosses the curve at the point (2.92; 5.647). Displaying it through the x axis, we have the desired point with coordinates (2.92; -5.647). This reflected dot is the sought amount. Therefore, P - P = (2.92; -5.647). That is, the main principle of finding the sum is reflected by the following algorithm:

1) Finding the tangent line to the desired point;

2) Display of this point through the x-axis.

Fig. 4 Graphic representation of adding point P to itself twice

Let us have an arbitrary point on the curve P є Q2. We use this to calculate the random multiple P:

This value is the private key. Since there is an infinite number of starting points and the number of times that we multiply by P, the signature is absolutely impossible to reproduce:

Let's assume that the signature was solved. How to prove that he is personally ours? Everything is based on three pieces of evidence:

1) Multiplicity of the number P;

2) Calculation of obtaining a multiple number;

3) What this number was coded into.

This is called a zero-knowledge proof. Therefore, without knowing the private key, no one will be able to find out the personal data of another person. Bitcoin is a completely secure electronic currency using cryptography, blockchain technology and mathematics. It is able to keep track of all transactions that take place and guarantee that all bitcoins that are transacted will be legitimate. The math ensures that no one can go back and change the transaction. This ensures that each transaction is final, and the funds will not disappear randomly. It also guarantees that the private keys cannot be revealed by using the public key to calculate them.

Conclusions and prospects for further research

The use of mathematics in cryptocurrency fields is one of the key elements of cryptocurrency security. Mathematics helps to create unique blockchain transaction schemes, as well as to allow users to communicate with each other securely. For example, mathematical algorithms help create systems to quickly and safely transfer funds from one user to another.

Cryptocurrency continues its development these days more and more, as the number of users interested in new payment systems is constantly increasing. The demand for a currency like Bitcoin stimulates the creation of other crypto-loots that would enjoy the same popularity. But the creation of "electronic money" would be impossible without a clear mathematical base and principles underlying its functioning. The presented article considered the main mathematical principles of cryptocurrencies and the main tool of cryptography - elliptic curves. Therefore, it would be impossible to develop a crypto network without a clear mathematical basis.

References

1. Hriunspan K. Matematyka, shcho stoit za bitkoinom. Honka podviinykh vytrat, 2017. S. 6-7.

2. Malloi E. Blokchein: Matematyka za osnovamy. 2020. URL: https://www.sdsolutionsnc.com/blockchain-the-mathematicsbehind-the-basics/.

3. Miralles-Kiros Zh. Z., Miralles-Kiros M. M. Matematyka, kryptovaliuty ta tekhnolohiia blokchein. Bazel, Shveitsariia, 2022.

4. Nakamoto S. Bitkoin: odnoranhova elektronna hotivkova systema: monohrafiia, 2009. S. 3 - 4.

5. Niiemi V. Matematyka ta struktury danykh u Blockchain ta Ethereum. Turetskyi universytet, 2018. 27 s.

6. Nuhard M. Alhorytmy ta struktury danykh. Perekhidnistany, 2004. S. 10-12.

7. Elliptic Curve Digital Signature Algorithm. Sait vilnoi entsyklopedii "Vikipediia". URL: https://uk.wikipedia.org/wiki/Elliptic_Curve_Digital_Signature_Algorithm.

8. Elliptic curve. Sait vilnoi entsyklopedii "Vikipediia". URL: https://uk.wikipedia.org/wiki/Еліптична_крива.

9. Filshtinskyi V.A. Matematychni osnovy kryptohrafii. Sumy: Sumskyi derzhavnyi universytet, 2011. 138 s.

10. Chaum D. Slipipidpysy dlia nevidstezhuvanykh platezhiv, 1983. 199-203.

Размещено на Allbest.ru

...

Подобные документы

  • Review of concepts, forms and different ways of representing the methods of mathematical induction, characterization of its ideas and principles. Features of a multimedia learning object students and teachers on the example of the University of Latvia.

    реферат [1,1 M], добавлен 11.02.2012

  • Двойственные задачи в линейном программировании. Симметричные и несимметричные двойственные задачи. Связь исходной и двойственной задач. Анализ моделируемой ситуации (моделируемого объекта). Реализация двойственности на Visual Basic for Application.

    курсовая работа [703,5 K], добавлен 14.10.2011

  • Construction of the general algorithm for integration of the linear usual distinctive equation. Creation of the common decision of the differential equation. An example of the decision of linear systems. Definition of components of certain functions.

    учебное пособие [2,4 M], добавлен 03.10.2011

  • Characteristics of the main two-dimensional, three-dimensional and n-dimensional geometric shapes, their use in mathematics, physics and other. Properties of two-dimensional geometric shapes arranged on the plane: polygon, triangle, quadrilateral, circle.

    топик [251,8 K], добавлен 21.12.2013

  • The air transport system in Russia. Project on the development of regional air traffic. Data collection. Creation of the database. Designing a data warehouse. Mathematical Model description. Data analysis and forecasting. Applying mathematical tools.

    реферат [316,2 K], добавлен 20.03.2016

  • MathML (Mathematical Markup Language): язык разметки математических приложений. Математика и ее система обозначений. Существующие языки математической разметки. Синтаксис и грамматика MathML. Возможности современных браузеров при работе с MathML.

    курсовая работа [489,2 K], добавлен 14.07.2009

  • Studying the appearance of neologisms during the Renaissance, semantic features of neologisms in modern English, the types of neologisms, their division by their structure. Analysis sociolinguistic aspects of mathematical education based on neologisms.

    дипломная работа [60,2 K], добавлен 18.03.2012

  • Mathematical learning for young children. Patterns and perspectives of teaching mathematics in primary school. The purposes and content of modern mathematical education in primary school. The methods of child’s acquaintance with geometric shapes.

    реферат [35,9 K], добавлен 02.04.2009

  • The Rational Dynamics. The Classification of Shannon Isomorphisms. Problems in Parabolic Dynamics. Fundamental Properties of Hulls. An Application to the Invertibility of Ultra-Continuously Meager Random Variables. Fundamental Properties of Invariant.

    диссертация [1,6 M], добавлен 24.10.2012

  • Правила создания и особенности работы с приложением Windows Application. Рассмотрение структуры панели Properties и ее функционального назначения. Возможности пункта меню "View". Практическая разработка приложения - калькулятора для сложения двух чисел.

    лабораторная работа [99,1 K], добавлен 01.12.2011

  • Mathematical model of the grinding grating bending process under the action of a meat product load parabolically decreasing along the radius. Determination of the deflection of a knife blade under the action of a parabolic load of the food medium.

    статья [1,3 M], добавлен 20.10.2022

  • Theoretical Aspects of Conversational Principles: рhilosophical background, сooperative principle by H.P. Grice, сonversation implicatures. Applied Aspects of Conversational Analysis. Following, fаlouting the cooperative principle. Maxims of conversation.

    курсовая работа [28,1 K], добавлен 08.06.2010

  • History of application of aluminium. The characteristic, chemical and physical properties of aluminium, industrial production and clarification. Aluminium application in the industry, in household appliances. Prospects of development of manufacture.

    реферат [21,6 K], добавлен 11.11.2009

  • Comparing instructed and natural settings for language learning. Natural and instructional settings. Five principles for classroom teaching. The principle getting right from the beginning. The principle of saying what you mean and meaning what you say.

    дипломная работа [54,3 K], добавлен 10.07.2009

  • Description of the general laws of physical and colloid chemistry of disperse systems and surface phenomena. The doctrine of adsorption, surface forces, stability of disperse systems. Mathematical description. Methods of research. Double electric layer.

    контрольная работа [688,2 K], добавлен 15.11.2014

  • Public choice is an application of neoclassical economic tools. James Buchanan the developer of the Theory of the Public choice. The most important contribution of Public Choice Theory is that it recognizes that politicians are motivated by self interest.

    презентация [273,0 K], добавлен 03.04.2012

  • Social network theory and network effect. Six degrees of separation. Three degrees of influence. Habit-forming mobile products. Geo-targeting trend technology. Concept of the financial bubble. Quantitative research method, qualitative research.

    дипломная работа [3,0 M], добавлен 30.12.2015

  • The main stages of preparation to the speaker's public speaking. Basic requirements for use of external visual aids. Different types of authoritative statements. The major shortcomings of becoming a lecturer and the principles of public broadcasting.

    реферат [21,7 K], добавлен 15.05.2011

  • The role of constitutional principles in the mechanism of constitutional and legal regulation. Features of transformation in the interpretation principles. Relativism in the system of law. Local fundamental justice in the mechanism of the state.

    реферат [24,7 K], добавлен 10.02.2015

  • The process of translation, its main stages. Measuring success in translation, its principles. Importance of adequacy in translation, cognitive basis and linguistics. Aspects of cognition. Historical article and metaphors, especially their transfer.

    курсовая работа [48,6 K], добавлен 24.03.2013

Работы в архивах красиво оформлены согласно требованиям ВУЗов и содержат рисунки, диаграммы, формулы и т.д.
PPT, PPTX и PDF-файлы представлены только в архивах.
Рекомендуем скачать работу.