IKT519 Blockchain and distributed ledger technology
- ECTS Credits:
- 7.5
- Responsible department:
- Faculty of Engineering and Science
- Course Leader:
- Vladimir Oleshchuk
- Lecture Semester:
- Spring
- Teaching language:
- English
- Duration:
- 1 term
The course is connected to the following study programs
- Cyber Security, Master’s Programme
- Artificial Intelligence and The Internet of Things, Master's Programme
Teaching language
EnglishRecommended prerequisites
IKT447-G Trust, threats, risks and vulnerabilities
Course contents
The subject provides an overview of blockchains and distributed ledger technologies. The main topics in the course are:
-
Introduction to blockchains
-
Cryptography used in blockchains and cryptocurrencies: hash functions, hash pointers, Merkle trees and digital signatures.
-
Cryptocurrency concepts: GoofyCoin, ScroogeCoin
-
Distributed consensus: Bitcoin consensus protocol, "double spending" attack
-
Bitcoin script: Escrow transactions, green addresses, micro payments, smart contracts, soft forks and hard forks
-
Cryptocurrency storage: hot and cold storages, brain wallet, split key techniques
-
Bitcoin mining: hash puzzles, forking attacks.
-
Bitcoin anonymity: de-anonymization techniques, mixing, ZeroCoin
-
Fully anonymized cryptocurrency: ZeroCash
-
Other methods: alternate mining puzzles: memory hard puzzles: scrypt, Proof-of-useful work, non-outsourceable puzzles, virtual mining
-
Altcoins: bootstrapping altcoins, Litecoin, Primecoin, Permacoin, merge mining, interaction among block chains of different altcoins, cross-chain swaps
Learning outcomes
After completing the course, the student must
-
have advanced knowledge of the technical operation and foundations of blockchain and cryptocurrency technologies.
-
be able to practically apply blockchain technology in selected areas
Examination requirements
Approved compulsory assignments.
More detailed information is provided in Canvas at the start of the semester.
Teaching methods
The subject is given in the form of seminars that include lectures and compulsory work. The total expected scope of work is estimated at approx. 200 hours.
Evaluation
The person responsible for the course decides, in cooperation with student representative, the form of student evaluation and whether the course is to have a midway or end of course evaluation in accordance with the quality system for education, chapter 4.1.
Offered as Single Standing Module
Yes. Subject to availability or capacity.
Admission Requirement if given as Single Standing Module
The admission requirements for the course are the same as for the master's program in cyber security or the master's program in ICT. It is recommended that students also have prior knowledge corresponding to IKT447-G Trust, threats, risks and vulnerabilities.
Assessment methods and criteria
3 hours individual written exam. Graded grade.