The course is connected to the following study programs

Teaching language

English

Recommended prerequisites

IKT447-G Trust, threats, risks and vulnerabilities

Course contents

The subject provides an overview of blockchains and distributed ledger technologies. The main topics in the course are:

  • Introduction to blockchains

  • Cryptography used in blockchains and cryptocurrencies: hash functions, hash pointers, Merkle trees and digital signatures.

  • Cryptocurrency concepts: GoofyCoin, ScroogeCoin

  • Distributed consensus: Bitcoin consensus protocol, "double spending" attack

  • Bitcoin script: Escrow transactions, green addresses, micro payments, smart contracts, soft forks and hard forks

  • Cryptocurrency storage: hot and cold storages, brain wallet, split key techniques

  • Bitcoin mining: hash puzzles, forking attacks.

  • Bitcoin anonymity: de-anonymization techniques, mixing, ZeroCoin

  • Fully anonymized cryptocurrency: ZeroCash

  • Other methods: alternate mining puzzles: memory hard puzzles: scrypt, Proof-of-useful work, non-outsourceable puzzles, virtual mining

  • Altcoins: bootstrapping altcoins, Litecoin, Primecoin, Permacoin, merge mining, interaction among block chains of different altcoins, cross-chain swaps

Learning outcomes

After completing the course, the student must

  • have advanced knowledge of the technical operation and foundations of blockchain and cryptocurrency technologies.

  • be able to practically apply blockchain technology in selected areas

Examination requirements

Approved compulsory assignments.

More detailed information is provided in Canvas at the start of the semester.

Teaching methods

The subject is given in the form of seminars that include lectures and compulsory work. The total expected scope of work is estimated at approx. 200 hours.

Evaluation

The person responsible for the course decides, in cooperation with student representative, the form of student evaluation and whether the course is to have a midway or end of course evaluation in accordance with the quality system for education, chapter 4.1.

Offered as Single Standing Module

Yes. Subject to availability or capacity.

Admission Requirement if given as Single Standing Module

The admission requirements for the course are the same as for the master's program in cyber security or the master's program in ICT. It is recommended that students also have prior knowledge corresponding to IKT447-G Trust, threats, risks and vulnerabilities.

Assessment methods and criteria

3 hours individual written exam. Graded grade.

Last updated from FS (Common Student System) June 30, 2024 7:44:00 PM