Online Courses
Blockchain Security
Online Courses
Blockchain Security
  • Blockchain Security
  • Fundamentals of Blockchain Security
    • Introduction to blockchain
    • The promises of blockchain
    • Inside the blockchain hype
    • Blockchain structures
    • What is public-key cryptography?
      • How does public-key cryptography work?
      • Public-key cryptography in the blockchain
    • Security assumptions of public-key cryptography
      • Quantum computing
    • Hash function in blockchain
      • Properties of hash functions
      • Hash functions in the blockchain
      • Blockchain security hash key functions
    • Quiz
  • Consensus Algorithm Security
    • Introduction
      • The Byzantine generals problem
      • Security via scarcity
      • Common blockchain consensus algorithms
      • The longest chain rule
    • Proof of work
      • Inside PoW mining
    • Attacking proof of work
      • The 51% attack
      • Denial of service: Artificial difficulty increases
    • Proof of stake
      • Choosing the block creator
    • Attacking PoS consensus
      • XX% attack and the PoS "timebomb"
      • Fake stake attacks
      • Long-range attack
      • Nothing at stake problem
      • Sour milk attack
    • Quiz
  • Blockchain in Action
    • Nodes and network
      • Inside the node
      • How blocks are created
    • Attacking block creation
      • Denial-of-service
      • Frontrunning
      • Selfish mining
      • SPV mining
    • Attacking blockchain nodes
      • Blockchain software misconfiguration
      • Denial of service
      • Malicious transactions
    • Attacking the blockchain network
      • Eclipse attack
      • Routing attack
      • Sybil attack
    • Quiz
  • Smart Contract Security
    • What are smart contracts?
      • Smart contracts
    • General programming vulnerabilities
      • Arithmetic vulnerabilities
      • Right-to-left control character
    • Blockchain vulnerabilities
    • Ethereum vulnerabilities
    • Quiz
  • Beyond the Basics
    • Alternative distributed ledger architectures
      • Introduction to DAGs
      • Introduction to block lattices
      • Introduction to sidechains
    • Second-level blockchain protocols
      • How a state channel works
    • Advanced cryptography in blockchain
      • Multisignatures
      • Zero-knowledge proofs
      • Stealth addresses
      • Ring signatures
      • Commitment schemes
    • Quiz
  • Cumulative Quiz
Powered by GitBook
On this page
  • Introduction to Proof of work
  • Breakdown
  1. Consensus Algorithm Security

Proof of work

Introduction to Proof of work

Proof of work is the original blockchain consensus algorithm. Included in the Bitcoin whitepaper

Proof of work uses computational power as it scarce resource. "Miners" compete to create a valid block that will be accepted by the blockchain network

  • The hash of the block header must be less than a set threshold

  • This is based on the current mining difficulty

    • Mining difficulty is updated at regular intervals to match the current computational power of the blockchain network ("hashrate")

Miners are incentivized to create blocks:

  • Block reward: Set amount given to the block creator for finding a block

  • Transaction fees: A "tax" on transactions that goes to the block creator

Breakdown

Here's a simple breakdown of how it works:

  • Miners compete to create the next block: Miners use their computers to generate a potential block and try to find a version of that block that meets certain requirements.

  • Difficulty and validity: The block's hash (a unique identifier) must be less than a set threshold to be considered valid. This ensures that finding a valid block is difficult and that only one block is created for each block interval.

  • Mining difficulty: The difficulty is adjusted so that, on average, it takes a certain amount of time to find a valid block. For example, in Bitcoin, a block is found every 10 minutes.

  • Incentives for miners: Miners are rewarded with cryptocurrency for finding a valid block. The reward decreases over time, but they can also earn transaction fees from users.

PreviousThe longest chain ruleNextInside PoW mining

Last updated 9 months ago