联系方式

  • QQ:99515681
  • 邮箱:99515681@qq.com
  • 工作时间:8:00-21:00
  • 微信:codinghelp

您当前位置:首页 >> Python编程Python编程

日期:2024-12-10 09:18

Assignment 2: Blockchain and Mining with Proof-of-work for Bitcoin

CE235 Computer Security

2024-2025

University of Essex

1. Introduction

1.1 Bitcoin Mining

Bitcoin is a cryptocurrency. In the Bitcoin system Bitcoins are mined through proof-of-work mechanism.

Bitcoin miners are given technical puzzles to solve. There is only one puzzle at any time with a given difficulty

level, which is set by the system administrator. New puzzles are created after the current one is solved.

The first miner who solves the puzzle is awarded a specified number of bitcoins. The winner creates and sign a

new block with digital signature technology and broadcast to other Bitcoin users. The signed block is linked to

the previous signed blocks. These blocks form a chain of blocks (called blockchain) as shown in the following

figure. The new signed blocks are verified by others and could become mature after being confirmed by a given

number of miners, which is measured by length of blocks linked to the new blocks.

1.2 Technical puzzle

The puzzle set in the proof-of-work is to find a specific integer number (called nonce), which together with a

few other numbers (such as hash value of the previous block, the transactions to be included to the new block)

are hashed with SHA-256 algorithm and the hashed value satisfies a given condition.

The puzzle can be formulated as follows:

where preHash is the hash value of the previous block, Tx is transaction of bitcoins. levelHard is a given number,

usually controlled by requiring a consecutive number of most significant bits (MSB) being zeros, for example

the first 30 MSBs being zero. The more MSB zeros required on levelHard, the more difficult to solve the puzzle

(finding the nonce satisfying the condition). Below gives a binary number with the 15 MSB being zeros and 5

least significant bits (LSB).

(MSB) 00000000000000011100000101111110011010101100000 (LSB)

1.3 Signing and verifying a new block

The first miner solving the puzzle will create a new block, which includes a block header (storing the digital

signature of this new block, which will include the hash value of the block body) and a block body. The block

body includes the hash value of the previous block, the found nonce and transactions included in this block. The

digital signature is created by encrypting the hash value of this new block with private key. The block is linked

to the last block of the existing blockchain and broadcast. The new block will then be verified by others using

the winning miner’s public key and checking the hash values of this and previous blocks.

2. Specification

Block header (signature)

Prev Hash

Nonce

Tx1

Tx2

TxN

Block header (signature)

Prev Hash

Nonce

Tx1

Tx2

TxN

Block header (signature)

Prev Hash

Nonce

Tx1

Tx2

TxN

Block n-2 Block n-1 Block n

find nonce, subject to: hash(preHash, nonce, Tx) < levelHard This assignment takes 18% of the marks (18 marks) of this module. The aim of the assignment is to write a

Python program, which will implement a simplified version of Bitcoin mining and digital signature schemes as

shown in the following figure, with additional task of protecting the confidentiality of the signed message (from

by encrypting/decrypting the signed message (such as with an extra RSA key pair for the validator).

2.1 Task1: Create a RSA public/private key pair with 1024 bits key length [1 mark]

o The RSA key pairs will be used in Task3 and Task4 of this assignment.

o The created RSA public {n,e} and private keys {n,d} need to be displayed with the following

format:

2.2 Task2: Find a nonce with hash algorithm SHA-256, which is a hash value satisfying requirement

of the 6 least significant bits (LSB) being zero [4 marks]. Produce a figure (or a table) which shows

the computation time (denoted by T) used to find a valid nonce by your own computer against the

number of required LSB being zero (denoted by N) changing from 1 to 8 [3 marks].

o Hint: you can extend Example 4 in the provided sample program to complete this task. Example 4

generates only one nonce and check if the nonce is valid.

o You should try many random integers as nonce (with a loop) until you successfully find a nonce

that meets the requirement. The only output from this task is the nonce, which needs to be displayed

with the following format (suppose the found nonce is 12345):

o You can use your program to produce the figure/table automatically, or you can record the

computation times and create the figure/table using other software, then present it to the teaching

staff members during your demonstration. Not to submit the figure/table to Faser.

2.3 Task3: Digitally sign the nonce and your student number with the RSA private key [3 marks]

o The message to be signed is a string consisting of the nonce (found with 6 LSB being zero) and

your student number, which are separated by a space. For example, if the found nonce is 12345 and

your student number is 54321, then the message to be signed needs to be a string “12345 54321”

o You need to sign the message with RSA key pair generated in Task 1.

o The outputs of this Task3 include the hashed value of the message and the signature, which need to

be displayed with the following format.

Find a valid

nonce

Sign message

(nonce, student #)

Verify the digital

signature

Generate RSA

keys

Measure

computation time

Required # of

LSB zeros

Valid

nonce

Encrypted message

& signature

Validation

outcome

Table or figure Keys

Keys

Public key:

(n=0x995361030caa5bf308e272fe07f3466c0727b5ac0c41107142fd97dd75ec4a197250c038

8b8711b210b2beb300980321913e9eb21b22f72c3fe8b62adda13491c6efbf3f4e6c6c60738da

c790af2ca0b8067f4550fae82c8ea85d3fc0667f1de7a193f23a1d30e8e7f2894f07ce26b5d94

85df5a29fc265fc217dbbb91065b35, e=0x10001)

Private key:

(n=0x995361030caa5bf308e272fe07f3466c0727b5ac0c41107142fd97dd75ec4a197250c038

8b8711b210b2beb300980321913e9eb21b22f72c3fe8b62adda13491c6efbf3f4e6c6c60738da

c790af2ca0b8067f4550fae82c8ea85d3fc0667f1de7a193f23a1d30e8e7f2894f07ce26b5d94

85df5a29fc265fc217dbbb91065b35,

d=0x24cf1913a7d74042dce7ac6ea30efae19568299bb7c769009ff20ca2ec9c010011eb23f28

f40aa7562bfdebb4f91aef2c091557cf1b9d7b82651a2663115f1ee0c416b1fec516a83657558

068f1eebffae9f11b2801830acf2b0af4367fcd26ffe4672c5c5165afaeb5eeb81e6497a04192

133476e124b4ce2a869a16fc998e1)

Valid Nonce: 12345  

2.4 Task4: Verify the signature [3 marks]

o The signature verification is to be achieved by decrypting the digital signature with public key

{n,e} generated in Task 1 to get the hash value from the signature and compare it to the one

obtained from hashing the signed message.

o The process of signature verification needs to output yes or no depending on the verification

outcome.

2.5 Task5: Protect the confidentiality of the signed message from Task 3 by encrypting/decrypting

the signed message [4 marks]

o You should generate another RSA key pair for the validator.

o The signed message should be encrypted with a key of the validator by the user who signs the

message.

o The encrypted signed message should be decrypted with another key of the validator before the

signature validation by the validator.

3. Sample Program

We provide a sample python program miningBitcoin_sample.py, which includes most of the needed

RSA encryption and digital signature functions to complete the above tasks. It can be run from integrated

development environments (IDLE). It can also be run from the command line like this:

python mingingBitcoin_sample.py

You should modify the sample python program to complete the tasks. Your own program should have a name

like cs_bitcoin_registrationnumber.py (replace registrationnumber by your own registration number). For

example, if your registration number is 1234567, your filename will be:

cs_bitcoin_1234567.py

Your program must run from the command line like this:

python cs_bitcoin_1234567.py

The outputs of your program are required to be displayed, following the specified format for marking purposes.

4. How to submit

Submit your python .py file to Faser by the submission deadline Friday, 13/12/2024.

5. Marking Scheme

You will be asked by the Professor He or teaching assistants at NWU to demonstrate your work and answer questions

to ensure it is your own work. Your marks for this assignment will be dependent on the complement and output

results of your program, and your answers to the questions asked by the teachers. If you are asked to but you don’t

demonstrate your work, no mark will be given to your assignment work.

Apart from demonstration of your work to the teaching staff members, it is mandatory for you to submit your program

file to Faser on time. Otherwise, you may not get any mark for your work on the assignment.

Your submitted program may be checked and tested by Professor He. If problems such as plagiarism are found from

the testing, your marks will be reduced.

Plagiarism

You should work individually on this project. Anything you submit is assumed to be entirely your own work.

The usual Essex policy on plagiarism applies: http://www.essex.ac.uk/plagiarism/.

Message: 12345 54321

Hash value of message:

32547436749427615422843012801191259465058592439985110545719463144077305232244

Signature:

0x3ee3934a23e2d55c7377a125e052e5f305d82fbf0643713acb00cf1cb0c968eb65f56de35d0

37aac5d0d3ae7489d4067e9c38ceee2f4f602ebf90d8a070606c27808f22bd537a42e066c86c3

6d5e5efa786be09e0753f82a847a05d0bdcd0418624a3f3c8a203524f97f56528ffca1e633d29

bd8cfa80fb80bc3b4a53e2d51b5 Appendix A. Sample Python Program for Bitcoin Mining

### First first time use, you need to install module pycryptodome

### using the following commands (without #) in terminal:

# pip uninstall crypto

# pip install pycryptodome

# import necessary modules

from Crypto.PublicKey import RSA

from hashlib import sha512, sha256

import random

#The following function generateRSAKeys creates the RSA public/private key pair.

def generateRSAKeys(numBits):

keyPair = RSA.generate(numBits)

return keyPair

### Example 1: generating RSA public/private keys.

numBits = 1024

keyPair = generateRSAKeys(numBits)

print("Public key: n={", hex(keyPair.n), "}, e={", hex(keyPair.e), "})")

print(' ')

print("Private key: n={", hex(keyPair.n), "}, d={", hex(keyPair.d), "})")

print(' ')

#The following function digitalSignRSA digitally sign a message of type "bytes"

# with RSA private key of keyPair

#- input: msg and keyPairRSA

#- output: signature (type: int)

def digitalSignRSA(msg, keyPairRSA):

### RSA sign the message

# msg = bytes('A message for signing', 'utf-8')

# compute the hash value of the message to be signed with hash algorithm SHA-256

hashValue = int.from_bytes(sha256(msg).digest(), byteorder='big')

#sign (encrypt) the hash value of the message with RSA priviate key

# only the person with RSA private key can perform the operation

signature = pow(hashValue, keyPair.d, keyPair.n)

return(hashValue, signature)

### Example 2: calling function digitalSignRSA to sign a given message

msg = bytes('A message for signing', 'utf-8')

(hashValue, signature) = digitalSignRSA(msg, keyPair)

print("Hash value of message:", hashValue)

print("Signature:", hex(signature))

print(' ')

#The following function digitalVerifyRSA verify the signature of a message of type "bytes"

# with RSA public key of keyPair

#- input: msg, keyPairRSA and signature #- output: validity (type: boolean)

def digitalVerifyRSA(msg, keyPairRSA, signature):

### Verify the digital signature

# compute the hash value of the message to be signed with hash algorithm SHA-256

hashValue = int.from_bytes(sha256(msg).digest(), byteorder='big')

# decrypt the signature of the message to obtain the hash value with RSA public key

# everyone with RSA public key can perform the operation

hashFromSignature = pow(signature, keyPair.e, keyPair.n)

validity = (hashValue == hashFromSignature)

return(validity)

### Example 3: verifying a message signature using function digitalVerifyRSA

# Verify the true digital signature with the original message

msg = bytes('A message for signing', 'utf-8')

validity = digitalVerifyRSA(msg, keyPair, signature)

print("Signature validity:", validity)

print(' ')

# Verify the true digital signature with a tampered message

msgTampered = bytes('A message for signing (tampered)', 'utf-8')

validity = digitalVerifyRSA(msgTampered, keyPair, signature)

print("Signature validity:", validity)

print(' ')

#The following function checkOneNonce will check if one nonce can solve the puzzle

#This function can be used to implement the proof-of-work

#- input: numZerosNeeded (type: int), required number of least significant bits to be zero.

# nonce (type: int), a random number to be checked

#- output: validity (type: boolean), true or false on the validity of this nonce.

def checkOneNonce(numZerosNeeded, nonce):

# Note that hash function sha256 accepts input of type byte.

# so we convert random number nonce to a byte array nByte

#convert the random integer to a byte array

nByte = bytes(str(nonce), 'utf-8')

# compute the hash of the nonce

hash = int.from_bytes(sha256(nByte).digest(), byteorder='big')

# convert the hash value to binary number and extract the needed LSBs.

hashBin = bin(hash)

hashLSB = int(hashBin[-numZerosNeeded:])

# check if the LSBs are all zero

if hashLSB == 0:

print('nRand:', nonce, '; hash_lsb:', hashLSB)

validity = (hashLSB == 0)

return (validity)

# Example 4: generating a random number as a nonce, checking only one nonce with function checkOneNonce,

# the nonce may be valid or may be invalid.

numZerosNeeded = 5

# generate a nonce (a random integer in a specified range)

nonce = random.randint(0,1000000)  

Example Output after running the sample program:

validity = checkOneNonce(numZerosNeeded, nonce)

print('The validity of this nonce ', nonce, ' is:', validity)

print('================================================================ ')

### Task 1: Create a RSA public/private key pair with 1024 bits key length [1%]

### Task 2 [7%]: Using hash algorithm SHA-256 to find a nonce, and produce a figure or a table showing the

computation time to find valid naunce against the number of required LSB being zero (1 to 8).

### Task3: Digitally sign the nonce and your student number with the RSA private key [3%]

### Task4: Digitally verify the signature with the RSA public key [3%]

# you should produce and display the output of either “yes” or “no” according to the verification result.

### Task5: Protect the confidentiality of the signed message [4%]

# you should produce and display the output of either “yes” or “no” according to the verification result.


版权所有:编程辅导网 2021 All Rights Reserved 联系方式:QQ:99515681 微信:codinghelp 电子信箱:99515681@qq.com
免责声明:本站部分内容从网络整理而来,只供参考!如有版权问题可联系本站删除。 站长地图

python代写
微信客服:codinghelp