Subtitles section Play video
The following content is provided under a Creative
Commons license.
Your support will help MIT OpenCourseWare
continue to offer high quality educational resources for free.
To make a donation or to view additional materials
from hundreds of MIT courses, visit MIT OpenCourseWare
at ocw.mit.edu.
GARY GENSLER: I just want to say how
touched I am that you are all still here.
I really-- you know, there's a lot of shopping opportunities
in the MIT courses.
And that you have come back and not shaken
loose after reading Satoshi Nakamoto's
peer-to-peer Bitcoin paper, or maybe you just came back
to see whether I was going to crash and burn describing it.
But what we're going to try to do in the next three classes,
just to frame it, is really give you
some of the technical underpinnings
of blockchain technology through the lens of Bitcoin.
Bitcoin is just the first use case of blockchain technology.
So if I often say Bitcoin this or Bitcoin that,
it's really largely--
not entirely-- largely applicable
to blockchain technology.
My feeling is I'm only about eight or nine months ahead
of all of you.
I may have spent my whole professional life
around finance and public service,
and I can talk a lot about markets and about
public policy, but MIT has given me
the gift of thinking about blockchain technology.
And I'm trying to return that gift a little bit for you all.
And I have a few computer scientists
in the room that are going to bail me out
if I don't get this right.
Sabrina, and then, oh, I see Alin is putting up his--
do you all know Alin?
He's actually a PhD student at MIT, computer science.
So somebody gets to that part of their life--
AUDIENCE: Terrible life choice.
GARY GENSLER: Yeah, yeah.
What was that?
AUDIENCE: Terrible life choice.
GARY GENSLER: Terrible life choice.
Yeah.
But he's going to bail us all out.
But the reason that I think it's relevant not to just belabor
it, is I really believe the only way that any of us
can get to ground truths is to know a little bit about how
the inner workings of this technology are.
You're not going to have to do an algorithm
or actually do a hash function, but to know underneath it.
And then you can step away and say
I no longer need to know how the carburetor on the car works,
but I know what a carburetor is.
Or, you know, whatever analogy you want.
So with that little bit, as opposed
to sort of all of that Socratic cold calling
that I did last class, because money,
Fiat currency is something at the core,
and ledgers is at the core of a Sloan student's
either education or background, this a little less of the core.
If today's and the next couple of lectures,
if you can work with me then I want you to interrupt me
anytime you've got a question.
I'm not going to do much cold calling.
I don't want you to relax too much.
I still want you to do the readings the next three
classes.
But just raise your hand, stop me, say, well,
but what is that all about.
And that just sort of we can work
a little bit different on these next classes.
So, as I'm always going to be doing, consistency.
What are the study questions?
So really, what are the design features?
What are the key design features of this new technology,
blockchain.
And I put a few on the syllabus.
And we're going to go through all this today and next week.
Cryptography, append-only, timestamps
blocks, distributed consensus algorithms, and networking.
I list four.
Later in this lecture, you'll see 8 or 10 that--
I guess it's 10 that we're going to really dig dig into.
Can I just get a sense of the class and this
is not for Talita or Sabrina to write down
notes about participation.
Is it a decent assumption, did most or all of you
at least read Nakamoto's paper?
All right.
Good.
All right, great.
Just a sense, how many of you felt you got at least half
of it, maybe less than 2/3, but at least half of it?
All right, pretty good.
When I first read it, I was right with you.
So it's all right.
Alin you got more than half of it, right?
AUDIENCE: I read it five years ago, so.
GARY GENSLER: You read it five years ago.
Yeah, yeah, yeah.
Yeah, life choices, talk about it.
All right.
And you're taking this class.
Good, good.
So we'll go through each of those.
And then more specifically, we're
going to peel back the cryptography.
The two main cryptographic algorithms, or these words
that you'll hear sometimes, cryptographic primitives--
Alin, what is a cryptographic primitive?
AUDIENCE: Oh, it's a wild beasts.
There are so many of them.
GARY GENSLER: Yeah, but what's the two words together mean?
AUDIENCE: Well, that's I'm saying.
It could be anything.
It could be a hash function, could be encryption function,
could be a very powerful computation scheme,
it could be a data outsourcing scheme, could be a data access
privacy access.
GARY GENSLER: But it's anything that
basically protects the communication
in the presence of adversaries.
AUDIENCE: Well it's also something
that you can use to prove that computation was done correctly
on trusted servers.
It's not just communication, it's also computation.
GARY GENSLER: So communications and computation
that needs to be protected or verified,
have some form of cryptographic algorithm,
which happens to be called a cryptographic primitive.
The two main ones--
and there's a third one we'll talk about later
in the semester-- but the two main ones, hash functions,
just as a working knowledge of blockchain is worthy to know,
and we're going to get-- everybody's going to get there.
We're going to all get there to where
you have some sense of what a hash function is.
And then this whole concept of digital signatures,
which relates to asymmetric cryptography.
Those two are very fundamental to blockchain technology.
Later in the semester, we'll talk a little bit
about zero knowledge proofs, but they're not
as fundamental to the first application.
And so that's why they're kind of--
and they help make things verifiable and immutable.
And that's the business side, the market side.
Why does it matter?
Otherwise, like, who cares what's in the carburetor
if it doesn't matter?
And then how does this all relate to the double
spend problem?
I can cold call on this.
Isabella, do you remember what the double spending
problem was from?
AUDIENCE: It was when they would use the same coin,
I guess, and they would use it multiple places
and other digital wallets [INAUDIBLE]..
GARY GENSLER: All right.
So in essence, a double spend is when
you have a piece of information and you use it twice.
And we happen to call this piece of information "money,"
but you use it twice.
You can send an email to two people and that's OK.
I mean, it's a little embarrassing
if you're sending it to one friend telling them
you're available for dinner and the other friend
thought you told them you weren't available.
But you can still send it to two places.
But in the system of money, it's a critical thing
that you don't use it twice.
The readings, was the demo helpful?
I mean, we're going to do a lot more on that.
I watched that demo last November, December.
That was one of the first things I watched.