Subtitles section Play video Print subtitles The following content is provided under a Creative Commons license. Your support will help MIT OpenCourseWare continue to offer high quality educational resources for free. To make a donation or to view additional materials from hundreds of MIT courses, visit MIT OpenCourseWare at ocw.mit.edu. GARY GENSLER: I just want to say how touched I am that you are all still here. I really-- you know, there's a lot of shopping opportunities in the MIT courses. And that you have come back and not shaken loose after reading Satoshi Nakamoto's peer-to-peer Bitcoin paper, or maybe you just came back to see whether I was going to crash and burn describing it. But what we're going to try to do in the next three classes, just to frame it, is really give you some of the technical underpinnings of blockchain technology through the lens of Bitcoin. Bitcoin is just the first use case of blockchain technology. So if I often say Bitcoin this or Bitcoin that, it's really largely-- not entirely-- largely applicable to blockchain technology. My feeling is I'm only about eight or nine months ahead of all of you. I may have spent my whole professional life around finance and public service, and I can talk a lot about markets and about public policy, but MIT has given me the gift of thinking about blockchain technology. And I'm trying to return that gift a little bit for you all. And I have a few computer scientists in the room that are going to bail me out if I don't get this right. Sabrina, and then, oh, I see Alin is putting up his-- do you all know Alin? He's actually a PhD student at MIT, computer science. So somebody gets to that part of their life-- AUDIENCE: Terrible life choice. GARY GENSLER: Yeah, yeah. What was that? AUDIENCE: Terrible life choice. GARY GENSLER: Terrible life choice. Yeah. But he's going to bail us all out. But the reason that I think it's relevant not to just belabor it, is I really believe the only way that any of us can get to ground truths is to know a little bit about how the inner workings of this technology are. You're not going to have to do an algorithm or actually do a hash function, but to know underneath it. And then you can step away and say I no longer need to know how the carburetor on the car works, but I know what a carburetor is. Or, you know, whatever analogy you want. So with that little bit, as opposed to sort of all of that Socratic cold calling that I did last class, because money, Fiat currency is something at the core, and ledgers is at the core of a Sloan student's either education or background, this a little less of the core. If today's and the next couple of lectures, if you can work with me then I want you to interrupt me anytime you've got a question. I'm not going to do much cold calling. I don't want you to relax too much. I still want you to do the readings the next three classes. But just raise your hand, stop me, say, well, but what is that all about. And that just sort of we can work a little bit different on these next classes. So, as I'm always going to be doing, consistency. What are the study questions? So really, what are the design features? What are the key design features of this new technology, blockchain. And I put a few on the syllabus. And we're going to go through all this today and next week. Cryptography, append-only, timestamps blocks, distributed consensus algorithms, and networking. I list four. Later in this lecture, you'll see 8 or 10 that-- I guess it's 10 that we're going to really dig dig into. Can I just get a sense of the class and this is not for Talita or Sabrina to write down notes about participation. Is it a decent assumption, did most or all of you at least read Nakamoto's paper? All right. Good. All right, great. Just a sense, how many of you felt you got at least half of it, maybe less than 2/3, but at least half of it? All right, pretty good. When I first read it, I was right with you. So it's all right. Alin you got more than half of it, right? AUDIENCE: I read it five years ago, so. GARY GENSLER: You read it five years ago. Yeah, yeah, yeah. Yeah, life choices, talk about it. All right. And you're taking this class. Good, good. So we'll go through each of those. And then more specifically, we're going to peel back the cryptography. The two main cryptographic algorithms, or these words that you'll hear sometimes, cryptographic primitives-- Alin, what is a cryptographic primitive? AUDIENCE: Oh, it's a wild beasts. There are so many of them. GARY GENSLER: Yeah, but what's the two words together mean? AUDIENCE: Well, that's I'm saying. It could be anything. It could be a hash function, could be encryption function, could be a very powerful computation scheme, it could be a data outsourcing scheme, could be a data access privacy access. GARY GENSLER: But it's anything that basically protects the communication in the presence of adversaries. AUDIENCE: Well it's also something that you can use to prove that computation was done correctly on trusted servers. It's not just communication, it's also computation. GARY GENSLER: So communications and computation that needs to be protected or verified, have some form of cryptographic algorithm, which happens to be called a cryptographic primitive. The two main ones-- and there's a third one we'll talk about later in the semester-- but the two main ones, hash functions, just as a working knowledge of blockchain is worthy to know, and we're going to get-- everybody's going to get there. We're going to all get there to where you have some sense of what a hash function is. And then this whole concept of digital signatures, which relates to asymmetric cryptography. Those two are very fundamental to blockchain technology. Later in the semester, we'll talk a little bit about zero knowledge proofs, but they're not as fundamental to the first application. And so that's why they're kind of-- and they help make things verifiable and immutable. And that's the business side, the market side. Why does it matter? Otherwise, like, who cares what's in the carburetor if it doesn't matter? And then how does this all relate to the double spend problem? I can cold call on this. Isabella, do you remember what the double spending problem was from? AUDIENCE: It was when they would use the same coin, I guess, and they would use it multiple places and other digital wallets [INAUDIBLE].. GARY GENSLER: All right. So in essence, a double spend is when you have a piece of information and you use it twice. And we happen to call this piece of information "money," but you use it twice. You can send an email to two people and that's OK. I mean, it's a little embarrassing if you're sending it to one friend telling them you're available for dinner and the other friend thought you told them you weren't available. But you can still send it to two places. But in the system of money, it's a critical thing that you don't use it twice. The readings, was the demo helpful? I mean, we're going to do a lot more on that. I watched that demo last November, December. That was one of the first things I watched.