Placeholder Image

Subtitles section Play video

  • The following content is provided under a Creative

  • Commons license.

  • Your support will help MIT OpenCourseWare

  • continue to offer high quality educational resources for free.

  • To make a donation or to view additional materials

  • from hundreds of MIT courses, visit MIT OpenCourseWare

  • at ocw.mit.edu.

  • GARY GENSLER: I just want to say how

  • touched I am that you are all still here.

  • I really-- you know, there's a lot of shopping opportunities

  • in the MIT courses.

  • And that you have come back and not shaken

  • loose after reading Satoshi Nakamoto's

  • peer-to-peer Bitcoin paper, or maybe you just came back

  • to see whether I was going to crash and burn describing it.

  • But what we're going to try to do in the next three classes,

  • just to frame it, is really give you

  • some of the technical underpinnings

  • of blockchain technology through the lens of Bitcoin.

  • Bitcoin is just the first use case of blockchain technology.

  • So if I often say Bitcoin this or Bitcoin that,

  • it's really largely--

  • not entirely-- largely applicable

  • to blockchain technology.

  • My feeling is I'm only about eight or nine months ahead

  • of all of you.

  • I may have spent my whole professional life

  • around finance and public service,

  • and I can talk a lot about markets and about

  • public policy, but MIT has given me

  • the gift of thinking about blockchain technology.

  • And I'm trying to return that gift a little bit for you all.

  • And I have a few computer scientists

  • in the room that are going to bail me out

  • if I don't get this right.

  • Sabrina, and then, oh, I see Alin is putting up his--

  • do you all know Alin?

  • He's actually a PhD student at MIT, computer science.

  • So somebody gets to that part of their life--

  • AUDIENCE: Terrible life choice.

  • GARY GENSLER: Yeah, yeah.

  • What was that?

  • AUDIENCE: Terrible life choice.

  • GARY GENSLER: Terrible life choice.

  • Yeah.

  • But he's going to bail us all out.

  • But the reason that I think it's relevant not to just belabor

  • it, is I really believe the only way that any of us

  • can get to ground truths is to know a little bit about how

  • the inner workings of this technology are.

  • You're not going to have to do an algorithm

  • or actually do a hash function, but to know underneath it.

  • And then you can step away and say

  • I no longer need to know how the carburetor on the car works,

  • but I know what a carburetor is.

  • Or, you know, whatever analogy you want.

  • So with that little bit, as opposed

  • to sort of all of that Socratic cold calling

  • that I did last class, because money,

  • Fiat currency is something at the core,

  • and ledgers is at the core of a Sloan student's

  • either education or background, this a little less of the core.

  • If today's and the next couple of lectures,

  • if you can work with me then I want you to interrupt me

  • anytime you've got a question.

  • I'm not going to do much cold calling.

  • I don't want you to relax too much.

  • I still want you to do the readings the next three

  • classes.

  • But just raise your hand, stop me, say, well,

  • but what is that all about.

  • And that just sort of we can work

  • a little bit different on these next classes.

  • So, as I'm always going to be doing, consistency.

  • What are the study questions?

  • So really, what are the design features?

  • What are the key design features of this new technology,

  • blockchain.

  • And I put a few on the syllabus.

  • And we're going to go through all this today and next week.

  • Cryptography, append-only, timestamps

  • blocks, distributed consensus algorithms, and networking.

  • I list four.

  • Later in this lecture, you'll see 8 or 10 that--

  • I guess it's 10 that we're going to really dig dig into.

  • Can I just get a sense of the class and this

  • is not for Talita or Sabrina to write down

  • notes about participation.

  • Is it a decent assumption, did most or all of you

  • at least read Nakamoto's paper?

  • All right.

  • Good.

  • All right, great.

  • Just a sense, how many of you felt you got at least half

  • of it, maybe less than 2/3, but at least half of it?

  • All right, pretty good.

  • When I first read it, I was right with you.

  • So it's all right.

  • Alin you got more than half of it, right?

  • AUDIENCE: I read it five years ago, so.

  • GARY GENSLER: You read it five years ago.

  • Yeah, yeah, yeah.

  • Yeah, life choices, talk about it.

  • All right.

  • And you're taking this class.

  • Good, good.

  • So we'll go through each of those.

  • And then more specifically, we're

  • going to peel back the cryptography.

  • The two main cryptographic algorithms, or these words

  • that you'll hear sometimes, cryptographic primitives--

  • Alin, what is a cryptographic primitive?

  • AUDIENCE: Oh, it's a wild beasts.

  • There are so many of them.

  • GARY GENSLER: Yeah, but what's the two words together mean?

  • AUDIENCE: Well, that's I'm saying.

  • It could be anything.

  • It could be a hash function, could be encryption function,

  • could be a very powerful computation scheme,

  • it could be a data outsourcing scheme, could be a data access

  • privacy access.

  • GARY GENSLER: But it's anything that

  • basically protects the communication

  • in the presence of adversaries.

  • AUDIENCE: Well it's also something

  • that you can use to prove that computation was done correctly

  • on trusted servers.

  • It's not just communication, it's also computation.

  • GARY GENSLER: So communications and computation

  • that needs to be protected or verified,

  • have some form of cryptographic algorithm,

  • which happens to be called a cryptographic primitive.

  • The two main ones--

  • and there's a third one we'll talk about later

  • in the semester-- but the two main ones, hash functions,

  • just as a working knowledge of blockchain is worthy to know,

  • and we're going to get-- everybody's going to get there.

  • We're going to all get there to where

  • you have some sense of what a hash function is.

  • And then this whole concept of digital signatures,

  • which relates to asymmetric cryptography.

  • Those two are very fundamental to blockchain technology.

  • Later in the semester, we'll talk a little bit

  • about zero knowledge proofs, but they're not

  • as fundamental to the first application.

  • And so that's why they're kind of--

  • and they help make things verifiable and immutable.

  • And that's the business side, the market side.

  • Why does it matter?

  • Otherwise, like, who cares what's in the carburetor

  • if it doesn't matter?

  • And then how does this all relate to the double

  • spend problem?

  • I can cold call on this.

  • Isabella, do you remember what the double spending

  • problem was from?

  • AUDIENCE: It was when they would use the same coin,

  • I guess, and they would use it multiple places

  • and other digital wallets [INAUDIBLE]..

  • GARY GENSLER: All right.

  • So in essence, a double spend is when

  • you have a piece of information and you use it twice.

  • And we happen to call this piece of information "money,"

  • but you use it twice.

  • You can send an email to two people and that's OK.

  • I mean, it's a little embarrassing

  • if you're sending it to one friend telling them

  • you're available for dinner and the other friend

  • thought you told them you weren't available.

  • But you can still send it to two places.

  • But in the system of money, it's a critical thing

  • that you don't use it twice.

  • The readings, was the demo helpful?

  • I mean, we're going to do a lot more on that.

  • I watched that demo last November, December.

  • That was one of the first things I watched.