Course overview

How to Design Cryptographic & Blockchain Systems

46 modules
186 lessons
—
Part 1

Course Setup and the Incremental Ladder

  1. Course Setup and the Incremental LadderSign in

  2. Why "Blocks to Currencies"Sign in

  3. How to Use This CourseSign in

  4. The Incremental Ladder (Step 0 -> Step 7)Sign in

  5. The Course LensesSign in

  6. Diagram Legend and Notation TypesSign in

Part 2

Mental Models: Ledgers, States, and Blocks

  1. Mental Models: Ledgers, States, and BlocksSign in

  2. Ledger as State HistorySign in

  3. Blocks as Batched TransitionsSign in

  4. Global vs Local ViewsSign in

Part 3

Cryptographic Primitives Overview

  1. Cryptographic Primitives OverviewSign in

  2. Hash PropertiesSign in

  3. Symmetric vs AsymmetricSign in

  4. Signatures and AuthenticationSign in

Part 4

Distributed Systems Fundamentals

  1. Distributed Systems FundamentalsSign in

  2. Nodes, Messages, TimeoutsSign in

  3. Asynchrony and Impossibility (High-Level)Sign in

  4. Replicated State MachinesSign in

Part 5

Peer-to-Peer and Overlay Networks

  1. Peer-to-Peer and Overlay NetworksSign in

  2. Overlay TopologiesSign in

  3. Gossip and BroadcastSign in

  4. Discovery and ChurnSign in

Part 6

Diagramming Cryptographic & Blockchain Systems

  1. Diagramming Cryptographic & Blockchain SystemsSign in

  2. Protocol Message Sequence ChartsSign in

  3. Ledger and Block Structure DiagramsSign in

  4. Economic Flow DiagramsSign in

Part 7

Hashes, Commitments, and Integrity

  1. Hashes, Commitments, and IntegritySign in

  2. Hash Chains and Merkle TreesSign in

  3. Commitments IntuitionSign in

  4. Content Addressing and ProofsSign in

Part 8

Public-Key Cryptography and Signatures

  1. Public-Key Cryptography and SignaturesSign in

  2. Signing and VerificationSign in

  3. Addresses as Derived IdentifiersSign in

  4. Multi-Sig and Thresholds (High-Level)Sign in

Part 9

Key Management, Wallets, and Identity Models

  1. Key Management, Wallets, and Identity ModelsSign in

  2. Seeds and Hierarchical KeysSign in

  3. Custody ModelsSign in

  4. Identity and PseudonymitySign in

Part 10

Replication and Consistency

  1. Replication and ConsistencySign in

  2. Replication Styles and Failure BoundariesSign in

  3. Strong vs Eventual Consistency Under DelaySign in

  4. CAP as a Constraint Lens for LedgersSign in

Part 11

Fault Models and Adversaries

  1. Fault Models and AdversariesSign in

  2. Crash vs Byzantine FailuresSign in

  3. Honest Majority AssumptionsSign in

  4. Adversary CapabilitiesSign in

Part 12

Consensus as Log Agreement

  1. Consensus as Log AgreementSign in

  2. Classical Consensus IntuitionSign in

  3. Logs, Epochs, LeadersSign in

  4. Why Public Blockchains DifferSign in

Part 13

Overlay Networks and Node Discovery

  1. Overlay Networks and Node DiscoverySign in

  2. Peer Tables and DiscoverySign in

  3. Bootstrapping and LivenessSign in

  4. Churn and Peer ManagementSign in

Part 14

Gossip, Propagation, and Flooding Control

  1. Gossip, Propagation, and Flooding ControlSign in

  2. Gossip for Blocks and TransactionsSign in

  3. Controlling DuplicationSign in

  4. Modeling Propagation DelaySign in

Part 15

Network-Level Security and Abuse Resistance

  1. Network-Level Security and Abuse ResistanceSign in

  2. Sybil Attacks at the Network LayerSign in

  3. Eclipse, Partition, CensorshipSign in

  4. MitigationsSign in

Part 16

Transaction Models

  1. Transaction ModelsSign in

  2. UTXO Model: Inputs/Outputs and Parallel ValidationSign in

  3. Account Model: Balances, Nonces, Ordering, and ReplaySign in

  4. Trade-offs: Privacy, Complexity, and Future ScalabilitySign in

Part 17

Transaction Validation and Lifecycles

  1. Transaction Validation and LifecyclesSign in

  2. Validity Rules: Signatures, Balances, Replay Protection, and Local Acceptance vs Global FinalitySign in

  3. Fees and Mempools: Gas/Fees, Prioritization, and What Mempool Policy Really ControlsSign in

  4. Double-Spend Handling: Local Detection, Conflicts, and Why Forks Make Valid Time-DependentSign in

Part 18

Block Structure and Merkle Trees

  1. Block Structure and Merkle TreesSign in

  2. Block Headers and Metadata: Parent Links, Timestamps, Roots, and What They Commit ToSign in

  3. Merkle Proofs and SPV: Inclusion Proofs and What Light Clients Can Safely ConcludeSign in

  4. Multiple Roots and Extensions: Separating Transactions, Receipts, and State Commitments ConceptuallySign in

Part 19

Chains, Forks, and Reorganizations

  1. Chains, Forks, and ReorganizationsSign in

  2. Chain as a Tree: Competing Branches and Why "the Tip" Is an Opinion Until FinalizedSign in

  3. Temporary Forks and Orphans: Propagation Races as a Normal ConditionSign in

  4. Confirmation Depth: Probabilistic Finality and What You Can Promise at Different DepthsSign in

Part 20

Basic Chain Selection Rules

  1. Basic Chain Selection RulesSign in

  2. Longest/Heaviest Chain: Selection Rules as Incentive and Security MechanismsSign in

  3. Difficulty and Target Times: Adjusting Work/Weight and the Stability of Issuance and ThroughputSign in

  4. Attack Implications: How Selection Rules Interact With Selfish Behavior and Network DelaySign in

Part 21

Proof-of-Work (PoW)

  1. Proof-of-Work (PoW)Sign in

  2. Puzzle Design and Difficulty: Adjustable Work and Why Verification Must Be CheapSign in

  3. Mining Economics: Rewards, Fees, and Energy as Part of the Security BudgetSign in

  4. Security and Attacks (High-Level): Majority Power, Selfish Mining Intuition, and Reorg RealitiesSign in

Part 22

Proof-of-Stake (PoS)

  1. Proof-of-Stake (PoS)Sign in

  2. Validators and Selection: Stake as Weight and the Implications for MembershipSign in

  3. Slashing and Penalties: Aligning Incentives and Defining Punishable BehaviorsSign in

  4. Finality and Checkpoints: Confirmations, Finality Gadgets, and What "Reorg Resistance" MeansSign in

Part 23

BFT-Style Consensus

  1. BFT-Style ConsensusSign in

  2. PBFT-Like Rounds: Proposals, Votes, Commits and Quorum ThresholdsSign in

  3. Committees and Thresholds: Byzantine Limits and Why Committee Selection Is Security-CriticalSign in

  4. Partial Synchrony: Liveness Conditions and the Timing Assumptions Hiding Inside ProtocolsSign in

Part 24

Hybrid and Novel Consensus Designs

  1. Hybrid and Novel Consensus DesignsSign in

  2. Layering PoS and BFT: Separating Block Production from FinalizationSign in

  3. DAG-Style Protocol Intuition: Non-Linear Histories and Why They Complicate ReasoningSign in

  4. Randomness and VRFs: Leader Election, Unpredictability, and Grinding Risks at a High LevelSign in

Part 25

Security, Finality, and Fault Tolerance

  1. Security, Finality, and Fault ToleranceSign in

  2. Safety, Liveness, Finality: Defining the Guarantees Precisely Before Arguing About ThemSign in

  3. Economic Security: When Incentives Substitute for (or Weaken) Mathematical GuaranteesSign in

  4. Long-Range and "Nothing-at-Stake": Attack Classes and Why Governance and Social Recovery MatterSign in

Part 26

Execution Models and Virtual Machines

  1. Execution Models and Virtual MachinesSign in

  2. Deterministic Execution: Why "Same Input, Same Output" Must Hold Across All NodesSign in

  3. VM Design Choices: Stack vs Register Models and What They Imply for Tooling and PerformanceSign in

  4. Gas and Halting Guarantees: Metering as Denial-of-Service Prevention and Economic ControlSign in

Part 27

On-Chain State and Storage

  1. On-Chain State and StorageSign in

  2. State Commitment Structures: Trie-like State Trees and the Difference Between "State" and "History"Sign in

  3. Account Types: Contract Accounts vs Externally Owned Accounts as Security BoundariesSign in

  4. Logs/Events vs Persistent State: Indexing, Off-Chain Consumption, and AuditabilitySign in

Part 28

Contract Design Patterns

  1. Contract Design PatternsSign in

  2. Ownership and Access Control: Authorization as the Most Common Failure SurfaceSign in

  3. Pausing and Configuration: Operational Control Planes for On-Chain SystemsSign in

  4. Modularity and Composition: Call Graphs, Dependency Risks, and Upgrade PressureSign in

Part 29

Oracles and Off-Chain Integration

  1. Oracles and Off-Chain IntegrationSign in

  2. The Oracle Problem: Why External Truth Is Adversarial by DefaultSign in

  3. Push vs Pull and Aggregation: Verification Strategies and Failure ContainmentSign in

  4. Incentives and Trust: Designing Oracle Systems as Economic Protocols, Not APIsSign in

Part 30

Contract Security and Common Pitfalls

  1. Contract Security and Common PitfallsSign in

  2. Canonical Bugs: Reentrancy, Arithmetic Issues, and Authorization Mistakes as PatternsSign in

  3. MEV at Contract Level: Front-Running Dynamics and How Contract Structure Invites ExtractionSign in

  4. Audit-Friendly Design: Defense-in-Depth, Invariants, and Making Behaviors ReviewableSign in

Part 31

Scaling On-Chain: Throughput and Data

  1. Scaling On-Chain: Throughput and DataSign in

  2. Throughput Knobs: Block Size, Gas Limits, and What They Trade AgainstSign in

  3. State Growth: Pruning, Archival Models, and Why Storage Is GovernanceSign in

  4. Data Availability and Light Clients: What Must Be Available for Verification to Remain MeaningfulSign in

Part 32

Layer-2 Protocols: Channels and Rollups

  1. Layer-2 Protocols: Channels and RollupsSign in

  2. Channels: Lock-In, Update, Settle, and What Users Must AssumeSign in

  3. Optimistic vs ZK Rollups (Conceptual): Challenges vs Proofs and What Each Shifts to OperatorsSign in

  4. Security Assumptions: Trust Models and How Failures Surface to End UsersSign in

Part 33

Sharding and Parallel Execution

  1. Sharding and Parallel ExecutionSign in

  2. Sharding Choices: State Sharding vs Transaction Sharding and the Coordination CostsSign in

  3. Cross-Shard Communication: Message Passing, Receipts, and Consistency ExpectationsSign in

  4. Parallelism and Conflicts: Contention Detection and Why Independent Transactions Are Rare at ScaleSign in

Part 34

Bridges and Cross-Chain Protocols

  1. Bridges and Cross-Chain ProtocolsSign in

  2. Bridge Mechanisms: Lock-and-Mint, Burn-and-Release, and Light-Client ApproachesSign in

  3. Custodial vs Non-Custodial Bridges: Where Trust Lives and How It FailsSign in

  4. Bridge Risk Surfaces: Contract Risk, Replay, Centralization Pressure, and Operational MonitoringSign in

Part 35

Privacy in Blockchain Systems

  1. Privacy in Blockchain SystemsSign in

  2. Transparency Limits: Why Naive Ledgers Leak Structure Even Without NamesSign in

  3. Privacy Techniques: Mixers, Stealth Addresses, Confidential Transactions, and What They HideSign in

  4. Zero-Knowledge at a High Level: Shielded Pools, Proof Costs, and Integration Trade-OffsSign in

Part 36

MEV, Ordering, and Fairness

  1. MEV, Ordering, and FairnessSign in

  2. Ordering as Power: How Transaction Ordering Becomes Extractable ValueSign in

  3. MEV Patterns: Front-Running, Sandwiching, Back-Running, and Why They PersistSign in

  4. Mitigations (Conceptual): Auctions, Commit-Reveal, Encrypted Mempools, and What They Shift ElsewhereSign in

Part 37

Native Currencies and Monetary Policy

  1. Native Currencies and Monetary PolicySign in

  2. Native Coin vs Tokens: Base Asset Roles and What Must Be Special in the ProtocolSign in

  3. Issuance Schedules: Inflation, Deflation, Halvings, and Long-Term Security BudgetsSign in

  4. Economic Roles: Medium of Exchange, Store of Value, Gas Unit, and How Role Conflicts AppearSign in

Part 38

Tokens, Assets, and Representation Models

  1. Tokens, Assets, and Representation ModelsSign in

  2. Fungible and Non-Fungible Assets - Representation Choices and Their Implied InvariantsSign in

  3. Token Standards (Conceptual) - Balance Tracking, Metadata, and Interoperability ExpectationsSign in

  4. Asset Semantics - Transfer Restrictions, Ownership Meaning, and Edge CasesSign in

Part 39

Incentive Design for Validators and Users

  1. Incentive Design for Validators and UsersSign in

  2. Rewards and Fees - Block Rewards, Fee Markets, Tips, and User Behavior ShapingSign in

  3. Slashing and Incentive Compatibility - Punishments, False Positives, and Participation RiskSign in

  4. Modeling Rational Behavior - Assumptions You Must State to Claim "Secure"Sign in

Part 40

Governance, Upgrades, and DAOs

  1. Governance, Upgrades, and DAOsSign in

  2. Governance Models: Off-Chain Coordination vs On-Chain Voting and Their Failure ModesSign in

  3. Upgrades: Forks, Versioning, and What Continuity Means for Users and ContractsSign in

  4. DAO Mechanics: Treasuries, Voting, Incentives and How Governance Becomes an Attack SurfaceSign in

Part 41

Designing End-to-End Blockchain Systems

  1. Designing End-to-End Blockchain SystemsSign in

  2. Reference Architectures: Simple Coin, General Smart-Contract Chain, and App-Specific ChainSign in

  3. Decentralize vs Centralize: Choosing What Must Be Trustless and What Can Be Operationally ManagedSign in

  4. End-to-End Threat and Incentive Review: Ensuring Ledger, Consensus, Networking, Contracts, and Economics AlignSign in

Part 42

Application Domains and Use-Cases

  1. Application Domains and Use-CasesSign in

  2. Payments and Remittances: Constraints, UX Realities, and Trust BoundariesSign in

  3. DeFi, Supply Chain, Identity (High-Level): What the Ledger Adds and What It Does Not SolveSign in

  4. When Not to Use a Blockchain: Negative Criteria, Opportunity Cost, and Simpler AlternativesSign in

Part 43

Security Patterns and Threat Modeling

  1. Security Patterns and Threat ModelingSign in

  2. Attacker Models: Protocol-Level, Network-Level, Economic-Level and How They ComposeSign in

  3. Defense-in-Depth: Cryptographic, Protocol, Economic, Operational Layers and What Each Can Realistically PreventSign in

  4. Threat Modeling Templates: Turning Assumptions into Explicit Test Plans for New DesignsSign in

Part 44

Observability, Monitoring, and Operations

  1. Observability, Monitoring, and OperationsSign in

  2. Node and Network Health: Peers, Performance, Forks, and Chain Liveness IndicatorsSign in

  3. Indexing and Querying: Turning Append-Only Data into Operational Visibility and Product FeaturesSign in

  4. Incident Response: Handling Protocol Incidents, Economic Attacks, and Coordinated RemediationSign in

Part 45

Testing, Simulation, and Formal Methods

  1. Testing, Simulation, and Formal MethodsSign in

  2. Testing Layers: Unit Tests, Integration Tests, Testnets and What Each CatchesSign in

  3. Adversarial Simulation: Network Conditions, Byzantine Behavior, and Economic Stress TestingSign in

  4. Formal Methods (High-Level): What Can Be Proven About Contracts and Protocols, and Where Proofs StopSign in

Part 46

Design Checklists for New Blockchain Systems

  1. Design Checklists for New Blockchain SystemsSign in

  2. Cryptography, Consensus, and the Network Model: Choices, Assumptions, and Explicit Trade-offsSign in

  3. Tokenomics and Governance: Incentives, Upgrade Paths, and Attacker Profit ModelsSign in

  4. Interoperability and Regulatory Constraints: Upgradeability, Bridge Risk, and Operating in Real JurisdictionsSign in