Back to Full Curriculum
CY-EL4Semester 74 (3-0-2)Elective

Blockchain & Decentralized Identity

Distributed ledger technology principles, Cryptographic hash functions (SHA-256, Keccak), Digital signatures (ECDSA, EdDSA), Merkle trees and Patricia tries, Consensus mechanisms (PoW, PoS, PBFT, Tendermint), Byzantin...

Syllabus

01

Unit 1: Blockchain Fundamentals and Cryptography

Distributed ledger technology principles, Cryptographic hash functions (SHA-256, Keccak), Digital signatures (ECDSA, EdDSA), Merkle trees and Patricia tries, Consensus mechanisms (PoW, PoS, PBFT, Tendermint), Byzantine Generals Problem, 51% attacks and chain reorganizations, Blockchain trilemma (decentralization, security, scalability).

02

Unit 2: Smart Contracts and Ethereum Ecosystem

EVM architecture and gas model, Solidity programming (contracts, modifiers, events), Smart contract vulnerabilities (reentrancy, integer overflow, front-running), Formal verification (Mythril, Slither, Certora), ERC standards (20, 721, 1155, 4337 account abstraction), Layer 2 scaling (Optimism, Arbitrum, zkSync), Oracles (Chainlink, Band Protocol).

03

Unit 3: Decentralized Identity (DID) Standards

Self-Sovereign Identity (SSI) principles, DID method specification (did:ethr, did:key, did:web), Verifiable Credentials (VC) and Presentations (VP) data model, W3C standards (DID Core, VC Data Model), Decentralized Identifiers resolution, Issuer/Holder/Verifier model, Zero-knowledge proofs for selective disclosure.

04

Unit 4: DID Ecosystems and Interoperability

DIDComm protocol for secure messaging, DIF standards (Universal Resolver, Sidetree protocol), Hyperledger Indy/Aries for permissioned identity, uPort/SeraphId implementations, Verifiable Data Registries (VDRs), Revocation and expiration handling (status registries), Cross-chain identity (Polkadot, Cosmos IBC).

05

Unit 5: Blockchain Security and Privacy

51% attacks mitigation, Eclipse attacks, Smart contract auditing methodologies, Flash loan attacks and MEV, Privacy-preserving techniques (zk-SNARKs, Bulletproofs, Mimblewimble), Confidential transactions, Threshold signatures and MPC wallets, Quantum threats (lattice-based crypto, hash-based signatures), Regulatory compliance (MiCA, travel rule).