Bitcoin — Origins and Mechanics

Section VI: Bitcoin Framework

Army Cyber Institute

April 9, 2026

And Now, Bitcoin

  • So far, we have studied the history that led to Bitcoin, the cryptographic primitives it depends on, the principles of distributed computing, consensus protocols, and how blockchains work in permissioned systems.

  • This section develops Bitcoin as a technical system: blocks, transactions, mining, networking, and security.

In this lesson, we assemble everything we have learned so far into a coherent picture of how Bitcoin works.

The Emergence of Bitcoin

  • In 2008, trust in traditional financial intermediaries was collapsing, which sharpened interest in alternatives to bank-centered digital money.

  • Earlier digital cash systems still depended on trusted intermediaries or assumptions that did not hold on the open internet.

  • A successful internet-native cash system also needed global access and censorship resistance.

  • Double‑spending digital money was the central technical problem without a shared ledger or trusted arbiter.

Satoshi Nakamoto’s Whitepaper

  • On October 31, 2008, a paper titled Bitcoin: A Peer-to-Peer Electronic Cash System, authored by Satoshi Nakamoto, appeared on the Cryptography Mailing List.

  • The paper entered a community already debating privacy, digital cash, and whether cryptography could replace trust in centralized institutions.

  • It gained traction because it did more than criticize the old model: it offered a concrete technical design for decentralized digital cash.

The real identity behind the pseudonym Satoshi Nakamoto remains unknown today.

Bitcoin: The Mission Statement

Abstract. A purely peer-to-peer version of electronic cash would allow online payments to be sent directly from one party to another without going through a financial institution… We propose a solution to the double-spending problem using a peer-to-peer network.

Introduction. What is needed is an electronic payment system based on cryptographic proof instead of trust, allowing any two willing parties to transact directly with each other without the need for a trusted third party. Transactions that are computationally impractical to reverse would protect sellers from fraud….

Every phrase here is a design requirement: purely peer-to-peer, no trusted third party, cryptographic proof instead of trust, and computationally impractical to reverse.

Nakamoto Satoshi aimed to realize the cypherpunk vision: private, direct, censorship-resistant digital cash without trusted intermediaries.

Lessons from Precursors

Feature DigiCash (Chaum)
1980s–1990s
Hashcash (Back)
1997
b-money / bit gold
1998
E-Gold
Early 2000s
Bitcoin (Nakamoto)
2008–2009
Trust Model Centralized issuer No issuer; standalone PoW scheme Decentralized (theory) Centralized company
Double-Spend Prevention Central ledger No ledger Proposed distributed accounting, but consensus unresolved Central ledger
Scarcity / Costliness Bank-issued digital cash Computational work stamps Work-based money concepts Gold-backed balances
Point of Failure Company and issuing bank Not designed as a full payment network Consensus and implementation never operationalized Legal and operational shutdown
Bitcoin did not appear from nowhere; it assembled earlier ideas into a system designed to overcome the failures those earlier projects exposed.

Lessons from Precursors

Feature DigiCash (Chaum)
1980s–1990s
Hashcash (Back)
1997
b-money / bit gold
1998
E-Gold
Early 2000s
Bitcoin (Nakamoto)
2008–2009
Trust Model Centralized issuer No issuer; standalone PoW scheme Decentralized (theory) Centralized company Decentralized in practice
Double-Spend Prevention Central ledger No ledger Proposed distributed accounting, but consensus unresolved Central ledger
Scarcity / Costliness Bank-issued digital cash Computational work stamps Work-based money concepts Gold-backed balances
Point of Failure Company and issuing bank Not designed as a full payment network Consensus and implementation never operationalized Legal and operational shutdown
Bitcoin had to work without a central issuer or company as the system’s root of trust.

Lessons from Precursors

Feature DigiCash (Chaum)
1980s–1990s
Hashcash (Back)
1997
b-money / bit gold
1998
E-Gold
Early 2000s
Bitcoin (Nakamoto)
2008–2009
Trust Model Centralized issuer No issuer; standalone PoW scheme Decentralized (theory) Centralized company Decentralized in practice
Double-Spend Prevention Central ledger No ledger Proposed distributed accounting, but consensus unresolved Central ledger PoW consensus plus network verification
Scarcity / Costliness Bank-issued digital cash Computational work stamps Work-based money concepts Gold-backed balances
Point of Failure Company and issuing bank Not designed as a full payment network Consensus and implementation never operationalized Legal and operational shutdown
Bitcoin needed open participants to agree on one valid transaction history.

Lessons from Precursors

Feature DigiCash (Chaum)
1980s–1990s
Hashcash (Back)
1997
b-money / bit gold
1998
E-Gold
Early 2000s
Bitcoin (Nakamoto)
2008–2009
Trust Model Centralized issuer No issuer; standalone PoW scheme Decentralized (theory) Centralized company Decentralized in practice
Double-Spend Prevention Central ledger No ledger Proposed distributed accounting, but consensus unresolved Central ledger PoW consensus plus network verification
Scarcity / Costliness Bank-issued digital cash Computational work stamps Work-based money concepts Gold-backed balances PoW secures issuance and history
Point of Failure Company and issuing bank Not designed as a full payment network Consensus and implementation never operationalized Legal and operational shutdown
Proof-of-work made issuance costly and abusive behavior expensive.

Lessons from Precursors

Feature DigiCash (Chaum)
1980s–1990s
Hashcash (Back)
1997
b-money / bit gold
1998
E-Gold
Early 2000s
Bitcoin (Nakamoto)
2008–2009
Trust Model Centralized issuer No issuer; standalone PoW scheme Decentralized (theory) Centralized company Decentralized in practice
Double-Spend Prevention Central ledger No ledger Proposed distributed accounting, but consensus unresolved Central ledger PoW consensus plus network verification
Scarcity / Costliness Bank-issued digital cash Computational work stamps Work-based money concepts Gold-backed balances PoW secures issuance and history
Point of Failure Company and issuing bank Not designed as a full payment network Consensus and implementation never operationalized Legal and operational shutdown Majority attack economics (difficult)
Bitcoin was designed to avoid a single operator that regulators or attackers could easily shut down.

Lessons from Precursors

Feature DigiCash (Chaum)
1980s–1990s
Hashcash (Back)
1997
b-money / bit gold
1998
E-Gold
Early 2000s
Bitcoin (Nakamoto)
2008–2009
Trust Model Centralized issuer No issuer; standalone PoW scheme Decentralized (theory) Centralized company Decentralized in practice
Double-Spend Prevention Central ledger No ledger Proposed distributed accounting, but consensus unresolved Central ledger PoW consensus plus network verification
Scarcity / Costliness Bank-issued digital cash Computational work stamps Work-based money concepts Gold-backed balances PoW secures issuance and history
Point of Failure Company and issuing bank Not designed as a full payment network Consensus and implementation never operationalized Legal and operational shutdown Majority attack economics (difficult)
Bitcoin’s breakthrough was combining all four into one operational system.

Bitcoin, Simplified

  • Think of Bitcoin as a global append‑only ledger shared by peers.

  • Anyone can propose the next page (block) by showing work; others verify and accept.

  • The chain with the most cumulative work is the canonical history.

  • Ownership of funds is control of private keys

  • Incentives (block reward + fees) promote security and honest participation.

Nakamoto’s design rests on three core primitives for digital money: digital signatures, a public ledger, and proof-of-work.

Primitive 1: Ownership via Digital Signatures

Nakamoto defines an electronic coin as a “chain of digital signatures.”

  • To transfer a coin, the current owner (say, Alice) uses her private key to digitally sign a hash of the previous transaction plus the public key of the next owner (Bob).
  • This creates a new link in the chain of ownership.
  • Anyone can verify this chain of signatures to confirm that Alice indeed had the right to spend that coin.

The Limitation: This mechanism proves who can spend a coin, but not whether that coin was already spent somewhere else.

SignatureChain C0 Coin T1 Tx1 Mint -> Alice Sig: Mint C0->T1 T2 Tx2 Alice -> Bob Sig: Alice T1->T2 T3 Tx3 Bob -> Carol Sig: Bob T2->T3

Primitive 2: The Public Ledger via P2P Networking

To solve double-spending, the network needs a single, global history of all transactions. Nakamoto’s solution is radical transparency:

  • Public Announcement: All transactions are broadcast to all nodes on a peer-to-peer (P2P) network.
  • Blocks: Nodes collect these transactions into a “block.”
  • The New Challenge: The task shifts from verifying individual transactions to agreeing on the order of transactions. Without a central timekeeper, ordering is a hard problem.

Networks N1 N3 N1->N3 N4 N1->N4 N5 N1->N5 N1->ext1 N3->N4 N8 N3->N8 N3->ext3 N4->N5 N4->N8 N9 N4->N9 N6 N5->N6 N7 N5->N7 N10 N5->N10 N2 N2->N3 N2->N6 N2->N7 N2->ext2 N6->N8 N6->ext6 N7->N8 N7->ext7 N12 N8->N12 N9->N10 N13 N9->N13 N9->ext9 N10->N9 N11 N10->N11 N10->N11 N14 N10->N14 N10->N14 N15 N10->N15 N10->N15 N12->N13 N16 N12->N16 N12->ext12 N13->N9 N13->N14 N13->N15 N17 N13->N17 N11->N12 N11->N12 N11->N15 N11->N16 N14->N10 N14->N15 N14->N16 N18 N14->N18 N14->N18 N15->N16 N15->N16 N20 N16->N20 N16->N20 N17->N13 N17->N18 N19 N17->N19 N17->ext17 N18->N14 N18->N19 N22 N18->N22 N20->N16 N24 N20->N24 N21 N20->N21 N20->N21 N20->ext20 N19->N17 N19->N18 N19->N20 N19->N20 N23 N19->N23 N19->N23 N19->N24 N19->N24 N22->N23 N22->N24 N26 N22->N26 N28 N24->N28 N24->N28 N21->N22 N21->N23 N25 N21->N25 N21->N25 N25->N26 N27 N25->N27 N26->N27 N30 N26->N30 N26->ext26 N28->N27 N32 N28->N32 N29 N28->N29 N28->N29 N27->N28 N31 N27->N31 N27->N32 N30->N31 N30->N32 N34 N30->N34 N30->N34 N31->N32 N31->ext31 N36 N32->N36 N29->N28 N29->N30 N29->N30 N29->N31 N29->N31 N33 N29->N33 N29->N33 N29->N33 N33->N34 N35 N33->N35 N33->N35 N37 N33->N37 N34->N35 N38 N34->N38 N34->ext34 N36->N37 N40 N36->N40 N35->N36 N39 N35->N39 N35->N40 N37->N38 N37->ext37 N38->N39 N38->N40 N38->ext38 N39->N40 N39->ext39 N40->ext40

Primitive 3: Consensus via Proof-of-Work

Bitcoin orders blocks by making miners prove computational work before a new block is accepted.

  1. Build a Candidate Block: A miner gathers pending transactions from the mempool and forms a candidate block.
  2. Search for a Valid Hash: The miner changes the nonce until the block header hash falls below the difficulty target.
  3. Broadcast and Verify: The first miner with a valid proof broadcasts the block; other nodes verify it and add it to the chain.

Mempool: every node keeps a local copy of the network’s known pending transactions waiting to be included in a block.

A Practical Solution to Byzantine Generals

Recall the Byzantine Generals Problem (BGP) as a classic thought experiment in distributed computing.

  • The Problem: How can distributed participants reach agreement if some members are malicious?
  • Bitcoin’s Solution: The longest Proof-of-Work chain becomes the agreed plan. It is trusted not because of who the participants are, but because creating that chain required tremendous computational effort.

G L1->L2 A L1->L3 A L1->L4 A L1->T1 A L1->T2 A L1->T3 A L2->L1 A L2->L3 A L2->L4 A L2->T1 A L2->T2 A L2->T3 A L3->L1 A L3->L2 A L3->L4 A L3->T1 A L3->T2 A L3->T3 A L4->L1 A L4->L2 A L4->L3 A L4->T1 A L4->T2 A L4->T3 A T1->L1 R T1->L2 A T1->L3 R T1->L4 A T1->T2 R T1->T3 A T2->L1 A T2->L2 R T2->L3 A T2->L4 R T2->T1 R T2->T3 A T3->L1 R T3->L2 R T3->L3 A T3->L4 A T3->T1 A T3->T2 R L1 L1 L2 L2 L3 L3 L4 L4 T1 T1 T2 T2 T3 T3

How Double-Spending is Solved

If Bitcoin can solve the Byzantine Generals Problem in practice, it can solve double-spending by converging on one accepted transaction history:

  • The Chain: Each block includes the hash of the previous block, forming a cryptographically linked chain. Changing an earlier block would break its link to all subsequent blocks.
  • The Longest Chain Rule: By convention, all nodes treat the longest chain—the one with the most cumulative proof-of-work—as the valid history that everyone accepts.
  • The Cost of Attack: To reverse a transaction, an attacker would have to redo the proof-of-work for that block and all blocks after it, then catch up and surpass the work of the honest network.

In practice, the probability of a successful attacker catching up diminishes exponentially with each new block added on top of the transaction.

Incentives: Making Honesty Profitable

Why would anyone expend electricity and computing power to do all this work?

  1. Block Reward: The first transaction in each new block is the coinbase transaction, which creates new bitcoins and awards them to the miner who found the block. This is how new bitcoins enter circulation. As time goes on, the reward is halved.
  2. Transaction Fees: Additionally, users can include small transaction fees in their payments. These fees are collected by the miner who adds that transaction to a block.

Together, these incentives make it more profitable for a rational actor to follow the protocol than to attack it. An attack would be extraordinarily expensive, and even if successful, would likely destroy the very value the attacker is trying to steal.

Monetary Policy

  • Incentives provide security by rewarding miners for honest participation in block production.

  • Bitcoin also enforces scarcity through a hard cap of about 21 million bitcoin, limiting total issuance rather than allowing open-ended creation.

  • New bitcoin enters through the coinbase transaction, which awards the block subsidy to the miner who adds a valid block.

  • A halving cuts the block subsidy in half every 210,000 blocks, or roughly every four years.

  • Over time, miner compensation shifts away from newly issued bitcoin and toward transaction fees, tying long-run security more closely to demand for block space.

Security Model & Threats

  • Assumes majority of honest work; 51% attacker can rewrite recent history.

  • Selfish mining, eclipse attacks, network partitions are notable risks.

  • Full nodes mitigate many risks by enforcing validity and rejecting bad blocks.

  • Confirmations reduce reorg risk; fee incentives align honest behavior.

  • Security is economic and probabilistic, not absolute.

The Network Comes Alive: The First Blocks

  • January 3, 2009: The Genesis Block (Block 0) is mined by Satoshi Nakamoto.
  • January 9, 2009: Satoshi releases the first version of the Bitcoin software to the public.
  • January 12, 2009: The first Bitcoin transaction occurs – Satoshi sends 10 BTC to Hal Finney, a respected cryptographer and early cypherpunk.

This first transaction was a critical proof-of-concept, demonstrating that the system described in the whitepaper actually worked in practice.

The 10,000 BTC Pizza

  • On May 22, 2010, Laszlo Hanyecz offered 10,000 BTC on Bitcointalk for two large pizzas.

  • Another user arranged the order from a Papa John’s in Florida and had the pizzas delivered to Hanyecz.

  • Hanyecz then transferred 10,000 BTC, marking the first documented Bitcoin purchase of a physical good.

  • At the time, the transaction was worth about $41 total.

  • The event is now remembered as Bitcoin Pizza Day, a proof-of-concept that gave Bitcoin an early real-world price.

Skepticism

From its inception, Bitcoin was met with intense criticism on multiple fronts.

  • Economic Skepticism: Critics have argued that Bitcoin’s extreme price volatility made it impractical as a currency. It is often labeled a speculative bubble or even a Ponzi scheme with no intrinsic value.
  • Technical Skepticism: Many observe that Bitcoin is inefficient: it handles only a handful of transactions per second and consumes vast amounts of electricity for mining.
  • Social & Legal Skepticism: Bitcoin’s pseudonymous nature and lack of regulatory oversight makes it attractive for illicit activities (e.g., the Silk Road online marketplace), raising concerns about crime and money laundering. Bitcoin has enabled ransomware.

Benefits of Bitcoin’s Design

  • Decentralization: no single point of control/failure; open participation.

  • Censorship resistance: hard to block valid transactions; permissionless access.

  • Verifiability: anyone can run a node and independently check rules/history.

  • Predictable monetary policy: transparent issuance; 21M cap.

  • Robustness: resilient to outages/attacks; conservative governance and upgrades.

Limitations and Trade‑Offs

  • Scalability: mining difficulty and limited block size restrict throughput, while multiple confirmations add latency before a block is treated as secure.

  • Energy use: PoW consumes substantial electricity; debated but integral to security model.

  • UX & key management: self‑custody is powerful but difficult for many users.

  • Privacy: transparent ledger yields pseudonymity, not strong anonymity.

  • Protocol governance friction: new features can have slow adoption.

Bitcoin as a System

  • Bitcoin combines three primitives into one working system: digital signatures for ownership, a public ledger shared across nodes, and proof-of-work for consensus.

  • Together, these primitives let the network verify transactions, agree on their order, and resist double-spending without a central intermediary.

  • What makes Bitcoin important is not any one part alone, but the way these pieces reinforce one another through incentives, verification, and network participation.

Next lesson, we focus on Bitcoin’s two core actions: transactions and mining.

References

[1]
S. Nakamoto, “Bitcoin: A Peer-to-Peer Electronic Cash System.” Satoshi Nakamoto Institute, Oct. 31, 2008. Accessed: Sep. 12, 2025. [Online]. Available: https://cdn.nakamotoinstitute.org/docs/bitcoin.pdf
[2]
A. M. Antonopoulos, Mastering Bitcoin: Programming the open blockchain, Second edition. Sebastopol, CA: O’Reilly, 2017.
[3]
A. Back, “Hashcash - A Denial of Service Counter-Measure,” Jan. 2002, Available: http://www.hashcash.org/papers/hashcash.pdf
[4]
W. Dai, “B-money.” 1998. Available: http://www.weidai.com/bmoney.txt
[5]
N. Szabo, “Bit Gold.” Accessed: Sep. 12, 2025. [Online]. Available: https://unenumerated.blogspot.com/2005/12/bit-gold.html
[6]
U.S. Attorney’s Office, District of Maryland, “Over $56.6 Million Forfeited In E-Gold Accounts Involved In Criminal Offenses.” Accessed: Mar. 27, 2026. [Online]. Available: https://www.justice.gov/usao-md/pr/over-566-million-forfeited-e-gold-accounts-involved-criminal-offenses
[7]
Bitcoin.org Developers, “Mining (Developer Guide).” 2024. Available: https://developer.bitcoin.org/devguide/mining.html
[8]
Wired, “E-money (that’s what i want).” Accessed: Mar. 28, 2026. [Online]. Available: https://www.wired.com/1994/12/emoney/
[9]
Bitcoin.org Developers, “Transactions (Developer Guide).” 2024. Available: https://developer.bitcoin.org/devguide/transactions.html
[10]
A. Narayanan, J. Bonneau, E. Felten, A. Miller, and S. Goldfeder, Bitcoin and Cryptocurrency Technologies. Princeton University Press, 2016.
[11]
E. Heilman, A. Kendler, A. Zohar, and S. Goldberg, “Eclipse Attacks on Bitcoin’s Peer-to-Peer Network.” Accessed: Oct. 21, 2025. [Online]. Available: https://eprint.iacr.org/2015/263
[12]
M. Apostolaki, A. Zohar, and L. Vanbever, “Hijacking Bitcoin: Routing Attacks on Cryptocurrencies,” in 2017 IEEE Symposium on Security and Privacy (SP), May 2017, pp. 375–392. doi: 10.1109/SP.2017.29.
[13]
C. Stoll, L. KlaaBen, and U. Gallersdörfer, “The Carbon Footprint of Bitcoin,” SSRN Journal, 2019, doi: 10.2139/ssrn.3335781.
[14]
J. B. Sykes and N. Vanatko, “Virtual Currencies and Money Laundering: Legal Background, Enforcement Actions, and Legislative Proposals,” Congressional Research Service, Washington, D.C., CRS Report R45664.2, Mar. 2019. Available: https://www.congress.gov/crs_external_products/R/PDF/R45664/R45664.2.pdf
[15]
Coinbase, “What is Bitcoin Pizza?” Accessed: Oct. 20, 2025. [Online]. Available: https://www.coinbase.com/learn/crypto-glossary/what-is-bitcoin-pizza