Section I: Introduction
April 9, 2026
Scenario: You are a group that shares a sensitive secret. However, an “Insider” has infiltrated your ranks. You must identify them before they figure out the secret.
The Rules:
Trust is the set of explicit assumptions and dependencies about an entity that a system’s security properties rely on.
Where trust “lives” in practice:
Question: How can loyal actors reach reliable agreement despite malicious behavior?
Problem Statement: A group of distributed actors (generals) must agree on a single plan (attack/retreat), but some actors (traitors) or communication channels may be faulty and actively malicious.
Goal (Interactive Consistency):
The Impossibility Result: With oral (unauthenticated) messages, a solution is only possible if the total number of generals, \(n\), is strictly greater than three times the number of traitors, \(m\). \[n > 3m \text{ or } n \ge 3m + 1\]
Note: this presentation slightly adapts the original 1982 formulation by removing the hierarchical Commander/Lieutenant dynamic to better reflect flat, peer-to-peer blockchain networks.
Trust is an Engineering Assumption: In secure systems, trust is not a feeling; it’s a documented dependency.
Centralized Trust requires delegated third-parties.
Decentralized Trust requires a mechanism for forming consensus.
The Byzantine Generals Problem is the foundational challenge of reaching agreement in the presence of malicious actors. The solution depends on the assumptions you can make (e.g., unforgeable signatures).

Trust and Distributed Systems: Foundations for Blockchain — Army Cyber Institute — April 9, 2026