Abstract
Blockchain is a distributed ledger, which is protected against malicious modifications by means of cryptographic tools, e.g. digital signatures and hash functions. One of the most prominent applications of blockchains is cryptocurrencies, such as Bitcoin. In this work, we consider a particular attack on wallets for collecting assets in a cryptocurrency network based on brute-force search attacks. Using Bitcoin as an example, we demonstrate that if the attack is implemented successfully, a legitimate user is able to prove that fact of this attack with a high probability. We also consider two options for modification of existing cryptocurrency protocols for dealing with this type of attacks. First, we discuss a modification that requires introducing changes in the Bitcoin protocol and allows diminishing the motivation to attack wallets. Second, an alternative option is the construction of special smart-contracts, which reward the users for providing evidence of the brute-force attack. The execution of this smart-contract can work as an automatic alarm that the employed cryptographic mechanisms, and (particularly) hash functions, have an evident vulnerability.
Supported by the Russian Foundation for Basic Research (18-37-20033).
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Swan, M.: Blockchain: Blueprint for a New Economy. O’Reilly Media Inc., Sebastopol (2015)
White, J.H.: The blockchain: a gentle four page introduction, arXiv:1612.06244
Bernstein, D.J., Lange, T.: Post-quantum cryptography. Nature 549, 188–194 (2017)
Schneier, B.: Applied Cryptography. John Wiley & Sons, New York (1996)
Gilbert, H., Handschuh, H.: Security analysis of SHA-256 and sisters. In: Matsui, M., Zuccherato, R.J. (eds.) SAC 2003. LNCS, vol. 3006, pp. 175–193. Springer, Heidelberg (2004). https://doi.org/10.1007/978-3-540-24654-1_13
Nakamoto S.: Bitcoin: A Peer-to-Peer Electronic Cash System (2008)
Miraz, M.H., Ali, M.: Applications of blockchain technology beyond cryptocurrency. AETiC 2, 1–6 (2018)
Shor, P.W.: Algorithms for quantum computation: discrete log and factoring. SIAM J. Comput. 26, 1484 (1997)
Grover, L.K.: A fast quantum mechanical algorithm for database search. In: Proceedings of 28th Annual ACM Symposium on the Theory of Computing, p. 212. ACM, New York (1996)
Fedorov, A.K., Kiktenko, E.O., Lvovksy, A.I.: Quantum computers put blockchain security at risk. Nature 563, 465–467 (2018)
Aggarwal, D., Brennen, G.K., Lee, T., Santha, M., Tomamichel, M.: Quantum attacks on Bitcoin, and how to protect against them. Ledger 3, 68–90 (2018)
Large Bitcoin Collider. https://lbc.cryptoguru.org/. Accessed 14 Apr 2019
Li, X., Jiang, P., Chen, T., Luo, X., Wen, Q.: A survey on the security of blockchain systems. Future Gener. Comput. Syst. (2017). https://www.sciencedirect.com/science/article/pii/S0167739X17318332?via=ihub
Moubarak, J., Filiol, E., Chamoun, M.: On blockchain security and relevant attacks. In: IEEE Middle East and North Africa Communications Conference (MENACOMM), Jounieh, 2018, pp. 1–6 (2018)
Vanstone, S.: Responses to NIST proposal. Commun. ACM 35, 50–52 (1992)
Secp256k1 standard for ECDSA. https://en.bitcoin.it/wiki/Secp256k1. Accessed 11 Apr 2019
Base58Check encoding description. https://en.bitcoin.it/wiki/Base58Check_encoding. Accessed 11 Apr 2019
Koblitz, N., Menezes, A.J.: The random oracle model: a twenty-year retrospective. Des. Codes Cryptogr. 77, 587–610 (2015)
Feller, W.: An Introduction to Probability Theory and Its Applications, vol. 1, 3rd edn. Wiley, USA (1968)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this paper
Cite this paper
Kiktenko, E.O., Kudinov, M.A., Fedorov, A.K. (2019). Detecting Brute-Force Attacks on Cryptocurrency Wallets. In: Abramowicz, W., Corchuelo, R. (eds) Business Information Systems Workshops. BIS 2019. Lecture Notes in Business Information Processing, vol 373. Springer, Cham. https://doi.org/10.1007/978-3-030-36691-9_20
Download citation
DOI: https://doi.org/10.1007/978-3-030-36691-9_20
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-36690-2
Online ISBN: 978-3-030-36691-9
eBook Packages: Computer ScienceComputer Science (R0)