Bitcoin Forum
June 21, 2024, 11:00:43 PM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
  Home Help Search Login Register More  
  Show Posts
Pages: [1]
1  Bitcoin / Development & Technical Discussion / Re: BitCrack - A tool for brute-forcing private keys on: February 26, 2021, 11:52:52 PM
Why waste so much electricity with the brute force attack when you just need to solve a simple mathematical problem?  Grin

https://decrypt.co/59340/ancient-bitcoin-whale-just-moved-5-million
2  Bitcoin / Bitcoin Discussion / Re: 1NiNja1bUmhSoTXozBRBEtR8LeF9TGbZBN on: February 26, 2021, 11:39:51 PM
But isn't he the seller of this video? I remember when he sold me 10 bitcoins for 2 euros and 50 cents  Grin

https://www.youtube.com/watch?v=YmPg4V-YE0k
3  Bitcoin / Development & Technical Discussion / Re: One Trillion dollars maektcap: How dose it escalates technical challenges. on: February 21, 2021, 10:00:40 PM
What kind of technological challenges are you referring to?

Those hundreds of millions with of value spread out in a block's transactions are unmodifiable by the miner who mines it, because they do not have the private keys to them...

The private key is becoming less and less private...

https://billatnapier.medium.com/ecdsa-revealing-the-private-key-from-four-signed-message-two-keys-and-shared-nonces-secp256k1-5758f1258b1d
4  Bitcoin / Development & Technical Discussion / Re: Elliptic Curve Cryptography and Government Backdoors on: February 21, 2021, 03:37:41 PM
This is to highlight the fact that compared to 10 years ago the ECC algorithm presents worrying vulnerabilities.

nonsense.
this is not a vulnerability in elliptic curve cryptography. it is a weakness in some of the bad implementations of it created by bad developers. it is not even about ECC, it is about RNG.
it also has nothing to do with what your title suggests.

the standard for ECC clearly states that k must be chosen randomly. when an implantation like blockchain.info decides to use a weak one or use a crazy option such as random.org that's not the algorithm's flaw!

Dual_EC_DBRG, the random number generator OP is talking about, isn't even used by default by anyone except for some obscure RSA corp library (and that's only because NSA bribed them to do it). Not that it means anything because everybody else is either using a hash-based, HMAC-based or the block cipher based RNG, none of which have the flaw.


In Satoshi Nakamoto's day there were no vulnerabilities like the MOV Attack

https://asecuritysite.com/encryption/mir_mov

This only works if you have a second point from a generator point different from G that has the same group order as secp256k1. Since bitcoin doesn't bother with using different generator points this attack can't be done.

If you create such a backdoor then it is likely that the encryption algorithm you have chosen is a backdoor as well. I am not a mathematician but the solution to the problem of the elliptic curve can be solved even by a student in the first year of high school.

https://www.aimath.org/news/congruentnumbers/ecconnection.html#:~:text=Congruent%20numbers%20naturally%20lead%20to,%2Bb2%3D%20c2.&text=It%20is%20possible%20to%20describe%20all%20Pythagorean%20triples%20by%20a%20formula.

5  Bitcoin / Development & Technical Discussion / Re: Elliptic Curve Cryptography and Government Backdoors on: February 20, 2021, 07:55:59 PM
This is to highlight the fact that compared to 10 years ago the ECC algorithm presents worrying vulnerabilities.

nonsense.
this is not a vulnerability in elliptic curve cryptography. it is a weakness in some of the bad implementations of it created by bad developers. it is not even about ECC, it is about RNG.
it also has nothing to do with what your title suggests.

the standard for ECC clearly states that k must be chosen randomly. when an implantation like blockchain.info decides to use a weak one or use a crazy option such as random.org that's not the algorithm's flaw!

In Satoshi Nakamoto's day there were no vulnerabilities like the MOV Attack

https://asecuritysite.com/encryption/mir_mov
6  Bitcoin / Development & Technical Discussion / Re: Elliptic Curve Cryptography and Government Backdoors on: February 20, 2021, 06:17:16 PM
Assuming that the attacker generated the constants used in Dual EC pseudorandom number generator it has been known for several years that an attacker generating these constants and seeing a long enough stretch of Dual EC output bits can predict all future outputs. This could be a problem since in the very early days of Bitcoin it was common to pay to public keys (P2PK) directly?

References

https://projectbullrun.org/dual-ec/documents/dual-ec-20150731.pdf

https://services.math.duke.edu/~bray/Courses/89s-MOU/2016/Papers/BAS_Paper3_EllipticCurveCryptography.pdf

https://www.youtube.com/watch?v=-UcCMjQab4w



@Pythagoras33 for what purpose did you publish it?

This is to highlight the fact that compared to 10 years ago the ECC algorithm presents worrying vulnerabilities.

https://github.com/tintinweb/ecdsa-private-key-recovery

https://github.com/tintinweb/ecdsa-private-key-recovery/blob/master/tools/README.md

7  Bitcoin / Development & Technical Discussion / Elliptic Curve Cryptography and Government Backdoors on: February 20, 2021, 10:34:05 AM
Assuming that the attacker generated the constants used in Dual EC pseudorandom number generator it has been known for several years that an attacker generating these constants and seeing a long enough stretch of Dual EC output bits can predict all future outputs. This could be a problem since in the very early days of Bitcoin it was common to pay to public keys (P2PK) directly?

References

https://projectbullrun.org/dual-ec/documents/dual-ec-20150731.pdf

https://services.math.duke.edu/~bray/Courses/89s-MOU/2016/Papers/BAS_Paper3_EllipticCurveCryptography.pdf

https://www.youtube.com/watch?v=-UcCMjQab4w
Pages: [1]
Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!