Bitcoin Forum
May 07, 2024, 12:09:02 PM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
   Home   Help Search Login Register More  
Pages: « 1 [2]  All
  Print  
Author Topic: Did Satoshi foresee that secp256r1 was compromised?  (Read 4579 times)
aminorex
Legendary
*
Offline Offline

Activity: 1596
Merit: 1029


Sine secretum non libertas


View Profile
September 17, 2013, 02:14:12 PM
 #21

yes.

Give a man a fish and he eats for a day.  Give a man a Poisson distribution and he eats at random times independent of one another, at a constant known rate.
1715083742
Hero Member
*
Offline Offline

Posts: 1715083742

View Profile Personal Message (Offline)

Ignore
1715083742
Reply with quote  #2

1715083742
Report to moderator
1715083742
Hero Member
*
Offline Offline

Posts: 1715083742

View Profile Personal Message (Offline)

Ignore
1715083742
Reply with quote  #2

1715083742
Report to moderator
1715083742
Hero Member
*
Offline Offline

Posts: 1715083742

View Profile Personal Message (Offline)

Ignore
1715083742
Reply with quote  #2

1715083742
Report to moderator
According to NIST and ECRYPT II, the cryptographic algorithms used in Bitcoin are expected to be strong until at least 2030. (After that, it will not be too difficult to transition to different algorithms.)
Advertised sites are not endorsed by the Bitcoin Forum. They may be unsafe, untrustworthy, or illegal in your jurisdiction.
1715083742
Hero Member
*
Offline Offline

Posts: 1715083742

View Profile Personal Message (Offline)

Ignore
1715083742
Reply with quote  #2

1715083742
Report to moderator
1715083742
Hero Member
*
Offline Offline

Posts: 1715083742

View Profile Personal Message (Offline)

Ignore
1715083742
Reply with quote  #2

1715083742
Report to moderator
be4verch33se
Newbie
*
Offline Offline

Activity: 6
Merit: 0


View Profile
December 23, 2013, 06:17:39 PM
 #22

Isn't the Dual EC implementation in OpenSSL broken anyways?

http://nakedsecurity.sophos.com/2013/12/22/the-openssl-software-bug-that-saves-you-from-surveillance/

From TFA:
Quote
With this in mind, experts have been wondering how much software out there in the real world is using the Dual EC DRBG, and potentially vulnerable to cryptographic manipulation as a result.
OpenSSL, for example, one of the most widely-used encryption libraries, implements all four of the SP800-90A algorithms, ironically as part of achieving what is known as FIPS 140-2 certification.
And here is the happy ending.

Despite passing FIPS 140-2 tests many times over the years, the OpenSSL implementation of Dual EC DRBG is buggy.
Not just buggy, but totally broken and busted.

Simply put, it cannot be made to work in real-world software, and the fact that it has taken years for anyone to notice makes it reasonable to assume that no real-world software has ever even bothered to use it.
In the words of the OpenSSL Foundation itself, "We have no plans to fix this bug."
Qoheleth
Legendary
*
Offline Offline

Activity: 960
Merit: 1028


Spurn wild goose chases. Seek that which endures.


View Profile WWW
December 23, 2013, 06:55:48 PM
 #23

Isn't the Dual EC implementation in OpenSSL broken anyways?
Dual EC DRBG is a cryptographic PRNG.

It has nothing to do with ECDSA as far as I'm aware.

If there is something that will make Bitcoin succeed, it is growth of utility - greater quantity and variety of goods and services offered for BTC. If there is something that will make Bitcoin fail, it is the prevalence of users convinced that BTC is a magic box that will turn them into millionaires, and of the con-artists who have followed them here to devour them.
Pages: « 1 [2]  All
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!