Bitcoin Forum
May 03, 2024, 09:58:26 PM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
   Home   Help Search Login Register More  
Pages: [1]
  Print  
Author Topic: Checkpoints do protect Bitcoin, don't they?  (Read 711 times)
Come-from-Beyond (OP)
Legendary
*
Offline Offline

Activity: 2142
Merit: 1009

Newbie


View Profile
September 12, 2013, 08:41:41 PM
 #1

Just an idea... What if NSA someone is able to produce block data that have a particular hash (collisions)? Is it possible to rewrite the blockchain starting from the block 1? An attacker just has to find blocks with the same hashes to bypass checkpointing... Because I assume that the attacker knows a backdoor in SHA-256, he can "generate" blocks very very quickly.
1714773506
Hero Member
*
Offline Offline

Posts: 1714773506

View Profile Personal Message (Offline)

Ignore
1714773506
Reply with quote  #2

1714773506
Report to moderator
The network tries to produce one block per 10 minutes. It does this by automatically adjusting how difficult it is to produce blocks.
Advertised sites are not endorsed by the Bitcoin Forum. They may be unsafe, untrustworthy, or illegal in your jurisdiction.
1714773506
Hero Member
*
Offline Offline

Posts: 1714773506

View Profile Personal Message (Offline)

Ignore
1714773506
Reply with quote  #2

1714773506
Report to moderator
1714773506
Hero Member
*
Offline Offline

Posts: 1714773506

View Profile Personal Message (Offline)

Ignore
1714773506
Reply with quote  #2

1714773506
Report to moderator
DeathAndTaxes
Donator
Legendary
*
Offline Offline

Activity: 1218
Merit: 1079


Gerald Davis


View Profile
September 12, 2013, 08:46:57 PM
 #2

Sure.  However if SHA-2 can be trivially preimaged then essentially everything from secure communications, to your Bitcoin address, to SSL to password hash tables are also useless.  Since if that happens it is pretty much game over it probably doesn't warrant a backup however there is nothing that requires checkpoints be SHA-2 hashes or even a single hash.  You could store the RIPEMD-160, WHIRLPOOL, and SHA-3 hashes of checkpointed blocks and for a node to accept a block as valid it needs to not only have the proper difficulty SHA-2 has but much the three stored checkpoint hashes as well.

Still like I said if SHA-2 is subject to that kind of preimage at will attack well it probably doesn't matter.  It would be like asking if an attacker was immortal, could destroy enemies with his mind, and teleport at will would national armies still be effective?  

Come-from-Beyond (OP)
Legendary
*
Offline Offline

Activity: 2142
Merit: 1009

Newbie


View Profile
September 12, 2013, 08:56:31 PM
 #3

You could store the RIPEMD-160, WHIRLPOOL, and SHA-3 hashes of checkpointed blocks and for a node to accept a block as valid it needs to not only have the proper difficulty SHA-2 has but much the three stored checkpoint hashes as well.

What approach is used in your Satoshi's client? Only SHA-256?
DeathAndTaxes
Donator
Legendary
*
Offline Offline

Activity: 1218
Merit: 1079


Gerald Davis


View Profile
September 12, 2013, 08:57:58 PM
 #4

You could store the RIPEMD-160, WHIRLPOOL, and SHA-3 hashes of checkpointed blocks and for a node to accept a block as valid it needs to not only have the proper difficulty SHA-2 has but much the three stored checkpoint hashes as well.

What approach is used in your Satoshi's client? Only SHA-256?

Yes.  It stores the blockhash used by the network for validating difficulty (mining and all that).  It doesn't have to.  It is just a client side check.  Hell you could make the checkpoints MD5 if you wanted to.
Come-from-Beyond (OP)
Legendary
*
Offline Offline

Activity: 2142
Merit: 1009

Newbie


View Profile
September 12, 2013, 09:00:03 PM
 #5

Thank you.
gmaxwell
Moderator
Legendary
*
expert
Offline Offline

Activity: 4158
Merit: 8382



View Profile WWW
September 12, 2013, 09:02:43 PM
 #6

Bitcoin is non-functional if you can compute second pre-images of SHA256^2 which look like valid blocks or valid transactions.

Checkpoints do not and cannot protect from that.

But thats a fairly ridiculous supposition: Even if we use MD5 it wouldn't currently be possible to do that.

Hash algorithms are not brittle like asymmetric crypto, when they fail it is not a complete failure.
Pages: [1]
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!