Bitcoin Forum
May 02, 2024, 01:14:20 AM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
   Home   Help Search Login Register More  
Pages: [1]
  Print  
Author Topic: Seed entropy  (Read 1064 times)
pythonista (OP)
Newbie
*
Offline Offline

Activity: 35
Merit: 0


View Profile
November 10, 2013, 12:32:35 AM
 #1

As I understand it, Electrum uses 128 bits of entropy for its random seed generation, whilst the total space of bitcoin addresses is 256 bits. So by generating addresses using Electrum, you have already vastly reduced (by 2^128) the search space of addresses to perform a brute force attack. Am I understanding this correctly? Electrum is great but this has always worried me.

Not so long ago there was an attack on android wallets because the random number generator was broken. Could something similar happen here?
Activity + Trust + Earned Merit == The Most Recognized Users on Bitcointalk
Advertised sites are not endorsed by the Bitcoin Forum. They may be unsafe, untrustworthy, or illegal in your jurisdiction.
1714612460
Hero Member
*
Offline Offline

Posts: 1714612460

View Profile Personal Message (Offline)

Ignore
1714612460
Reply with quote  #2

1714612460
Report to moderator
1714612460
Hero Member
*
Offline Offline

Posts: 1714612460

View Profile Personal Message (Offline)

Ignore
1714612460
Reply with quote  #2

1714612460
Report to moderator
1714612460
Hero Member
*
Offline Offline

Posts: 1714612460

View Profile Personal Message (Offline)

Ignore
1714612460
Reply with quote  #2

1714612460
Report to moderator
DeathAndTaxes
Donator
Legendary
*
Offline Offline

Activity: 1218
Merit: 1079


Gerald Davis


View Profile
November 10, 2013, 12:35:15 AM
 #2

ECDSA 256 bit key only has 128 bits of security.  Public key systems generally need larger keys to deliver the same key strength as symmetric encryption.  

The same thing applies to hashing algorithms.  For collisions and second pre-image resistance the bit strength of a hashing algorithm is half that of the digest length for 128 bits for SHA-256 and 80 bits for RIPEMD-160.

So there is no reduction in bits strength.  Even if there was (assume Bitcoin used 512 bit ECDSA keys), 128 bit simply can't be brute forced, not at any cost, and not in any useful timeframe so any reduction would be academic at best.  

Public key systems are more likely to be degraded in the future (due to mathematical relationship between the public and private key) and thus they are "hedged" by using larger key stengths to provide a "cushion" against improved cryptoanalysis.
ThomasV
Moderator
Legendary
*
Offline Offline

Activity: 1896
Merit: 1353



View Profile WWW
November 12, 2013, 07:13:50 AM
 #3

ECDSA 256 bit key only has 128 bits of security.  Public key systems generally need larger keys to deliver the same key strength as symmetric encryption.  

exactly. for technical details, see the pdf at http://ecc-challenge.info/

Electrum: the convenience of a web wallet, without the risks
Pages: [1]
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!