Bitcoin Forum
April 16, 2024, 11:30:01 AM *
News: Latest Bitcoin Core release: 26.0 [Torrent]
 
   Home   Help Search Login Register More  
Pages: [1]
  Print  
Author Topic: Does the constant generation of bitcoin addresses clutter the blockchain?  (Read 1610 times)
Minsc (OP)
Full Member
***
Offline Offline

Activity: 210
Merit: 100


View Profile
September 12, 2011, 02:03:21 PM
 #1

Back in Spring 2010, websites used to recycle receiving addresses.  Now, at least MtGox, will generate a new one each time you receive donations.  On the client there is no way to delete or unmake a receiving address and MtGox says old ones still work.  And a lot of commerce bitcoin sites generate new addresses each time and that's what people do now.

Doesn't each new address used or not then clutter the blockchain?

1DcXvfJdeJch9uptKopte5XQarTtj5ZjpL
1713267001
Hero Member
*
Offline Offline

Posts: 1713267001

View Profile Personal Message (Offline)

Ignore
1713267001
Reply with quote  #2

1713267001
Report to moderator
1713267001
Hero Member
*
Offline Offline

Posts: 1713267001

View Profile Personal Message (Offline)

Ignore
1713267001
Reply with quote  #2

1713267001
Report to moderator
The grue lurks in the darkest places of the earth. Its favorite diet is adventurers, but its insatiable appetite is tempered by its fear of light. No grue has ever been seen by the light of day, and few have survived its fearsome jaws to tell the tale.
Advertised sites are not endorsed by the Bitcoin Forum. They may be unsafe, untrustworthy, or illegal in your jurisdiction.
1713267001
Hero Member
*
Offline Offline

Posts: 1713267001

View Profile Personal Message (Offline)

Ignore
1713267001
Reply with quote  #2

1713267001
Report to moderator
nibor
Sr. Member
****
Offline Offline

Activity: 438
Merit: 291


View Profile
September 12, 2011, 02:30:13 PM
 #2

In a word no.
Blockchain would be the same size no matter what address you used, new or old.

Intention of Bitcoin was that you used lots of different address to create a sense of anonymity even though the chain is public.

So I think we should encourage use of lots of addresses rather than discourage.

Only issue is that the client has to manage more private keys, and the interface at the moment is not great at doing that. (e.g. you can not see the address that are used for the "Change").


etotheipi
Legendary
*
expert
Offline Offline

Activity: 1428
Merit: 1093


Core Armory Developer


View Profile WWW
September 12, 2011, 09:54:58 PM
 #3

I echo the same thing as the others : there is no space savings in the blockchain if you recycle addresses.

But I wanted to add some useless information, because I just did a unique address scan of the blockchain in response to someone's request on another post.

As of around block 140,000, there are:
2,504,000 addresses referenced in the blockchain
1,510,000 unique addresses in the blockchain


Founder and CEO of Armory Technologies, Inc.
Armory Bitcoin Wallet: Bringing cold storage to the average user!
Only use Armory software signed by the Armory Offline Signing Key (0x98832223)

Please donate to the Armory project by clicking here!    (or donate directly via 1QBDLYTDFHHZAABYSKGKPWKLSXZWCCJQBX -- yes, it's a real address!)
dustintrammell
VIP
Full Member
*
Offline Offline

Activity: 156
Merit: 103


Cleverly disguised as a responsible adult.


View Profile WWW
September 12, 2011, 10:15:40 PM
 #4

Intention of Bitcoin was that you used lots of different address to create a sense of anonymity even though the chain is public.

So I think we should encourage use of lots of addresses rather than discourage.

I believe that whether or not you use new addresses for any particular transaction should be a personal choice and you shouldn't try to encourage or discourage others from doing either.  Some of us do not care at all about the pseudo-anonymity of Bitcoin.  Some of us do.

Dustin D. Trammell
Twitter: @druidian
PGP: E0DC F55C 9386 1691 A67F FB18 F6D9 5E52 FDA6 6E16
etotheipi
Legendary
*
expert
Offline Offline

Activity: 1428
Merit: 1093


Core Armory Developer


View Profile WWW
September 13, 2011, 12:37:47 AM
 #5

Quote
I believe that whether or not you use new addresses for any particular transaction should be a personal choice and you shouldn't try to encourage or discourage others from doing either.  Some of us do not care at all about the pseudo-anonymity of Bitcoin.  Some of us do.

I agree that users should make their own decisions on this matter, but they should also be made aware that each of their transactions is globally public information.  If you use the same address for everything, then anyone you ever give that address to can see every transaction you've ever made.  This is like someone being able to access all emails you've ever written just by giving them your email address.  I think most users who realize this would prefer the new-address-every-transaction.

Since the blockchain does not benefit from recycling addresses, users should not be afraid to generate new addresses if they favor any degree of anonymity.

Founder and CEO of Armory Technologies, Inc.
Armory Bitcoin Wallet: Bringing cold storage to the average user!
Only use Armory software signed by the Armory Offline Signing Key (0x98832223)

Please donate to the Armory project by clicking here!    (or donate directly via 1QBDLYTDFHHZAABYSKGKPWKLSXZWCCJQBX -- yes, it's a real address!)
2112
Legendary
*
Offline Offline

Activity: 2128
Merit: 1065



View Profile
September 13, 2011, 01:15:36 AM
 #6

I believe that whether or not you use new addresses for any particular transaction should be a personal choice and you shouldn't try to encourage or discourage others from doing either.  Some of us do not care at all about the pseudo-anonymity of Bitcoin.  Some of us do.
This is a weak and not well thought out statement. Reuse of addresses could make it easier to attack the elliptic curve crytography that underpins the security of particular bitcoins.

So the choice isn't just privacy vs. no privacy. The additional influential factor is: Do we believe that the reuse of the points on the elliptic curve weakens the resistance against the possible cryptological attack on private keys?

I mean at one time WEP was considered "Wired-Equivalent Privacy" wiith no hint of sarcasm. Are you willing to make the same statements about ECC?

Please comment, critique, criticize or ridicule BIP 2112: https://bitcointalk.org/index.php?topic=54382.0
Long-term mining prognosis: https://bitcointalk.org/index.php?topic=91101.0
Minsc (OP)
Full Member
***
Offline Offline

Activity: 210
Merit: 100


View Profile
September 13, 2011, 01:58:39 AM
 #7

Why can't the bitcoin software delete old bitcoin addresses?  Old versions and the current could not delete them.

1DcXvfJdeJch9uptKopte5XQarTtj5ZjpL
bitrick
Member
**
Offline Offline

Activity: 64
Merit: 140


View Profile
September 13, 2011, 01:59:54 AM
 #8

This is a weak and not well thought out statement. Reuse of addresses could make it easier to attack the elliptic curve crytography that underpins the security of particular bitcoins.

Was that first period meant to be a colon?
etotheipi
Legendary
*
expert
Offline Offline

Activity: 1428
Merit: 1093


Core Armory Developer


View Profile WWW
September 13, 2011, 02:59:55 AM
 #9

Quote
This is a weak and not well thought out statement.  Reuse of addresses could make it easier to attack the elliptic curve crytography that underpins the security of particular bitcoins.

This is not a well-researched statement.  There is no reduction in security of ECDSA by using the same key on multiple signatures.   If there was, then no one would use ECDSA, as most other applications for it cannot accommodate new keys for every exchange.

The only known weakness of ECDSA in this regard is if the same random number is used in the signature algorithm on two different signed messages.  Of course, with 2^256 possible random numbers to apply here, it just doesn't happen.  As such, ECDSA is an extraordinarily secure signature algorithm, proven to be as difficult as the elliptic curve discrete logarithm problem.  The only thing that will compromise ECDSA (or any other asymmetric encryption such as RSA) is going to be quantum computers or an extraordinary breakthrough in mathematics.  Luckily, there are potentially decades between now and when QCs will be good enough to hack 256-bit ECDSA.  A breakthrough in mathematics that solves the discrete logarithm problem is going to break all internet security not just bitcoin.

BTW, WEP was a joke.  The creators can name it whatever they want, it doesn't mean that the community of informed people actually believed it.  I studied WEP in my cryptography class, and there are half a dozen security holes clear as day if you know what you're looking for.  It is an insult to cryptographers/mathematicians to, in any way, compare WEP to elliptic curve cryptography.  

Founder and CEO of Armory Technologies, Inc.
Armory Bitcoin Wallet: Bringing cold storage to the average user!
Only use Armory software signed by the Armory Offline Signing Key (0x98832223)

Please donate to the Armory project by clicking here!    (or donate directly via 1QBDLYTDFHHZAABYSKGKPWKLSXZWCCJQBX -- yes, it's a real address!)
2112
Legendary
*
Offline Offline

Activity: 2128
Merit: 1065



View Profile
September 13, 2011, 04:19:57 AM
 #10

This is not a well-researched statement.  There is no reduction in security of ECDSA by using the same key on multiple signatures.   If there was, then no one would use ECDSA, as most other applications for it cannot accommodate new keys for every exchange.
[...]
It is an insult to cryptographers/mathematicians to, in any way, compare WEP to elliptic curve cryptography.  
I fully agree with you that ECDSA is mathematically sound. And comparing it to WEP was an insult.

But I will disagree with you from the standpoint of implementation engineering. In my career I was involved in several fracas where a mathematically sound idea got corrupted by the cargo-cult style of its implementation in software or hardware. Side-channels are hard to detect, and the way the current Satoshi bitcoin client development is progressing, I will probably be willing to bet a small sum on an interesting crypto-snafu that's going to happen in some of its branches.

The above isn't a mathematical theorem, it is my hunch based on past experience with implementations of patented cryptographic methods. I have signed at least two NDAs related to the above, as of now I don't remember if they had already expired.

Please comment, critique, criticize or ridicule BIP 2112: https://bitcointalk.org/index.php?topic=54382.0
Long-term mining prognosis: https://bitcointalk.org/index.php?topic=91101.0
kjj
Legendary
*
Offline Offline

Activity: 1302
Merit: 1024



View Profile
September 13, 2011, 05:05:11 AM
 #11

This is not a well-researched statement.  There is no reduction in security of ECDSA by using the same key on multiple signatures.   If there was, then no one would use ECDSA, as most other applications for it cannot accommodate new keys for every exchange.
[...]
It is an insult to cryptographers/mathematicians to, in any way, compare WEP to elliptic curve cryptography.  
I fully agree with you that ECDSA is mathematically sound. And comparing it to WEP was an insult.

But I will disagree with you from the standpoint of implementation engineering. In my career I was involved in several fracas where a mathematically sound idea got corrupted by the cargo-cult style of its implementation in software or hardware. Side-channels are hard to detect, and the way the current Satoshi bitcoin client development is progressing, I will probably be willing to bet a small sum on an interesting crypto-snafu that's going to happen in some of its branches.

The above isn't a mathematical theorem, it is my hunch based on past experience with implementations of patented cryptographic methods. I have signed at least two NDAs related to the above, as of now I don't remember if they had already expired.

I've had this exact same debate on these forums already.  2112 is right about the keys.

We are, ahem, sure that ECDSA has no weaknesses against private key reuse.  But it is also a bad idea to reuse private keys, just because.  It is just a tiny little bit bad of an idea.  It is incredibly unlikely to ever be a problem.  But throughout history, cryptographic system breaches in the real world have always been facilitated by key reuse.

People should be free to do whatever they want, but they should understand that reusing keys results in a slight decrease in overall security.  The decrease might be infinitesimal, and it probably is, but it is still a decrease.

17Np17BSrpnHCZ2pgtiMNnhjnsWJ2TMqq8
I routinely ignore posters with paid advertising in their sigs.  You should too.
etotheipi
Legendary
*
expert
Offline Offline

Activity: 1428
Merit: 1093


Core Armory Developer


View Profile WWW
September 13, 2011, 11:18:22 PM
 #12

First, I wanted to make sure that there was a differentiation between WEP and ECC, as WEP was a joke of a security protocol, and ECC is blessed by the NSA in Crypto Suite B.  The two protocols are in different galaxies.  A crypto-algorithm needs to be rock-f***ing-solid to get NIST and NSA approval (barring all conspiracy theories). 

Second, I recognize that there could be implementation issues with ECDSA in BTC that makes it less than 100.0000% of the theoretical security.  But the kinds of side-channel attacks in this environment are extremely limited.  Messages are signed on demand and the inputs to the signings are very specific, limiting plaintext injection attacks.   The number of messages ever signed by a single key would be so low and spread out, that timing attacks would never get enough samples to be useful.  Most other attacks would have to have a level of access to the computer that is already game-over for the regular user.   I would argue that the biggest risk would probably be the random number generator. 

Third, I would argue that the security decrease of a perfectly-implemented ECC protocol using the same key for two messages is so negligible, it should have no bearing on one's decision to recycle keys.  Bitcoin isn't the only system in the world that uses ECDSA, and most other systems don't get the luxury of changing their keys after every exchange.  In fact, using ECDSA for authentication isn't very useful if you have to send a new public key every time, as you would open yourself up to MITM attacks -- you want to send and thoroughly verify public keys once, and then use those as your identity going forward.  It is for this purpose that the NSA/NIST has blessed ECDSA, and probably one of the reasons the algorithm was chosen for BTC (not for recycling keys, but because it's so respected).

I'm interested to hear of feasible side-channel attacks I neglected to consider, but I'm not convinced that there is a tangible threat.  People with millions of dollars in BTC might be motivated to use new keys every time because it's good practice, but it's misleading to suggest that somehow the average user is compromising their own security by recycling keys.

Founder and CEO of Armory Technologies, Inc.
Armory Bitcoin Wallet: Bringing cold storage to the average user!
Only use Armory software signed by the Armory Offline Signing Key (0x98832223)

Please donate to the Armory project by clicking here!    (or donate directly via 1QBDLYTDFHHZAABYSKGKPWKLSXZWCCJQBX -- yes, it's a real address!)
2112
Legendary
*
Offline Offline

Activity: 2128
Merit: 1065



View Profile
September 13, 2011, 11:32:07 PM
 #13

I'm interested to hear of feasible side-channel attacks I neglected to consider,
Non-random random number generator.

Please comment, critique, criticize or ridicule BIP 2112: https://bitcointalk.org/index.php?topic=54382.0
Long-term mining prognosis: https://bitcointalk.org/index.php?topic=91101.0
ArtForz
Sr. Member
****
Offline Offline

Activity: 406
Merit: 257


View Profile
September 14, 2011, 12:45:15 AM
 #14

I'm interested to hear of feasible side-channel attacks I neglected to consider,
Non-random random number generator.
Iirc the current implementation uses openssls default crypto RNG, so should be decently secure unless a debian maintainer comes by. *ducks*

bitcoin: 1Fb77Xq5ePFER8GtKRn2KDbDTVpJKfKmpz
i0coin: jNdvyvd6v6gV3kVJLD7HsB5ZwHyHwAkfdw
Minsc (OP)
Full Member
***
Offline Offline

Activity: 210
Merit: 100


View Profile
September 17, 2011, 12:18:02 AM
 #15

What would happen if someone goes and constantly generates new addresses as some kind of attack on the network?  Would they eventually usurp most possible network addresses or get some other person's address and potentially usurp their payments?

1DcXvfJdeJch9uptKopte5XQarTtj5ZjpL
Gavin Andresen
Legendary
*
qt
Offline Offline

Activity: 1652
Merit: 2216


Chief Scientist


View Profile WWW
September 17, 2011, 03:44:40 AM
 #16

What would happen if someone goes and constantly generates new addresses as some kind of attack on the network?  Would they eventually usurp most possible network addresses or get some other person's address and potentially usurp their payments?

No.

There are 1,461,501,637,330,902,918,203,684,832,716,283,019,655,932,542,976 possible bitcoin addresses.

If your calculator can handle numbers that big, you can play around with how long it would take to try generate one quadrillionth of them if you could generate a trillion per second.

(I get an answer of a bit over 46 trillion years)

How often do you get the chance to work on a potentially world-changing project?
2112
Legendary
*
Offline Offline

Activity: 2128
Merit: 1065



View Profile
September 17, 2011, 08:35:43 PM
 #17

Sorry for the belated post.

Iirc the current implementation uses openssls default crypto RNG, so should be decently secure unless a debian maintainer comes by. *ducks*
ArtForz certainly has a sick & twisted sense of humor, in the superlative sense of those words. If there are any readers for whom the joke was too insidery, here's the link to the explanation:

http://digitaloffense.net/tools/debian-openssl/

Please comment, critique, criticize or ridicule BIP 2112: https://bitcointalk.org/index.php?topic=54382.0
Long-term mining prognosis: https://bitcointalk.org/index.php?topic=91101.0
2112
Legendary
*
Offline Offline

Activity: 2128
Merit: 1065



View Profile
September 17, 2011, 09:10:34 PM
 #18

Oh, and one more belated post. The quote is about the "forum" users but it is unfortunately applicable to many of the wider group of "bitcoin users and developers". The quote is somewhat inflamatory and offensive, but the offense is aimed at those, who won't believe that sticking finngers into a fire will hurt until they try it themselves.

https://bitcointalk.org/index.php?topic=43858.msg523997#msg523997

I have to believe that one or more of the following three things are true: 1) these people are paid to be here, 2) Bitcoin threatens their very manner of existence in some way, or 3) these people operate with a totally different set of values than the rest of us.

You missed one...

4) Some people who were interested in Bitcoin have seen it attract crowds of gullible fucking lunatics who queue up to be scammed again and again and again. They tried pointing out the stupidity, wishful thinking and maybe even predicted some of the incessant chain of cluster-fucks that more-or-less defines the "bitcoin ecosystem". About the only thing left to do is try and get a laugh out of it.

Please comment, critique, criticize or ridicule BIP 2112: https://bitcointalk.org/index.php?topic=54382.0
Long-term mining prognosis: https://bitcointalk.org/index.php?topic=91101.0
Pages: [1]
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!