Bitcoin Forum
May 08, 2024, 07:38:37 AM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
   Home   Help Search Login Register More  
Pages: [1]
  Print  
Author Topic: Scientist-devised crypto attack  (Read 1331 times)
Liquid (OP)
Hero Member
*****
Offline Offline

Activity: 826
Merit: 500


Crypto Somnium


View Profile
March 06, 2014, 04:05:13 PM
 #1

http://arstechnica.com/security/2014/03/scientist-devised-crypto-attack-could-one-day-steal-secret-bitcoin-keys/

http://eprint.iacr.org/2014/161.pdf

Bitcoin will show the world what hard money really is.
1715153917
Hero Member
*
Offline Offline

Posts: 1715153917

View Profile Personal Message (Offline)

Ignore
1715153917
Reply with quote  #2

1715153917
Report to moderator
1715153917
Hero Member
*
Offline Offline

Posts: 1715153917

View Profile Personal Message (Offline)

Ignore
1715153917
Reply with quote  #2

1715153917
Report to moderator
1715153917
Hero Member
*
Offline Offline

Posts: 1715153917

View Profile Personal Message (Offline)

Ignore
1715153917
Reply with quote  #2

1715153917
Report to moderator
"I'm sure that in 20 years there will either be very large transaction volume or no volume." -- Satoshi
Advertised sites are not endorsed by the Bitcoin Forum. They may be unsafe, untrustworthy, or illegal in your jurisdiction.
Blinken
Sr. Member
****
Offline Offline

Activity: 338
Merit: 253



View Profile
March 06, 2014, 05:11:53 PM
 #2

LOL side channel.

Yeah, I am cracking your computer by measuring the temperature fluctuations outside your house.

Bitcoin ♦♦♦ Trust in Mathematics, Not Bankers ♦♦♦
Liquid (OP)
Hero Member
*****
Offline Offline

Activity: 826
Merit: 500


Crypto Somnium


View Profile
March 07, 2014, 01:13:49 AM
 #3

So is this legit ?

Bitcoin will show the world what hard money really is.
grifferz
Full Member
***
Offline Offline

Activity: 154
Merit: 100


View Profile
March 07, 2014, 01:16:55 AM
 #4

So is this legit ?
Yes, but once an attacker has that level of access to your hardware all bets are off and for most people, bitcoin loss would be the least of their worries. Of course, big bitcoin holders might be targeted more, but really once an attacker is this close there are any number of other attacks that would be more practical.
Liquid (OP)
Hero Member
*****
Offline Offline

Activity: 826
Merit: 500


Crypto Somnium


View Profile
March 09, 2014, 08:28:45 AM
 #5

So is this legit ?
Yes, but once an attacker has that level of access to your hardware all bets are off and for most people, bitcoin loss would be the least of their worries. Of course, big bitcoin holders might be targeted more, but really once an attacker is this close there are any number of other attacks that would be more practical.

So your saying he would have to be in the same room ?

Bitcoin will show the world what hard money really is.
amspir
Member
**
Offline Offline

Activity: 112
Merit: 10


View Profile
March 09, 2014, 03:30:58 PM
 #6

So your saying he would have to be in the same room ?

The risk is that if a private key to one or more addresses is reused on a shared machine, such as in cloud computing, it is possible to determine the private key.  The researchers were able to determine the private key after 200 signings.

I would think that using disposable addresses where a private key is used to sign a transaction only once, should minimize or eliminate the risk.
FeedbackLoop
Hero Member
*****
Offline Offline

Activity: 742
Merit: 500



View Profile
March 09, 2014, 04:51:48 PM
Last edit: March 10, 2014, 04:22:25 AM by FeedbackLoop
 #7


The risk is that if a private key to one or more addresses is reused on a shared machine, such as in cloud computing, it is possible to determine the private key.  The researchers were able to determine the private key after 200 signings.


Assuming, of course, that all the electro-magnetic signal of sufficient machines in the cloud are under permanent laboratory observation with instruments carefully specified for each individual machine construction until the investigators manage to detect, attribute to the correct public key hash, and do all the necessary measurements on the 200 signings.  


I'll also note that, from the article, this is an OpenSSL (presumably temporary) weakness. Not Bitcoin's.
 
Boris-The-Blade
Full Member
***
Offline Offline

Activity: 156
Merit: 100


View Profile
March 09, 2014, 11:45:26 PM
 #8

Just have to assume anything is possible these days.
MysteryMiner
Legendary
*
Offline Offline

Activity: 1470
Merit: 1029


Show middle finger to system and then destroy it!


View Profile
March 09, 2014, 11:56:01 PM
 #9

So is this legit ?
Yes, but once an attacker has that level of access to your hardware all bets are off and for most people, bitcoin loss would be the least of their worries. Of course, big bitcoin holders might be targeted more, but really once an attacker is this close there are any number of other attacks that would be more practical.

So your saying he would have to be in the same room ?
Even closer. He wold have to run code on the same CPU.
So your saying he would have to be in the same room ?

The risk is that if a private key to one or more addresses is reused on a shared machine, such as in cloud computing, it is possible to determine the private key.  The researchers were able to determine the private key after 200 signings.

I would think that using disposable addresses where a private key is used to sign a transaction only once, should minimize or eliminate the risk.

Never ever use shared computer or cloud computing for anything. 95% of attack vectors closed.

bc1q59y5jp2rrwgxuekc8kjk6s8k2es73uawprre4j
ThirdRenaissance
Newbie
*
Offline Offline

Activity: 30
Merit: 0


View Profile
March 10, 2014, 12:09:36 AM
 #10

Is it theoretically possible to protect algorithms from side channel attacks by obfuscating their inner workings and fudging whatever signals they radiate?
amspir
Member
**
Offline Offline

Activity: 112
Merit: 10


View Profile
March 10, 2014, 12:43:30 AM
 #11

Is it theoretically possible to protect algorithms from side channel attacks by obfuscating their inner workings and fudging whatever signals they radiate?

Most likely a future update to OpenSSL
leckey
Sr. Member
****
Offline Offline

Activity: 434
Merit: 250


View Profile
March 10, 2014, 01:36:47 AM
 #12

Isn't it really just a flaw with Intel chips, rather than OpenSSL?

Taras
Legendary
*
Offline Offline

Activity: 1386
Merit: 1053


Please do not PM me loan requests!


View Profile WWW
March 10, 2014, 02:28:39 AM
 #13

 It has to be efficient, they're SCIENTISTS! Roll Eyes
Pages: [1]
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!