Advertise with us

Author Topic: blog.oleganza.com: How to steal all coins  (Read 434 times)

0 Members and 1 Guest are viewing this topic.

Offline bitcoinforum.comTopic starter

blog.oleganza.com: How to steal all coins
« on: February 07, 2013, 10:01:28 PM »
How to steal all coins

Quote
In Bitcoin all transactions and balances are visible to everyone. If you want to spend someone else’s coins, you just need to pick any unspent transaction, figure out a secret key and make another transaction moving money to some of your addresses. How hard can it be?

First of all, all transactions use elliptic curve crypto for creating public/private key pairs (ECDSA). The idea is that it is easy to compute a public key from a private one, but very hard to do it in reverse. Unfortunately, we cannot know for sure that in the future we will not discover a relatively fast way to find private keys. Also, there is already efficient quantum algorithm to do just that (provided you have big enough quantum computer).

But ECDSA public keys are not exposed. Every publicly visible address is a hash of a public key, not the key itself. More specifically, the public key is hashed with two algorithms: RIPEMD160(SHA256(pubkey)). If you wish to spend money from any given address, you not only have to find a private key, but also find a public key which produces the exact same address. It is called “pre image attack”. (Pedantic note: if you spend coins from an address, you expose its public key, so it is one more reason not to reuse addresses, but always generate new ones for accepting payments.)

Obviously, two different hash functions are used in case one of them becomes weak to preimage attacks. Lets say, you have efficient way to find preimages for RIPEMD-160 (faster than brute force). Then, you would have to attack SHA-256 in order to find its preimage. And even if you succeed there, you will have to start searching for ECDSA private key matching the SHA-256 preimage you have just discovered.

The interesting question is why these two specific hash functions were chosen? RIPEMD160 is nice because it produces the shortest possible hash among non-broken hash functions (which makes the address as compact as possible). But I couldn’t find any definitive answer why need for SHA-256 as well, so here’s my understanding.

Both algorithms are widely used and no weaknesses were found in them yet (although, there are known weaknesses in the reduced versions of them). Moreover, SHA-256 is designed in US by NIST while RIPEMD-160 in KU Leuven university in Belgium. In other words, both functions come from very different places and were designed for different customers. This reduces the likelihood of finding the common weakness and also acts as a precaution against potential backdoor left by US or EU.

In the end, all coins are available for everyone to inspect, but each address is protected by 3 independent unique algorithms. So if there is an intentional or accidental weakness in any of them, other two are likely to remain strong.
Source: http://blog.oleganza.com/post/42523601710/how-to-steal-all-coins

 

EMERGENCY CHAIN FORK !!!!! dont move your coins

Started by bitcoinforum.com

Replies: 9
Views: 1547
Last post March 12, 2013, 04:01:40 PM
by bitcoinforum.com
Future of Casascius coins

Started by htspringer

Replies: 2
Views: 158
Last post October 04, 2013, 05:26:27 PM
by cryptoanarchist
Website for research and trading coins

Started by greatdn

Replies: 0
Views: 140
Last post November 18, 2013, 03:23:28 AM
by greatdn
Question about the Concept and History of Bit Coins

Started by eazye

Replies: 1
Views: 233
Last post November 30, 2013, 09:09:31 AM
by zagerfish
Coins to help developers

Started by Fuzzy Toozy

Replies: 0
Views: 62
Last post January 19, 2014, 01:44:01 AM
by Fuzzy Toozy