Analysis of Cryptographic Protection of the Bitcoin Core Cryptographic Wallet

被引:0
作者
Semyanov, P. V. [1 ]
Grezina, S. V. [1 ]
机构
[1] Peter Great St Petersburg Polytech Univ, St Petersburg 195251, Russia
关键词
Bitcoin Core cryptocurrency wallet; cryptocurrency wallet encryption; changing the encryption key; attack on the Bitcoin Core wallet; brute-force attacks on the GPU;
D O I
10.3103/S0146411623080278
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This article discusses the security of implementing encryption for the Bitcoin Core cryptocurrency wallet. Particular attention is paid to aspects of the practical use of cryptographic algorithms when encrypting the wallet.dat file with a password. Practical resistance to brute-force attacks using parallel computing on GPUs is also considered. It is discovered that Bitcoin Core does not implement changing the encryption key for the user's private keys. This implementation makes it possible to carry out a second attack on the wallet without knowing the new password, if it has already been compromised previously. Changes to encryption algorithms are also been proposed to make brute-force attacks more difficult on the GPU.
引用
收藏
页码:914 / 921
页数:8
相关论文
共 11 条
  • [1] Al Saffar N.F.H., 2014, Int. J. Comput. Appl, V108, P39, DOI [10.5120/19028-0047, DOI 10.5120/19028-0047]
  • [2] github, Bitcoin Core integration/staging tree
  • [3] Housley Russ, 2009, RFC 5652, DOI [10.17487/RFC5652, DOI 10.17487/RFC5652]
  • [4] Leboeuf K., 2012, GPU and ASIC acceleration of elliptic curve scalar point multiplication
  • [5] Methods of Protecting Self-Organizing Networks Against Attacks on Traffic Routing
    Moskvin, D. A.
    Ivanov, D. V.
    [J]. AUTOMATIC CONTROL AND COMPUTER SCIENCES, 2015, 49 (08) : 745 - 750
  • [6] Moskvin D.A., 2010, Bezop. Inf. Tekhnol, V17, P95
  • [7] Fast unified elliptic curve point multiplication for NIST prime curves on FPGAs
    Wu, Tao
    Wang, Ruomei
    [J]. JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2019, 9 (04) : 401 - 410
  • [8] Zbitnev S.I., 2005, Scalar multiplication algorithms in a group of points of elliptic curve and some of their modifications
  • [9] Protection of Wi-Fi network users against rogue access points
    Zegzhda D.P.
    Moskvin D.A.
    Dakhnovich A.D.
    [J]. Automatic Control and Computer Sciences, 2017, 51 (8) : 978 - 984
  • [10] Modelling Artificial Immunization Processes to Counter Cyberthreats
    Zegzhda, Dmitry
    Pavlenko, Evgeny
    Aleksandrova, Elena
    [J]. SYMMETRY-BASEL, 2021, 13 (12):