Original title: "Further exploration of random risks in Bitcoin signatures" Original source: Babbitt As we all know, everyone should know how important the random k value is when signing Bitcoin transactions. We can even say that the randomness of the k value is as important as the randomness of the private key. Now let's explore this topic in more depth. An insecure random number generator may cause repeated k values (and of course repeated r values), which may lead to the disclosure of private keys. So it should be okay to ensure that k values are not repeated, right? This statement is not very rigorous, because "confidential and unique" actually means to be as "real" random as possible, or at least cryptographically secure randomness, otherwise how can we talk about "confidential and unique"? Even the RFC6979 specification can be regarded as a specially designed, cryptographically secure random number generation method. For Bitcoin security, the most important thing is still randomness, because we are facing not only the risk of "the same private key using repeated k values in different transactions", but also other potential possibilities of exposing private keys. Security engineers and Bitcoin developers need to learn about these possibilities, and hackers may be busy learning and analyzing historical blockchain data to find opportunities to steal coins. Possibility 1: User A and user B use the same wallet solution. Because the random number generator that the wallet relies on is not secure enough, A and B use the same k value to sign transactions. This phenomenon can be seen in the blockchain data as the same r value in transactions signed by two different Bitcoin addresses. In this case, hackers as third-party observers may not be able to do anything with these two addresses, but theoretically, if A records his own k value, he can calculate B's private key, and vice versa. Of course, because no one and no wallet software will record the k value used in the past signature (if it is recorded, it will be more problematic, because if someone obtains the k value you used before, they can reverse your private key and steal your Bitcoin), so in general, the risk of such r value duplication is much smaller than the case of r value duplication of transactions signed by the same address. However, it is not ruled out that hackers have analyzed the random number vulnerability of the wallet and tried to brute force the k value by narrowing the probability space, thereby stealing the Bitcoin assets of the wallet user. Possibility 2: User A and user B use the same wallet solution. Because the random number generator relied on by the wallet is not secure enough, A and B have two repeated k values (not repeated with themselves, but repeated with each other), that is, A used k1 and k2, and B also used k1 and k2. In this case, any third-party hacker can reverse the private key of A and B, and the Bitcoin assets of both people will be stolen. Possibility 3: Because the random number generator relied on by a certain wallet solution is not secure enough, the k value used when signing the transaction is the same as the private key (wallet software generally uses the same random number algorithm to generate private keys and calculate k values). Don't worry, the coins will be lost as soon as the transaction is broadcast. If the hacker is lucky and the program runs fast, it is even possible to double spend the transaction that has just been broadcast. Original link: https://www.8btc.com/article/36023 |
<<: Bitcoin hash rate drops 45% from 2020 peak
Everyone hopes that one day he can be successful,...
A man with a fleshy nose In physiognomy, the nose...
Today, the global monetary system has entered an ...
Materialism is the idea of treating money as an...
The meaning of moles on the palm 1. Careful Peopl...
Banking giants including JPMorgan Chase, Citigrou...
In fact, everyone handles love and marriage diffe...
On March 7, David Sacks, the White House cryptocu...
To be honest, each of us hopes to have good inter...
A widow's peak refers to a type of hairline w...
Palmistry and fingers are both important parts of...
Is it good for a man to have a mole on the sole o...
Because of the different thickness and growth dir...
The long side gradually recovers the lost ground ...
If a woman has big cheeks, her face will also appe...