publication . Article . 2016

speed optimizations in bitcoin key recovery attacks

Courtois, N.; Song, G.; Castellucci, R.;
Open Access
  • Published: 01 Sep 2016 Journal: Tatra Mountains Mathematical Publications, volume 67, pages 55-68 (eissn: 1210-3195, Copyright policy)
  • Publisher: Walter de Gruyter GmbH
  • Country: United Kingdom
Abstract
<jats:title>Abstract</jats:title> <jats:p>In this paper, we study and give the first detailed benchmarks on existing implementations of the secp256k1 elliptic curve used by at least hundreds of thousands of users in Bitcoin and other cryptocurrencies. Our implementation improves the state of the art by a factor of 2.5 with a focus on the cases, where side channel attacks are not a concern and a large quantity of RAM is available. As a result, we are able to scan the Bitcoin blockchain for weak keys faster than any previous implementation. We also give some examples of passwords which we have cracked, showing that brain wallets are not secure in practice even for...
Subjects
free text keywords: Blockchain, Elliptic curve cryptography, Computer security, computer.software_genre, computer, Cryptocurrency, Password, Computer science, Key recovery, Implementation, Elliptic curve, Side channel attack, Bitcoin; Elliptic Curve Cryptography; Crypto Currency; Brain Wallet
Related Organizations
Powered by OpenAIRE Open Research Graph
Any information missing or wrong?Report an Issue
publication . Article . 2016

speed optimizations in bitcoin key recovery attacks

Courtois, N.; Song, G.; Castellucci, R.;