This document discusses various attacks on Bitcoin, including 51% attacks, eclipse attacks, quantum attacks, and block delay attacks. It begins with introductions to Bitcoin and how it works using proof-of-work consensus. It then covers each attack in more detail, explaining how they work and their potential consequences. 51% attacks involve a miner controlling over 50% of the network hash rate to reverse transactions or prevent new blocks. Eclipse attacks isolate a node to perform double spending with less hash power. Quantum attacks could render Bitcoin's cryptography obsolete with powerful quantum computers. Block delay attacks manipulate block propagation to delay transactions. The document concludes by emphasizing the importance of defending against these attacks.
This slide is a entry level introduction to blockchain security, it illustrates the current status of the issue, summarises attack methodology, and reviewed a few past hack cases.
Simone Bronzini - Weaknesses of blockchain applications - Codemotion Milan 2018Codemotion
Due to the immutability of the ledger and the difficulty to update their consensus rules, Blockchain applications have many critical layers where a bug can cause huge, irreversible fund losses. This talk will shed some light on why and how Blockchain applications are so critical and will discuss past events that led to fund loss or consensus failures due to bugs in critical parts of the code of Bitcoin and Ethereum applications.
A Quick Start To Blockchain by Seval CaprazSeval Çapraz
Blockchain is one of the most innovative discoveries of the past century.
The first cryptocurrency, Bitcoin, was proposed in 2008 by Satoshi Nakamoto with a white paper.
This slide is a entry level introduction to blockchain security, it illustrates the current status of the issue, summarises attack methodology, and reviewed a few past hack cases.
Simone Bronzini - Weaknesses of blockchain applications - Codemotion Milan 2018Codemotion
Due to the immutability of the ledger and the difficulty to update their consensus rules, Blockchain applications have many critical layers where a bug can cause huge, irreversible fund losses. This talk will shed some light on why and how Blockchain applications are so critical and will discuss past events that led to fund loss or consensus failures due to bugs in critical parts of the code of Bitcoin and Ethereum applications.
A Quick Start To Blockchain by Seval CaprazSeval Çapraz
Blockchain is one of the most innovative discoveries of the past century.
The first cryptocurrency, Bitcoin, was proposed in 2008 by Satoshi Nakamoto with a white paper.
Virtual or digital currencies, with Bitcoin chief amongst them, have been gaining momentum and investment over the last couple of years. Offering an almost costless means of making payments around the globe, virtual currencies have the potential to bring significant disruption to the banking industry. This potential is not lost on either Bitcoin startups or banks themselves. But how does Bitcoin actually work? A peer-to-peer network maintains the “blockchain”, an innovative cryptographic protocol which securely mediates payments between parties without mutual trust. This session will step through the structure of the blockchain, showing how it solves the “double spend” problem and allows decentralised processing of financial transactions. Whether Bitcoin will become the currency of the internet or it’s a bubble that is doomed to burst sooner or later, the blockchain itself will change the face of transactional banking and perhaps other industries along the way.
Presentation to the Sydney Financial Mathematics Workshop (11 March 2015)
http://www.qgroup.org.au/content/bitcoin-banking-and-blockchain
Can we safely adapt the construction of permissionless blockchain to user dem...I MT
"Can we safely adapt the construction of permissionless blockchain to user demand ?" par Emmanuelle ANCEAUME (CNRS), lors de la journée Futur & Ruptures du 31 janvier 2019.
There are plenty of bitcoin and blockchain intro decks, so why create another one? Because they are either too technical or too vague on how blockchain actually works! This talk is prepared for audiences who have good educational background and general knowledge about internet. It is used during my trip to Taiwan so some Chinese translations are included. It starts with a basic definition and a functional description of how bitcoin solves the double spending problem, how it was implemented in blockchain, what is mining and why it is critical to the bitcoin ecosystem. Based on these understandings, it goes up a level to talk about how to use cryptocurrencies, the characteristics of a blockchain, and why it has the potential to disrupt financial services and beyond. The talk finishes with an overview of the cryptocurreny market, the rise of Ethereum, and the recent ICO phenomenon. There are several versions of this presentation. This particular version is for financial services professionals so there is more emphasis on blockchain adoption. The CS version covers the math behind mining in more depth, and the general public version provides some cautionary notes regarding speculating on cryptocurrencies. LINE characters are used in illustrations due to their popularity in Taiwan. The American version uses the Simpsons.
Blockchain has gained lots of attention in recent years. Bitcoin and Ethereum are leading the race. Crypto currencies in spite of uncertainty and volatility are here to stay. Smart contract programming is the future for the Internet 3.0.
This ppt describes about blockchain, quantum computers and about the security of blockchain. I took three major algorithms for securing blockchain from quantum computers attack.
Blockchain overview, use cases, implementations and challengesSébastien Tandel
Most know about Bitcoin, the well-known crypto-currency. Less know the details about the underlying and enabling technology, Blockchain.
Hopefully, this presentation provides enough insights to understand blockchain concepts and why it's perceived to potentially disrupt many market segments, from retail to governments, from finance to health care. At last, I hope to brush fairly the many challenges of this rather new technology.
Virtual or digital currencies, with Bitcoin chief amongst them, have been gaining momentum and investment over the last couple of years. Offering an almost costless means of making payments around the globe, virtual currencies have the potential to bring significant disruption to the banking industry. This potential is not lost on either Bitcoin startups or banks themselves. But how does Bitcoin actually work? A peer-to-peer network maintains the “blockchain”, an innovative cryptographic protocol which securely mediates payments between parties without mutual trust. This session will step through the structure of the blockchain, showing how it solves the “double spend” problem and allows decentralised processing of financial transactions. Whether Bitcoin will become the currency of the internet or it’s a bubble that is doomed to burst sooner or later, the blockchain itself will change the face of transactional banking and perhaps other industries along the way.
Presentation to the Sydney Financial Mathematics Workshop (11 March 2015)
http://www.qgroup.org.au/content/bitcoin-banking-and-blockchain
Can we safely adapt the construction of permissionless blockchain to user dem...I MT
"Can we safely adapt the construction of permissionless blockchain to user demand ?" par Emmanuelle ANCEAUME (CNRS), lors de la journée Futur & Ruptures du 31 janvier 2019.
There are plenty of bitcoin and blockchain intro decks, so why create another one? Because they are either too technical or too vague on how blockchain actually works! This talk is prepared for audiences who have good educational background and general knowledge about internet. It is used during my trip to Taiwan so some Chinese translations are included. It starts with a basic definition and a functional description of how bitcoin solves the double spending problem, how it was implemented in blockchain, what is mining and why it is critical to the bitcoin ecosystem. Based on these understandings, it goes up a level to talk about how to use cryptocurrencies, the characteristics of a blockchain, and why it has the potential to disrupt financial services and beyond. The talk finishes with an overview of the cryptocurreny market, the rise of Ethereum, and the recent ICO phenomenon. There are several versions of this presentation. This particular version is for financial services professionals so there is more emphasis on blockchain adoption. The CS version covers the math behind mining in more depth, and the general public version provides some cautionary notes regarding speculating on cryptocurrencies. LINE characters are used in illustrations due to their popularity in Taiwan. The American version uses the Simpsons.
Blockchain has gained lots of attention in recent years. Bitcoin and Ethereum are leading the race. Crypto currencies in spite of uncertainty and volatility are here to stay. Smart contract programming is the future for the Internet 3.0.
This ppt describes about blockchain, quantum computers and about the security of blockchain. I took three major algorithms for securing blockchain from quantum computers attack.
Blockchain overview, use cases, implementations and challengesSébastien Tandel
Most know about Bitcoin, the well-known crypto-currency. Less know the details about the underlying and enabling technology, Blockchain.
Hopefully, this presentation provides enough insights to understand blockchain concepts and why it's perceived to potentially disrupt many market segments, from retail to governments, from finance to health care. At last, I hope to brush fairly the many challenges of this rather new technology.
Welcome to WIPAC Monthly the magazine brought to you by the LinkedIn Group Water Industry Process Automation & Control.
In this month's edition, along with this month's industry news to celebrate the 13 years since the group was created we have articles including
A case study of the used of Advanced Process Control at the Wastewater Treatment works at Lleida in Spain
A look back on an article on smart wastewater networks in order to see how the industry has measured up in the interim around the adoption of Digital Transformation in the Water Industry.
Water billing management system project report.pdfKamal Acharya
Our project entitled “Water Billing Management System” aims is to generate Water bill with all the charges and penalty. Manual system that is employed is extremely laborious and quite inadequate. It only makes the process more difficult and hard.
The aim of our project is to develop a system that is meant to partially computerize the work performed in the Water Board like generating monthly Water bill, record of consuming unit of water, store record of the customer and previous unpaid record.
We used HTML/PHP as front end and MYSQL as back end for developing our project. HTML is primarily a visual design environment. We can create a android application by designing the form and that make up the user interface. Adding android application code to the form and the objects such as buttons and text boxes on them and adding any required support code in additional modular.
MySQL is free open source database that facilitates the effective management of the databases by connecting them to the software. It is a stable ,reliable and the powerful solution with the advanced features and advantages which are as follows: Data Security.MySQL is free open source database that facilitates the effective management of the databases by connecting them to the software.
Literature Review Basics and Understanding Reference Management.pptxDr Ramhari Poudyal
Three-day training on academic research focuses on analytical tools at United Technical College, supported by the University Grant Commission, Nepal. 24-26 May 2024
We have compiled the most important slides from each speaker's presentation. This year’s compilation, available for free, captures the key insights and contributions shared during the DfMAy 2024 conference.
HEAP SORT ILLUSTRATED WITH HEAPIFY, BUILD HEAP FOR DYNAMIC ARRAYS.
Heap sort is a comparison-based sorting technique based on Binary Heap data structure. It is similar to the selection sort where we first find the minimum element and place the minimum element at the beginning. Repeat the same process for the remaining elements.
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsVictor Morales
K8sGPT is a tool that analyzes and diagnoses Kubernetes clusters. This presentation was used to share the requirements and dependencies to deploy K8sGPT in a local environment.
Final project report on grocery store management system..pdfKamal Acharya
In today’s fast-changing business environment, it’s extremely important to be able to respond to client needs in the most effective and timely manner. If your customers wish to see your business online and have instant access to your products or services.
Online Grocery Store is an e-commerce website, which retails various grocery products. This project allows viewing various products available enables registered users to purchase desired products instantly using Paytm, UPI payment processor (Instant Pay) and also can place order by using Cash on Delivery (Pay Later) option. This project provides an easy access to Administrators and Managers to view orders placed using Pay Later and Instant Pay options.
In order to develop an e-commerce website, a number of Technologies must be studied and understood. These include multi-tiered architecture, server and client-side scripting techniques, implementation technologies, programming language (such as PHP, HTML, CSS, JavaScript) and MySQL relational databases. This is a project with the objective to develop a basic website where a consumer is provided with a shopping cart website and also to know about the technologies used to develop such a website.
This document will discuss each of the underlying technologies to create and implement an e- commerce website.
4. What is Bitcoin
● The first realization of cryptocurrencies
● Developed by anonymous Satoshi Nakamoto
● No bank or middle authority to be
responsible for what is going on
● Users interact with the network through
their wallets which use async cryptography
● How to trust it?
5. Bitcoin’s core of trust
● Bitcoin uses the PoW consensus protocol
● PoW defines the mechanics behind how BTC’s miners and nodes work
● Proof of Work was developed back in 1993 by Moni Naor and Cynthia Dowrk
● The consensus protocol in a crypto network is basically what nominates
miners to mine new blocks
The distribution of BTC nodes
6. Bitcoin in Summary
● A decentralized cryptocurrency
● Uses PoW as the consensus protocol
● Based on a “chain” of blocks that store transactions
● Has nodes and miners keep the network live and dynamically available
● Each block is cryptographically proven to proceed the previous one; provable
from the genesis block onwards
● Miners compete to find new blocks matching difficulty constraints
● Miners gather unprocessed transactions in new blocks for a reward and nodes
add them to their stored blockchain
● The whole decentralized model works based on the longest chain rule
7. Major attacks on Bitcoin
2
51% Attack
2.1
Eclipse Attack
2.2
Quantum Attacks
2.3
Block Delay Attack
2.4
9. The Warning
P2P
Secure via hash
Warning about
51% attack
Electronic payment
system
No double
spending
Longest
chain
10. 51% Attack
Honest miners are adding
blocks to the public
blockchain.
The malicious miner is adding
blocks to a private blockchain
without disclosing to the
public blockchain.
11. 51% Attack: Double-Spending
Honest miners join the
malicious miner on his chain.
The malicious miner
broadcasts his longer version
of the chain to the other
miners.
-100
BTC
-0
BTC
12. 51% Attack Consequences
● Steal coins from others?
● Suppress transactions?
○ From the blockchain
○ From the p2p network
● Change the block reward?
● Destroy confidence in bitcoin?
14. In an eclipse attack, a malicious actor isolates
a specific user or node within a peer-to-peer
(P2P) network. Nodes within the network
are unable to connect with all other nodes
and can connect with a limited number of
neighboring nodes.
Eclipse Attack
15. Eclipse Attack
Isolated In an eclipse attack, a malicious actor isolates
a specific user or node within a peer-to-peer
(P2P) network. Nodes within the network
are unable to connect with all other nodes
and can connect with a limited number of
neighboring nodes.
16. Eclipse Attack
Victim Node Attacker Node
In an eclipse attack, the attacker node is directly connected to the victim
node and prevents the victim from learning about the rest of the network.
23. Quantum Attacks
Quantum attacks on PoW are based on the the advantages quantum
computers have over classical ones.
● By 2050: 1 QC’s hashing power > BTC’s total network hashing power
● Algorithms already developed with the potential to beat PoW hard
● Even before 2050, it’s easy to perform 51% attacks given enough qubits
● ECDLP (the underlying basis of Secp256k1 ECDSA) can be solved in
polynomial time given enough qubits
● Bitcoin’s public addresses/keys can easily leak private keys at enough
qubits
● Double spending attacks with QCs’ hashing power increasing significantly
24. Quantum Attacks
Grover’s Quantum Algorithm
Shor’s Quantum Algorithm
Quantum algorithms are growing fast and are already on their way to pose
Bitcoin’s backbone cryptography to many problems.
Grover’s Algorithm aims to solve the problem of searching unstructured
and/or very rare x given f and v where f(x) = v. It’s complexity is O( √ N).
Shor’s Algorithm is capable of solving the Integer Factorization Problem in
O((log N)^2 . (log log N) . (log log log N)) –- polynomial time.
● Any classical computer would require Ω(N) steps for the same computation
● Can be applied to break BTC’s SHA256 hashes in O(2^128)
● Second preimage attacks at only ϴ(2^64) steps
● QCs running in parallel could be even much more powerful
● The major algorithm underlying many modern developments in QCs
● At enough qubits, can be easily be applied to break BTC’s ECDSA
● Non-reusable addresses: PKs revealed and broken when spending BTCs
● Processed transactions: double spending attacks hard to do
● Unprocessed (pooled) transactions: In risk of being modified
25. Quantum Resistance
● Use larger key sizes (128 and 256 bits not enough)
● Use quantum-resistant algorithms:
○ Encryption: CRYSTALS-Kybers
○ Digital Signature: CRYSTALS-Dilithium, FALCON, and SPHINCS+
● Use post-quantum cryptography
○ Lattice-based cryptography
○ Multivariate cryptography
○ Hash-based cryptography
○ Code-based cryptography
○ Supersingular elliptic curve isogeny cryptography
○ Symmetric key quantum resistance
● Requires forks on the BTC network (probably a/several hard forks)
27. Block delay attack
● One of Network-plane attacks
● History
○ Eclipse attack
○ BGP hijacking attack
● Original block delay attack(proposed by Gervais)
● TendrilStaller
28. Original block delay attack
Advertisement based block propagation
inv getdata block B
Node A
Node N
29. Original block delay attack
Attack strategy
inv getdata block B
Attacker A
Victim V
delay the response
30. TendrilStaller attack
New model of block propagation
● Block headers as announcement of new block
● Compact block relay
● High Bandwidth (HB) mode neighbor
● Shorter block download timeout
31. TendrilStaller attack
New model of block propagation
Non-HB neighbor A
headers
getdata
blocktxn
Node A
Node N
compact
block
getblocktxn
33. TendrilStaller attack
Impact on original attack
headers
getdata
Attacker A
Victim V
delay the response
HB neighbor N
compact block
Victim gets the new block
34. TendrilStaller attack
Attack algorithm - phase 1
initiate
connections
a1
a2
a3
victim
IP x
IP y
IP z
HBN list
send block b+1
a1
a2
a3
victim
IP a1
IP a2
IP a3
HBN list
start of phase 1 end of phase 1
36. TendrilStaller attack
Light weight attack nodes
● Mode 1
○ Not participating in attack
○ As a proxy for full attack nodes
● Mode 2
○ Participating in attack
○ Relaying requests/responses between full attack node and victim
38. Conclusion
● Bitcoin is a distributed cryptocurrency which implements a highly
available, public, and decentralized ledger
● Although it has so many benefits, it suffer from some attacks. Some of
which are :
○ 51% attack (the most important one)
○ Double spending attack
○ Eclipse attack
○ Quantum attack
○ Block delay attack
● We covered all attacks above and also we mentioned some
countermeasures to defeat them
39. ● Introduction to Cryptocurrency, Master’s Course, Prof. B. Bahrak & Prof. H. Shariatpanahi
● https://bitcoin.org/bitcoin.pdf
● https://medium.com/pirl/pirlguard-innovative-solution-against-51-attacks-87dd45aa1109
● https://engineering.cmu.edu/cmkm/_files/documents/tendrilstaller-block-delay-attack-in-
bitcoin.pdf
● https://hub.packtpub.com/what-can-blockchain-developers-learn-from-eclipse-attacks-in-a-
bitcoin-network-koshik-raj/
● Aggarwal, Divesh, Gavin K. Brennen, Troy Lee, Miklos Santha, and Marco Tomamichel.
"Quantum attacks on Bitcoin, and how to protect against them." arXiv preprint
arXiv:1710.10377 (2017).
● Stewart, Iain, Daniel Ilie, Alexei Zamyatin, Sam Werner, M. F. Torshizi, and William J.
Knottenbelt. "Committing to quantum resistance: A slow defence for Bitcoin against a fast
quantum computing attack." Royal Society open science 5, no. 6 (2018): 180410.
References
→ some attacks(51,dos,bwh) make bitcoin weak for profit → N-P attacks target peer-to-peer → may not receive latest state → wase of hash power → earlier attacks works better
BGP : isolation of victim, using AS, intercept connections of victim, reroute and drop traffic
Two above are expensive : lots of nodes and IP, relay internet traffic
Our: 3 nodes(1 full)
Minimum BW consumption
Historical block delay model