Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

A Security Analysis of Cryptocurrency Wallets against Password Brute-Force Attacks

View through CrossRef
Currently, the monetary value of cryptocurrencies is extremely high, leading to frequent theft attempts. Cyberattacks targeting cryptocurrency wallets and the scale of these attacks are also increasing annually. However, many studies focus on large-scale exchanges, leading to a lack of research on cryptocurrency wallet security. Nevertheless, the threat to individual wallets is real and can lead to severe consequences for individuals. In this paper, we analyze the security of the open-source cryptocurrency wallets Sparrow, Etherwall, and Bither against brute-force attacks, a fundamental threat in password-based systems. As cryptocurrency wallets use passwords to manage users’ private keys, we analyzed the private key management mechanism and implemented a password verification oracle. We used this oracle for brute-force attacks. We identified the private key management mechanism by conducting a code-level investigation and evaluated the three wallets’ security through practical experimentation. The experiment results revealed that the wallets’ security, which depends on passwords, could be diminished due to the password input space and the configuration of password length settings. We propose a general methodology for analyzing the security of desktop cryptocurrency wallets against brute-force attacks and provide practical guidelines for designing secure wallets. By using the analysis methods suggested in this paper, one can evaluate the security of wallets.
Title: A Security Analysis of Cryptocurrency Wallets against Password Brute-Force Attacks
Description:
Currently, the monetary value of cryptocurrencies is extremely high, leading to frequent theft attempts.
Cyberattacks targeting cryptocurrency wallets and the scale of these attacks are also increasing annually.
However, many studies focus on large-scale exchanges, leading to a lack of research on cryptocurrency wallet security.
Nevertheless, the threat to individual wallets is real and can lead to severe consequences for individuals.
In this paper, we analyze the security of the open-source cryptocurrency wallets Sparrow, Etherwall, and Bither against brute-force attacks, a fundamental threat in password-based systems.
As cryptocurrency wallets use passwords to manage users’ private keys, we analyzed the private key management mechanism and implemented a password verification oracle.
We used this oracle for brute-force attacks.
We identified the private key management mechanism by conducting a code-level investigation and evaluated the three wallets’ security through practical experimentation.
The experiment results revealed that the wallets’ security, which depends on passwords, could be diminished due to the password input space and the configuration of password length settings.
We propose a general methodology for analyzing the security of desktop cryptocurrency wallets against brute-force attacks and provide practical guidelines for designing secure wallets.
By using the analysis methods suggested in this paper, one can evaluate the security of wallets.

Related Results

TYPES OF CRYPTOCURRENCY WALLETS
TYPES OF CRYPTOCURRENCY WALLETS
Purpose. The aim of the article is to study types of cryptocurrency wallets, their features and advantages. Methodology of research. The following special research methods were us...
Enhancing Entrepreneurial Security in Cryptocurrency Wallets Using Cloud Technology
Enhancing Entrepreneurial Security in Cryptocurrency Wallets Using Cloud Technology
The increasing adoption of cryptocurrency has underscored the critical need for robust security measures to protect digital assets stored in cryptocurrency wallets. Traditional sec...
The Tendencies of Cryptocurrency Policies in Indonesia
The Tendencies of Cryptocurrency Policies in Indonesia
Cryptocurrency has set intriguing and innovative trends in investment amidst the fluctuating global economy following government policies. This research aims to investigate the tre...
Efficient Plain Password Cryptanalysis Techniques
Efficient Plain Password Cryptanalysis Techniques
In this research work, some low complexity and efficient cryptanalysis approaches are proposed to decrypt password (encryption keys). Passwords are still one of the most common mea...
Enhancing consumer protection in cryptocurrency transactions: Legal strategies and policy recommendations
Enhancing consumer protection in cryptocurrency transactions: Legal strategies and policy recommendations
Enhancing consumer protection in cryptocurrency transactions presents a critical challenge due to the decentralized and often opaque nature of the cryptocurrency market. This abstr...
Aplikasi Pengukuran Kekuatan dan Rekomendasi Password Berdasarkan Input Pengguna dengan Metode Entropi
Aplikasi Pengukuran Kekuatan dan Rekomendasi Password Berdasarkan Input Pengguna dengan Metode Entropi
Penelitian ini mengembangkan aplikasi berbasis Python untuk mengevaluasi kekuatan password serta memberikan rekomendasi password yang lebih aman menggunakan alfabet fonetik NATO, T...
Deception-Based Security Framework for IoT: An Empirical Study
Deception-Based Security Framework for IoT: An Empirical Study
<p><b>A large number of Internet of Things (IoT) devices in use has provided a vast attack surface. The security in IoT devices is a significant challenge considering c...
TRADITIONAL E-WALLETS VS. CRYPTO WALLETS: A COMPARATIVE STUDY OF FUNCTIONALITY AND USE CASES
TRADITIONAL E-WALLETS VS. CRYPTO WALLETS: A COMPARATIVE STUDY OF FUNCTIONALITY AND USE CASES
The purpose of this study is to make a comparison between cryptocurrency wallets and regular digital E-wallets. The system based on internet payments as alternatives to traditional...

Back to Top