Javascript must be enabled to continue!
Potential Vulnerabilities of Cryptographic Primitives in Modern Blockchain Platforms
View through CrossRef
Today, blockchain technologies are a separate, rapidly developing area. With rapid development, they open up a number of scientific problems. One of these problems is the problem of reliability, which is primarily associated with the use of cryptographic primitives. The threat of the emergence of quantum computers is now widely discussed, in connection with which the direction of post-quantum cryptography is actively developing. Nevertheless, the most popular blockchain platforms (such as Bitcoin and Ethereum) use asymmetric cryptography based on elliptic curves. Here, cryptographic primitives for blockchain systems are divided into four groups according to their functionality: keyless, single-key, dual-key, and hybrid. The main attention in the work is paid to the most significant cryptographic primitives for blockchain systems: keyless and single-key. This manuscript discusses possible scenarios in which, during practical implementation, the mathematical foundations embedded in the algorithms for generating a digital signature and encrypting data using algorithms based on elliptic curves are violated. In this case, vulnerabilities arise that can lead to the compromise of a private key or a substitution of a digital signature. We consider cases of vulnerabilities in a blockchain system due to incorrect use of a cryptographic primitive, describe the problem, formulate the problem statement, and assess its complexity for each case. For each case, strict calculations of the maximum computational costs are given when the conditions of the case under consideration are met. Among other things, we present a new version of the encryption algorithm for data stored in blockchain systems or transmitted between blockchain systems using elliptic curves. This algorithm is not the main blockchain algorithm and is not included in the core of modern blockchain systems. This algorithm allows the use of the same keys that system users have in order to store sensitive user data in an open blockchain database in encrypted form. At the same time, possible vulnerabilities that may arise from incorrect implementation of this algorithm are considered. The scenarios formulated in the article can be used to test the reliability of both newly created blockchain platforms and to study long-existing ones.
Title: Potential Vulnerabilities of Cryptographic Primitives in Modern Blockchain Platforms
Description:
Today, blockchain technologies are a separate, rapidly developing area.
With rapid development, they open up a number of scientific problems.
One of these problems is the problem of reliability, which is primarily associated with the use of cryptographic primitives.
The threat of the emergence of quantum computers is now widely discussed, in connection with which the direction of post-quantum cryptography is actively developing.
Nevertheless, the most popular blockchain platforms (such as Bitcoin and Ethereum) use asymmetric cryptography based on elliptic curves.
Here, cryptographic primitives for blockchain systems are divided into four groups according to their functionality: keyless, single-key, dual-key, and hybrid.
The main attention in the work is paid to the most significant cryptographic primitives for blockchain systems: keyless and single-key.
This manuscript discusses possible scenarios in which, during practical implementation, the mathematical foundations embedded in the algorithms for generating a digital signature and encrypting data using algorithms based on elliptic curves are violated.
In this case, vulnerabilities arise that can lead to the compromise of a private key or a substitution of a digital signature.
We consider cases of vulnerabilities in a blockchain system due to incorrect use of a cryptographic primitive, describe the problem, formulate the problem statement, and assess its complexity for each case.
For each case, strict calculations of the maximum computational costs are given when the conditions of the case under consideration are met.
Among other things, we present a new version of the encryption algorithm for data stored in blockchain systems or transmitted between blockchain systems using elliptic curves.
This algorithm is not the main blockchain algorithm and is not included in the core of modern blockchain systems.
This algorithm allows the use of the same keys that system users have in order to store sensitive user data in an open blockchain database in encrypted form.
At the same time, possible vulnerabilities that may arise from incorrect implementation of this algorithm are considered.
The scenarios formulated in the article can be used to test the reliability of both newly created blockchain platforms and to study long-existing ones.
Related Results
Blockchain Technology and Cybersecurity in Fintech: Opportunities and Vulnerabilities
Blockchain Technology and Cybersecurity in Fintech: Opportunities and Vulnerabilities
Blockchain technology has emerged as a transformative force within the financial technology (Fintech) sector, offering unprecedented opportunities for efficiency, transparency, and...
“The margin between the edge of the world and infinite possibility”
“The margin between the edge of the world and infinite possibility”
Purpose
This paper aims to explore a paradoxical situation, asking whether it is possible to reconcile the immutable ledger known as blockchain with the requirements of the General...
Application of the blockchain technology for digital diplomas: problems and prospects
Application of the blockchain technology for digital diplomas: problems and prospects
The purpose of this studyis to analyze possible problems in issuing digital diplomas, using the blockchain technology, and to promote solving these problems as well as to show the ...
LEGAL IMPLICATIONS OF BLOCKCHAIN TECHNOLOGY FOR TAX COMPLIANCE AND FINANCIAL REGULATION
LEGAL IMPLICATIONS OF BLOCKCHAIN TECHNOLOGY FOR TAX COMPLIANCE AND FINANCIAL REGULATION
Blockchain technology has emerged as a disruptive force in the realms of tax compliance and financial regulation, presenting both opportunities and challenges for governments, busi...
Introduction to Blockchain Technology
Introduction to Blockchain Technology
A blockchain is a linked set of records maintained in a decentralized
environment. The records in blockchain are publicly available but cryptographically
secured. The interesting p...
Mitigating bureaucratic inefficiencies through blockchain technology in Africa
Mitigating bureaucratic inefficiencies through blockchain technology in Africa
With the Fourth Industrial Revolution (4IR) wave engulfing African governments, the need to do, and use something new has already infiltrated many public sector organizations. Whil...
A comprehensive review of post-quantum cryptography: Challenges and advances
A comprehensive review of post-quantum cryptography: Challenges and advances
One of the most crucial measures to maintain data security is the use of cryptography schemes and digital signatures built upon cryptographic algorithms. The resistance of cryptogr...
BLOCKCHAIN TECHNOLOGY: FEATURES, PROSPECTS
BLOCKCHAIN TECHNOLOGY: FEATURES, PROSPECTS
The article examines the features of blockchain technology and the construction of its structural elements. It is based on the principle of structuring and working with databases, ...

