Javascript must be enabled to continue!
Potential Vulnerabilities of Cryptographic Primitives in Modern Blockchain Platforms
View through CrossRef
Today, blockchain technologies are a separate, rapidly developing area. With rapid development, they open up a number of scientific problems. One of these problems is the problem of reliability, which is primarily associated with the use of cryptographic primitives. The threat of the emergence of quantum computers is now widely discussed, in connection with which the direction of post-quantum cryptography is actively developing. Nevertheless, the most popular blockchain platforms (such as Bitcoin and Ethereum) use asymmetric cryptography based on elliptic curves. Here, cryptographic primitives for blockchain systems are divided into four groups according to their functionality: keyless, single-key, dual-key, and hybrid. The main attention in the work is paid to the most significant cryptographic primitives for blockchain systems: keyless and single-key. This manuscript discusses possible scenarios in which, during practical implementation, the mathematical foundations embedded in the algorithms for generating a digital signature and encrypting data using algorithms based on elliptic curves are violated. In this case, vulnerabilities arise that can lead to the compromise of a private key or a substitution of a digital signature. We consider cases of vulnerabilities in a blockchain system due to incorrect use of a cryptographic primitive, describe the problem, formulate the problem statement, and assess its complexity for each case. For each case, strict calculations of the maximum computational costs are given when the conditions of the case under consideration are met. Among other things, we present a new version of the encryption algorithm for data stored in blockchain systems or transmitted between blockchain systems using elliptic curves. This algorithm is not the main blockchain algorithm and is not included in the core of modern blockchain systems. This algorithm allows the use of the same keys that system users have in order to store sensitive user data in an open blockchain database in encrypted form. At the same time, possible vulnerabilities that may arise from incorrect implementation of this algorithm are considered. The scenarios formulated in the article can be used to test the reliability of both newly created blockchain platforms and to study long-existing ones.
Title: Potential Vulnerabilities of Cryptographic Primitives in Modern Blockchain Platforms
Description:
Today, blockchain technologies are a separate, rapidly developing area.
With rapid development, they open up a number of scientific problems.
One of these problems is the problem of reliability, which is primarily associated with the use of cryptographic primitives.
The threat of the emergence of quantum computers is now widely discussed, in connection with which the direction of post-quantum cryptography is actively developing.
Nevertheless, the most popular blockchain platforms (such as Bitcoin and Ethereum) use asymmetric cryptography based on elliptic curves.
Here, cryptographic primitives for blockchain systems are divided into four groups according to their functionality: keyless, single-key, dual-key, and hybrid.
The main attention in the work is paid to the most significant cryptographic primitives for blockchain systems: keyless and single-key.
This manuscript discusses possible scenarios in which, during practical implementation, the mathematical foundations embedded in the algorithms for generating a digital signature and encrypting data using algorithms based on elliptic curves are violated.
In this case, vulnerabilities arise that can lead to the compromise of a private key or a substitution of a digital signature.
We consider cases of vulnerabilities in a blockchain system due to incorrect use of a cryptographic primitive, describe the problem, formulate the problem statement, and assess its complexity for each case.
For each case, strict calculations of the maximum computational costs are given when the conditions of the case under consideration are met.
Among other things, we present a new version of the encryption algorithm for data stored in blockchain systems or transmitted between blockchain systems using elliptic curves.
This algorithm is not the main blockchain algorithm and is not included in the core of modern blockchain systems.
This algorithm allows the use of the same keys that system users have in order to store sensitive user data in an open blockchain database in encrypted form.
At the same time, possible vulnerabilities that may arise from incorrect implementation of this algorithm are considered.
The scenarios formulated in the article can be used to test the reliability of both newly created blockchain platforms and to study long-existing ones.
Related Results
A taxonomy of endpoint vulnerabilities and affected blockchain architecture layers
A taxonomy of endpoint vulnerabilities and affected blockchain architecture layers
AbstractBlockchain technology has gained significant attention and adoption due to its decentralized nature, and promising secure and immutable transactions. The interpretation of ...
Convergence and representation of blockchain and smart contracts using the semantic web
Convergence and representation of blockchain and smart contracts using the semantic web
The Internet and the World Wide Web were designed with the intention of being decentralised and interoperable, and therefore more democratic, where users have power over their data...
La qualification de la blockchain
La qualification de la blockchain
La création de la blockchain a remis en question les notions traditionnelles de collaboration et d'échange. Cette thèse vise à démontrer que cette innovation n'est pas seulement te...
Anomaly Detection in Blockchain Using Machine Learning
Anomaly Detection in Blockchain Using Machine Learning
Blockchain technology has gained significant attention as a secure and decentralized platform for various applications. However, the immutable and distributed nature of blockchain ...
An Overview of DRAM-Based Security Primitives
An Overview of DRAM-Based Security Primitives
Recent developments have increased the demand for adequate security solutions, based on primitives that cannot be easily manipulated or altered, such as hardware-based primitives. ...
“The margin between the edge of the world and infinite possibility”
“The margin between the edge of the world and infinite possibility”
Purpose
This paper aims to explore a paradoxical situation, asking whether it is possible to reconcile the immutable ledger known as blockchain with the requirements of the General...
Blockchain Technology and Cybersecurity in Fintech: Opportunities and Vulnerabilities
Blockchain Technology and Cybersecurity in Fintech: Opportunities and Vulnerabilities
Blockchain technology has emerged as a transformative force within the financial technology (Fintech) sector, offering unprecedented opportunities for efficiency, transparency, and...
Mathematics in Cryptography, Cybersecurity, and Blockchain Technology
Mathematics in Cryptography, Cybersecurity, and Blockchain Technology
The growth of cryptocurrencies and blockchain technology has spawned a massive revolution in the traditional banking and financial system. The trend in modern digital transactions ...

