Facebook Instagram Twitter RSS Feed PodBean Back to top on side

Speed optimizations in Bitcoin key recovery attacks

In: Tatra Mountains Mathematical Publications, vol. 67, no. 3
Nicolas T. Courtois - Ryan Castellucci - Guangyan Song

Details:

Year, pages: 2016, 55 - 68
Keywords:
Bitcoin, Elliptic Curve Cryptography, Crypto Currency, Brain Wallet
About article:
In this paper, we study and give the first detailed benchmarks on existing implementations of the secp256k1 elliptic curve used by at least hundreds of thousands of users in Bitcoin and other cryptocurrencies. Our implementation improves the state of the art by a factor of 2.5 with a focus on the cases, where side channel attacks are not a concern and a large quantity of RAM is available. As a result, we are able to scan the Bitcoin blockchain for weak keys faster than any previous implementation. We also give some examples of passwords which we have cracked, showing that brain wallets are not secure in practice even for quite complex passwords.
How to cite:
ISO 690:
Courtois, N., Castellucci, R., Song, G. 2016. Speed optimizations in Bitcoin key recovery attacks. In Tatra Mountains Mathematical Publications, vol. 67, no.3, pp. 55-68. 1210-3195.

APA:
Courtois, N., Castellucci, R., Song, G. (2016). Speed optimizations in Bitcoin key recovery attacks. Tatra Mountains Mathematical Publications, 67(3), 55-68. 1210-3195.