Abstract—
This article discusses the security of implementing encryption for the Bitcoin Core cryptocurrency wallet. Particular attention is paid to aspects of the practical use of cryptographic algorithms when encrypting the wallet.dat file with a password. Practical resistance to brute-force attacks using parallel computing on GPUs is also considered. It is discovered that Bitcoin Core does not implement changing the encryption key for the user’s private keys. This implementation makes it possible to carry out a second attack on the wallet without knowing the new password, if it has already been compromised previously. Changes to encryption algorithms are also been proposed to make brute-force attacks more difficult on the GPU.
REFERENCES
Housley, R., Cryptographic Message Syntax (CMS), RFC 5652, RFC Editor, 2009.https://doi.org/10.17487/rfc5652
Bitcoin Core integration/staging tree. https://github.com/bitcoin/bitcoin. Cited December 21, 2020.
Zegzhda, D., Lavrova, D., Pavlenko, E., and Shtyrkina, A., Cyber attack prevention based on evolutionary cybernetics approach, Symmetry, 2020, vol. 12, no. 11, p. 1931.https://doi.org/10.3390/sym12111931
Zegzhda, D., Pavlenko, E., and Aleksandrova, E., Modelling artificial immunization processes to counter cyberthreats, Symmetry, 2021, vol. 13, no. 12, p. 2453. https://doi.org/10.3390/sym13122453
Moskvin, D.A. and Ivanov, D.V., Methods of protecting self-organizing networks against attacks on traffic routing, Autom. Control Comput. Sci., 2015, vol. 49, no. 8, pp. 745–750.https://doi.org/10.3103/s0146411615080118
Moskvin, D.A. and Pechenkin, A.I., Detection and prevention of unallowed data transmission from a local network, Bezop. Inf. Tekhnol., 2010, vol. 17, no. 1, pp. 95–97.
Zegzhda, D.P., Moskvin, D.A., and Dakhnovich, A.D., Protection of Wi-Fi network users against rogue access points, Autom. Control Comput. Sci., 2017, vol. 51, no. 8, pp. 978–984.https://doi.org/10.3103/s0146411617080302
Zbitnev, S.I., Kovtun, V.Yu., and Tevyashev, A.D., Scalar multiplication algorithms in a group of points of elliptic curve and some of their modifications, Radiotekhnika. Vesukr. Mezhved. Nauchn.-tekh. Sb. (Radioengineering: All-Ukrainian Interdepartmental Sci.-Tech. Collection of Papers), Kharkov: Kharkovsk. Nats. Univ. Radioelektron., 2005, vol. 141, pp. 82–96.
Al Saffar, N.F.H. and Said, M.R.Md., High performance methods of elliptic curve scalar multiplication, Int. J. Comput. Appl., 2014, vol. 108, no. 20, pp. 39–45.https://doi.org/10.5120/19028-0047
Leboeuf, K., GPU and ASIC acceleration of elliptic curve scalar point multiplication, PhD Thesis, Windsor, Canada, 2012: University of Windsor, 2012.
Wu, T. and Wang, R., Fast unified elliptic curve point multiplication for NIST prime curves on FPGAs, J. Cryptographic Eng., 2019, vol. 9, no. 4, pp. 401–410.https://doi.org/10.1007/s13389-019-00211-9
Funding
This work was supported by ongoing institutional funding. No additional grants to carry out or direct this particular research were obtained.
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
The authors of this work declare that they have no conflicts of interest.
Additional information
Translated by T. N. Sokolova
Publisher’s Note.
Allerton Press remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
About this article
Cite this article
Semyanov, P.V., Grezina, S.V. Analysis of Cryptographic Protection of the Bitcoin Core Cryptographic Wallet. Aut. Control Comp. Sci. 57, 914–921 (2023). https://doi.org/10.3103/S0146411623080278
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.3103/S0146411623080278