Ripple software libraries published before August 2015 potentially rendered private keys which signed multiple transactions vulnerable.
As is known among cryptographers, the security of Elliptic Curve Digital Signature Algorithms (ECDAs) employed by the aforementioned cryptocurrencies is highly dependent on random data, which are known as nonces. The research further explains:
“It is well known that if an ECDSA private key is ever used to sign two messages with the same signature nonce, the long-term private key is trivial to compute [crack].”
The researchers claim to have successfully hacked hundreds of Bitcoin, some Ethereum, SSH (remote control for unix-like systems), HTTPS and one XRP private keys thanks to so-called biased nonces (with a low degree of randomness.) As the researchers explain, the consequences of such vulnerabilities are vast:
“In the case of cryptocurrencies, these keys give us, or any other attacker, the ability to claim the funds in the associated accounts. In the case of SSH or HTTPS, these keys would give us, or any other attacker, the ability to impersonate the end hosts.”
Still, the paper explains that such vulnerabilities can be prevented:
“All of the attacks we discuss in this paper can be prevented by using deterministic ECDSA nonce generation, which is already implemented in the default Bitcoin and Ethereum libraries.”
According to Ripple, deterministic nonce generation has also been part of their software since August 2015. This feature also makes addresses that interacted with the blockchain employing newer software libraries safe from this vulnerability.
While cryptography is far from perfect, centralized systems like exchanges and single computing systems are successfully attacked with success much more often than private keys, the research states.. The paper further notes that during the research, access has been obtained to only about $54 of BTC and $14 of XRP.
Also, recently news broke that a recent spate of ransomware attacks estimated to have earned hackers 705.08 Bitcoin ($2.5 million) likely came from Russian cybercriminals, not North Korean state-sponsored actors as initially thought.
Visit the USSA News store!
Click this link for the original source of this article.
Author: Adrian Zmudzinski
This content is courtesy of, and owned and copyrighted by, https://cointelegraph.com and its author. This content is made available by use of the public RSS feed offered by the host site and is used for educational purposes only. If you are the author or represent the host site and would like this content removed now and in the future, please contact the USSANews.com administrator by using the contact form located in the top-left menu. Your request will be immediately honored. Please visit https://cointelegraph.com for more terrific, conservative content. The owner of this website may be paid to recommend American Bullion. The content of this website, including the positive review of American Bullion, the negative review of its competitors, and any other information may not be independent or neutral.