Tuesday, November 5, 2024

Can a 51% assault be triggered by some other of those 7 methods? (and with a quantum laptop?)

(I believe this query might be blocked for being not particular, so assist me edit it, thanks)

(I’ll current Details [1] and Details [2] which is able to assist manage my concepts earlier than my query)

Details [1]: (the next data is frequent sense)

One doable assault is: (reproducing the phrases within the weblog braiins)

…public keys are revealed when transactions are broadcasted to the
mempool, even BEFORE they get added to the blockchain.

If an attacker might reverse the signature and get the related
non-public key throughout this window earlier than the transaction will get included
on-chain, they might then broadcast a higher-fee transaction sending
the cash to themselves as an alternative.

Details [2]: (the troublesome a part of the query will begin right here)

The paper A Survey on Varied Assaults in Bitcoin and Cryptocurrency describes 7 assaults:

A. Denial-of-service Assault 
B. Double Spending Assault 
C. Sybil Assault 
D. Eclipse Assault 
E. Egocentric mining Assault 
F. Fork after Withholding Assault 
G. Block Withholding Assault

I lastly arrive to my query:

Utilizing a quantum laptop to interrupt SHA-256/ECDSA:

Are there different tips to drag off a 51% assault all through any of the (A-G) methods?

(I’ve tried to seek out any not widespreadly diffuse information, like

For instance 1: In Eclipse assault, the IP tackle of sufferer individual is blocked or redirected in the direction of a competitor. IPsec makes use of SHA. So I believe it’s doable to discover a vulnerability this manner, however I don’t know how.

For instance 2: It’s written within the paper Off-Path TCP Exploits of the Combined IPID Project:

“TCP connections DoS assault is especially relevant to compromising functions secured by encrypted site visitors, e.g., HTTPS and SSH”.

I’ve tried to guess which quantum assault to sha256 is ready to assault bitcoin, however I’m not a pc scientist so please ANY data is wellcome)

Related Articles

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Latest Articles