[ad_1]
(I feel this query will probably be blocked for being not particular, so assist me edit it, thanks)
(I’ll current Details [1] and Details [2] which is able to assist arrange my concepts earlier than my query)
Details [1]: (the next info is frequent sense)
One doable assault is: (reproducing the phrases within the weblog braiins)
…public keys are revealed when transactions are broadcasted to the
mempool, even BEFORE they get added to the blockchain.If an attacker might reverse the signature and get the related
non-public key throughout this window earlier than the transaction will get included
on-chain, they might then broadcast a higher-fee transaction sending
the cash to themselves as a substitute.
Details [2]: (the tough a part of the query will begin right here)
The paper A Survey on Varied Assaults in Bitcoin and Cryptocurrency describes 7 assaults:
A. Denial-of-service Assault
B. Double Spending Assault
C. Sybil Assault
D. Eclipse Assault
E. Egocentric mining Assault
F. Fork after Withholding Assault
G. Block Withholding Assault
I lastly arrive to my query:
Utilizing a quantum pc to interrupt SHA-256/ECDSA:
Are there different methods to drag off a 51% assault all through any of the (A-G) methods?
(I’ve tried to search out any not widespreadly diffuse data, like
For instance 1: In Eclipse assault, the IP deal with of sufferer particular person is blocked or redirected in the direction of a competitor. IPsec makes use of SHA. So I feel it’s doable to discover a vulnerability this fashion, however I do not know how.
For instance 2: It’s written within the paper Off-Path TCP Exploits of the Blended IPID Project:
“TCP connections DoS assault is especially relevant to compromising purposes secured by encrypted visitors, e.g., HTTPS and SSH”.
I’ve tried to guess which quantum assault to sha256 is ready to assault bitcoin, however I’m not a pc scientist so please ANY info is wellcome)
[ad_2]
Supply hyperlink
Leave a Reply