Cryptology ePrint Archive: Report 2014/848
Private Key Recovery Combination Attacks: On Extreme Fragility of Popular Bitcoin Key Management, Wallet and Cold Storage Solutions in Presence of Poor RNG Events
Nicolas T. Courtois and Pinar Emirdag and Filippo Valsorda
Abstract: In this paper we study the question of key management and
practical operational security in bitcoin digital currency storage systems. We study the security two most used bitcoin HD Wallet key management solutions (e.g. in BIP032 and in earlier systems). These systems have extensive audit capabilities but this property comes at a very high price. They are excessively fragile. One small security incident in a remote corner of the system and everything collapses, all private keys can be recovered and ALL bitcoins within the remit of the system can be stolen. Privilege escalation attacks on HD Wallet solutions are not new. In this paper we take it much further. We propose new more advanced combination attacks in which the security of keys hold in cold storage can be compromised without executing any software exploit on the cold system, but through security incidents at operation such as bad random number or related random events.
In our new attacks all bitcoins over whole large security domains can be stolen by people who have the auditor keys which are typically stored in hot systems connected to the Internet and can be stolen easily. Our combination attacks allow to recover private keys which none of the earlier attacks in isolation could hope to recover. Classical bad random attacks typically concern only very few bitcoin accounts, and only some very lucky holders of bitcoins can actually steal other people's bitcoins.
In this paper we go beyond identical random attacks and show several
attacks which also work with related random events, which events are
more probable and yet less likely to be detected before it is too late. We also present several attacks which work across distinct security domains which share no common setup, code or keys. Yet in certain circumstances all the bitcoins in each domain can be stolen. All our attacks are practical and realistic given the numerous relevant events have already happened in the bitcoin blockchain hundreds of times, some as recently as September 2014.
It is not clear if this problem can be repaired, i.e. if there exists a key management solution with similar audit capabilities as BIP032 which would be immune against this sort of advanced combination attacks.
Category / Keywords: cryptographic protocols / applied cryptography, bitcoin, key management, security management, audit capability, digital signatures, ECDSA, HD Wallets, BIP032, privilege escalation attacks, bad RNG, RFC6979
Date: received 16 Oct 2014
Contact author: n courtois at ucl ac uk
Available format(s): PDF | BibTeX Citation
Version: 20141022:141237 (All versions of this report)
Short URL: ia.cr/2014/848
Discussion forum: Show discussion | Start new discussion
[ Cryptology ePrint archive ]