• Title/Summary/Keyword: 51% attack

Search Result 116, Processing Time 0.029 seconds

Feasibility Analysis of Majority Attacks on Blockchains (블록체인에 있어 다수 공격에 대한 타당성 분석)

  • Kim, Il-Hwan
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.67 no.12
    • /
    • pp.1685-1689
    • /
    • 2018
  • In this research, 51% attack or majority attack is becoming an important security issue for proof of work based blockchains. Due to decentralized nature of blockchains, any attacks that shutdowns the network or which take control over the network is hard to prevent and assess. In this paper, different types of majority attack are summarized and the motivations behind the attacks are explained. To show the feasibility of the majority attack, we build an example mining machines that can take control over two of the public blockchains, Vertcoin and Monero.

New consensus algorithm against 51% attack (51% 공격에 저항 가능한 신규 합의 알고리즘)

  • Kim, In-Yeung;Park, Ji-Soo;Lee, Chang-Hoon
    • Annual Conference of KIPS
    • /
    • 2018.10a
    • /
    • pp.288-291
    • /
    • 2018
  • 블록체인은 암호화폐의 기반이 되는 기술로 데이터를 P2P 분산 방식으로 체인 형태로 기록하여 보안성과 안전성을 갖?다. 중앙 집권화에서 벗어나 사용자들의 네트워크에서 자유롭고 안전한 거래를 가능하게 하는 블록체인은 현재 스마트 계약, 암호화폐, 개인 정보 인증 등 다양한 방법으로 활용되고 있다. 블록체인 사용자들은 거래의 안전성을 위해 채굴이라는 과정으로 블록을 인증하는데 절반 이상의 해시파워를 가진 공격자가 거래내역을 조작하는 것이 51% attack이다. 채굴자들은 채굴을 위해 전문 장비를 개발하고 이익을 도모하기 위해 모이면서 큰 집단으로 모이면서 51% attack에 대한 공격가능성이 높아졌고 실제로 엄청난 피해를 입힌 공격 사례가 있다. 따라서 본 논문은 51% attack의 사례와 기존 대응방안인 PoS 방식과 dPoW 방식 및 각 방식에 대한 한계를 분석하였고 이를 보완한 새로운 블록체인 모델을 제안한다.

Implementation and Analysis of Power Analysis Attack Using Multi-Layer Perceptron Method (Multi-Layer Perceptron 기법을 이용한 전력 분석 공격 구현 및 분석)

  • Kwon, Hongpil;Bae, DaeHyeon;Ha, Jaecheol
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.5
    • /
    • pp.997-1006
    • /
    • 2019
  • To overcome the difficulties and inefficiencies of the existing power analysis attack, we try to extract the secret key embedded in a cryptographic device using attack model based on MLP(Multi-Layer Perceptron) method. The target of our proposed power analysis attack is the AES-128 encryption module implemented on an 8-bit processor XMEGA128. We use the divide-and-conquer method in bytes to recover the whole 16 bytes secret key. As a result, the MLP-based power analysis attack can extract the secret key with the accuracy of 89.51%. Additionally, this MLP model has the 94.51% accuracy when the pre-processing method on power traces is applied. Compared to the machine leaning-based model SVM(Support Vector Machine), we show that the MLP can be a outstanding method in power analysis attacks due to excellent ability for feature extraction.

A Differential Fault Attack against Block Cipher HIGHT (블록 암호 HIGHT에 대한 차분 오류 공격)

  • Lee, Yu-Seop;Kim, Jong-Sung;Hong, Seok-Hee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.3
    • /
    • pp.485-494
    • /
    • 2012
  • The block cipher HIGHT is designed suitable for low-resource hardware implementation. It established as the TTA standard and ISO/IEC 18033-3 standard. In this paper, we propose a differentail fault attack against the block cipher HIGHT. In the proposed attack, we assume that an attacker is possible to inject a random byte fault in the input value of the 28-th round. This attack can recover the secret key by using the differential property between the original ciphertext and fault cipher text pairs. Using 7 and 12 error, our attack recover secret key within a few second with success probability 87% and 51%, respectively.

Research on Security Threats Emerging from Blockchain-based Services

  • Yoo, Soonduck
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.13 no.4
    • /
    • pp.1-10
    • /
    • 2021
  • The purpose of the study is to contribute to the positive development of blockchain technology by providing data to examine security vulnerabilities and threats to blockchain-based services and review countermeasures. The findings of this study are as follows. Threats to the security of blockchain-based services can be classified into application security threats, smart contract security threats, and network (P2P) security threats. First, application security threats include wallet theft (e-wallet stealing), double spending (double payment attack), and cryptojacking (mining malware infection). Second, smart contract security threats are divided into reentrancy attacks, replay attacks, and balance increasing attacks. Third, network (P2P) security threats are divided into the 51% control attack, Sybil attack, balance attack, eclipse attack (spread false information attack), selfish mining (selfish mining monopoly), block withholding attack, DDoS attack (distributed service denial attack) and DNS/BGP hijacks. Through this study, it is possible to discuss the future plans of the blockchain technology-based ecosystem through understanding the functional characteristics of transparency or some privacy that can be obtained within the blockchain. It also supports effective coping with various security threats.

An estimated angle of attack of a cambered otter board in a bottom trawl using three dimensional position (저층 트롤에서 3차원 위치를 이용한 만곡형 전개판의 영각 추정)

  • Go, Gwang Su;Chol, Bong Kon;Bae, Jae Hyun;Cho, Seong-Ok;Won, Sung-Jae;Yoon, Hong Keun;Park, Hae-Hoon
    • Journal of the Korean Society of Fisheries and Ocean Technology
    • /
    • v.51 no.1
    • /
    • pp.26-34
    • /
    • 2015
  • The angle of attack of a cambered otter board in a bottom trawl was estimated using a three-dimensional semi-analytic treatment of a towing cable (warp) system that was applied to the field experiments of a bottom trawl obtained by the Scanmar system. The equilibrium condition of the horizontal component and vertical component of forces was used to the three forces acting on the otter board in the horizontal plane. Those forces were the force on the warp at the bracket, hydrodynamic lift and drag forces on the otter board and the force on the hand rope attached just behind the otter board. Also the equilibrium of moment about the front edge of the otter board was used to find out the angle of attack of the cambered otter board. When the warp length was 120m and 180m long and the towing speed was between 1.23 and 1.90 m/s, the estimated angle of attack of the cambered otter board was ranged between $26.1^{\circ}$ and $29.6^{\circ}$, respectively, though the maximum lift force was at the angle of attack $22.6^{\circ}$. The angle of attack of the otter board was tended to increase weakly with the longer length of warp (180 m) at the same towing speed in the experiment.

Experimental Analysis of Optical Fault Injection Attack for CRT-RSA Cryptosystem (CRT-RSA 암호시스템에 대한 광학적 오류 주입 공격의 실험적 연구)

  • Park, Jea-Hoon;Moon, Sang-Jae;Ha, Jae-Cheol
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.3
    • /
    • pp.51-59
    • /
    • 2009
  • The CRT-RSA cryptosystem is very vulnerable to fault insertion attacks in which an attacker can extract the secret prime factors p, q of modulus N by inserting an error during the computational operation on the cryptographic chip. In this paper, after implementing the CRT-RSA cryptosystem, we try to extract the secret key embedded in commercial microcontroller using optical injection tools such as laser beam or camera flash. As a result, we make sure that the commercial microcontroller is very vulnerable to fault insertion attacks using laser beam and camera flash, and can apply the prime factorization attack on CRT-RSA Cryptosystem.

Protection Technologies against Large-scale Computing Attacks in Blockchain (블록체인에서 대용량 컴퓨팅 공격 보호 기술)

  • Lee, Hakjun;Won, Dongho;Lee, Youngsook
    • Convergence Security Journal
    • /
    • v.19 no.2
    • /
    • pp.11-19
    • /
    • 2019
  • The blockchain is a technique for managing transaction data in distributed computing manner without the involvement of central trust authority. The blockchain has been used in various area such as manufacturing, culture, and public as well as finance because of its advantage of the security, efficiency and applicability. In the blockchain, it was considered safe against 51% attack because the adversary could not have more than 50% hash power. However, there have been cases caused by large-scale computing attacks such as 51% and selfish mining attack, and the frequency of these attacks is increasing. In addition, since the development of quantum computers can hold exponentially more information than their classical computer, it faces a new type of threat using quantum algorithms. In this paper, we perform the security analysis of blockchain attacks composing the large computing capabilities including quantum computing attacks. Finally, we suggest the technologies and future direction of the blockchain development in order to be safe against large-scale computing attacks.

Analysis of Complications of Ambulatory General Anesthesia after Discharge in Patients Who are Taking Anticonvulsant (항경련제를 복용하고 있는 지적장애 환자의 외래전신마취 하 치과치료 후 합병증 발생 조사 연구)

  • Cha, Min-Joo;Seo, Kwang-Suk;Kim, Mi-Seon;Kim, Hyun-Jeong
    • Journal of The Korean Dental Society of Anesthesiology
    • /
    • v.14 no.2
    • /
    • pp.95-100
    • /
    • 2014
  • Background: About 60% of patients with epilepsy showed a variety of complications after returning home. The purpose of this study is to get further information and to help in the anesthetic management of the disable patients with epilepsy. Methods: After searching the outpatient anesthesia list of Seoul National University Dental Hospital clinic of the disabled from September 2010 to March 2012, we found total 83 patient cases who were taking antiepileptic drugs. A nurse of anethesiology department called to the patient's home after general anesthesia and got surveys with questionnaires form filled with complications at home. We enrolled total of 51 patients who agreed to participate this survey. And we also reviewed pre-anesthesia evaluation sheet, anesthesia record, and recovery and discharge record. Results: 11 of 51 (21.6%) patients had seizure convulsion at home within 1 weeks. 33.4% of patients who had at least once seizure attack per week had a seizure attack within 3 days. And 50% of once a month frequency patients had a seizure attack within 1 week. 33% of 1 - 3 seizure attacks per year patient group had a convulsion within 1 week. But there was no seizure attack within 1 week in whom had no seizure attack history during more than 1 year. Conclusions: After dental treatment, patient taking anticonvulsant have so many complications-especially seizure, more than we respected. We need more research about handle these problems.

Implementation of Attack Generation Test-Suite for Security System Testing (보안 시스템 테스트를 위한 공격 발생 테스트슈트 구현)

  • 김환국;서동일;이상호
    • Proceedings of the Korea Information Assurance Society Conference
    • /
    • 2004.05a
    • /
    • pp.51-55
    • /
    • 2004
  • Currently, internet is deeply rooted in everyday life and many things are performed using internet in real-world, increased internet user because convenience. But then, internet accident is on the increase rapidly. Therefore, it is necessary that testing system generate automatically various attack patterns and traffic. In this paper, we describe method of design and implementation about AGT(attack generation test suite : simulator) system which generate various attack patterns using multiple agents.

  • PDF