Small Leaks, Billions Of Dollars: Practical Cryptographic Exploits That Undermine Crypto Wallets

Small leaks can have devastating consequences in cryptocurrency wallets, compromising security and stealing cryptocurrency.

Key takeaways
  • Small leaks can have significant consequences in cryptocurrency wallets, including the potential for private key exfiltration.
  • Multi-party computation (MPC) wallets are prone to attacks that compromise their security, including key leakage and private key exfiltration.
  • The presentation discusses two attacks on MPC wallets, with the goal of compromising their security and stealing cryptocurrency.
  • The first attack involves using a malicious value for N in the Lindell 17 protocol, which allows the attacker to exfiltrate the private key.
  • The second attack involves using a homomorphic encryption scheme to encrypt the ciphertext and then decrypt it offline, allowing the attacker to reconstruct the private key.
  • The attacks were demonstrated using open-source implementations of the Lindell 17 and GG18 protocols.
  • The presentation also includes a discussion of the importance of responsible disclosure and the potential consequences of not disclosing vulnerabilities in a timely manner.
  • The attacks were disclosed to the affected vendors, and they have since mitigated the issues.
  • The presentation concludes by emphasizing the need for greater attention to the security of MPC wallets and the potential consequences of not doing so.
  • The use of homomorphic encryption and other cryptographic techniques can be used to improve the security of MPC wallets.
  • The presentation also includes a discussion of the importance of zero-knowledge proofs in cryptographic protocols.
  • The attacks were demonstrated using a combination of mathematical and computational techniques.