We can't find the internet
Attempting to reconnect
Something went wrong!
Hang in there while we get back on track
Small Leaks, Billions Of Dollars: Practical Cryptographic Exploits That Undermine Crypto Wallets
Small leaks can have devastating consequences in cryptocurrency wallets, compromising security and stealing cryptocurrency.
- Small leaks can have significant consequences in cryptocurrency wallets, including the potential for private key exfiltration.
- Multi-party computation (MPC) wallets are prone to attacks that compromise their security, including key leakage and private key exfiltration.
- The presentation discusses two attacks on MPC wallets, with the goal of compromising their security and stealing cryptocurrency.
-
The first attack involves using a malicious value for
N
in the Lindell 17 protocol, which allows the attacker to exfiltrate the private key. - The second attack involves using a homomorphic encryption scheme to encrypt the ciphertext and then decrypt it offline, allowing the attacker to reconstruct the private key.
- The attacks were demonstrated using open-source implementations of the Lindell 17 and GG18 protocols.
- The presentation also includes a discussion of the importance of responsible disclosure and the potential consequences of not disclosing vulnerabilities in a timely manner.
- The attacks were disclosed to the affected vendors, and they have since mitigated the issues.
- The presentation concludes by emphasizing the need for greater attention to the security of MPC wallets and the potential consequences of not doing so.
- The use of homomorphic encryption and other cryptographic techniques can be used to improve the security of MPC wallets.
- The presentation also includes a discussion of the importance of zero-knowledge proofs in cryptographic protocols.
- The attacks were demonstrated using a combination of mathematical and computational techniques.