Posts tagged James Lovejoy
Cointelegraph covers James Lovejoy's Presentation at CESC 20': "MIT Crypto Group Researcher Says PoW Attacks Not Always Obvious"

DCI James Lovejoy and Gert-Jaap Glasbergen presented during this past weeks Crypto Economic Security Conference: Unitize Online Event July 6-10th, 2020. Their Proof-of-Work presentation combines Gert-Jaap’s work on Pool Detective and James’s work on 51% Attacks.

Read More
Reorgs on Bitcoin Gold: Counterattacks in the wild - Medium Post by James Lovejoy

The economic security of Bitcoin and other proof-of-work cryptocurrencies relies on how expensive it is to rewrite the blockchain. If a 51% attack were economically feasible, an attacker could send a transaction to a victim, launch the attack, and then double spend the same coins back to themselves. Satoshi Nakamoto assumed that this would not occur because a majority of miners would find it more lucrative to honestly follow the protocol than to attack the chain, the source of their own mining revenues.

Recent work has shown the cost of attack on a coin can vary widely. This cost depends on factors like the liquidity of hashrate, the impact on coin price, and the length of the required rewrite; under certain circumstances an attack could even be free. As of March 2020 for chains like Bitcoin, miners make large advance investments in mining equipment and are reluctant to rent any significant fraction of the chain’s hashpower, making the cost today likely quite high. Some coins, however, use proof-of-work algorithms for which there is enough new hashrate for rent to cost-effectively launch 51% attacks, and there have been double-spend attackson these coins observed in practice. Using hashrate markets like NiceHash, buyers and sellers can easily find each other. It is now commonly believed that low hashrate coins, coins that are not the largest in their proof-of-work algorithm class, and coins for which there is a liquid hashrate rental market are all susceptible to cheap 51% attacks and are insecure.

In a recent paper titled Double-Spend Counterattacks, we discuss a strategy to prevent 51% attacks in vulnerable proof-of-work based coins: the victim can counterattack. We show that the victim’s ability to rent hashrate and mine on the original chain, overtaking the attacker chain in the event of an attack, can deter the attack from happening at all in equilibrium. The results hold under the following assumptions: (1) the victim suffers a moderate reputational cost to losing that the attacker does not suffer (e.g. exchanges may suffer negative reputation cost if attacked while anonymous attackers do not), and (2) the net cost of attack increases over time (e.g. by coin value dropping or the cost of hashrate rising). While we had no evidence for double-spend counterattacks in the real world at the time we wrote the paper, we recently saw what we think are counterattacks on Bitcoin Gold…

Read More
Forbes's "Bitcoin Rival Suffers Devastating Attack" reviews DCI's James Lovejoy's discovery of a '51% Attack'

“Bitcoin gold, a relatively minor cryptocurrency that split off from the original bitcoin blockchain in late 2017, has suffered a so-called 51% attack resulting in over $72,000 worth of bitcoin gold tokens being double spent.

A 51% attack can occur when malicious cryptocurrency miners take control of tokens' blockchain and is the second time it's now happened to bitcoin gold which saw $18 million worth of bitcoin gold stolen in May 2018.

The price of bitcoin gold, which ranks as the 36th most valuable cryptocurrency according to CoinMarketCap data, jumped following reports of the attack, moving counterintuitively considering the seriousness of an attack of this type and suggesting the market for smaller tokens is still far from maturity…”

Read More
Cryptanalysis of Curl-P and Other Attacks on the IOTA Cryptocurrency

By Ethan Heilman (Boston Uni), Neha Narula (MIT Media Lab), Garrett Tanzer (Harvard), James Lovejoy (MIT Media Lab), Michael Colavita (Harvard), Madars Virza (MIT Media Lab), and Tadge Dryja (MIT Media Lab)

We present attacks on the cryptography formerly used in the IOTA blockchain, including under certain conditions the ability to forge signatures. We developed practical attacks on IOTA’s cryptographic hash function Curl-P-27, allowing us to quickly generate short colliding messages. These collisions work even for messages of the same length. Exploiting these weaknesses in Curl-P-27, we broke the EU-CMA security of the former IOTA Signature Scheme (ISS). Finally, we show that in a chosen-message setting we could forge signatures and multi-signatures of valid spending transactions (called bundles in IOTA).

Read More