You are on page 1of 5

A project report

On Summary
Topic:

survey of security threats and possible attacks on Block Chain

Submitted to:

Sir Rashid
Submitted by:
Rana Isharib khan

Roll no:
BITM-F16-033

Course:
SNA
survey of security threats and possible attacks on Block Chain
SUMMARY
As blockchain is a type of emerging technology that have major impacts on future technology
trend. It involves around the computing algorithm to provide distributed communication in a
peer-to-peer network of subscribers where the transactions are transparent among the parties
involved.Blockchain is specially build for technology like bitcoin but it have interest in
industries (such as secure contracts, financial transactions, sharing health information, etc.)
The fundamental questions need to be addressed in terms of Blockchain’s security, privacy
and limitations concerns also need to discussed. The survey paper gives a viewpoint of
blockchain security concerns and summarize recent developments.

It has the potential to disrupt many areas of art in the future. But as a new undeveloped court,
It detects many problems that are found mainly in security. Security concerns do not come
from distribution only problem of continuity of operation. The report starts with an overview
of the blockchain security system and then highlights the specifc security threats and
summarizes them.

Security types
Algorithm based security
DSA is an asymmetric basic encryption system there a private key is used to sign digital
messages and a public key can be used to authenticate those messages. The variable elliptical
curve of DSA, ECDSA, is widespread used in block implementation Force module
algorithms. Elliptical curls are good cryptographic operations are defined by a known domain
parameters. A number of such converters, some are standardized NIST, IEEE, ANSI and
other groups are available.

Hashing operations based security


A well design hash function should support hidden property, non-conflict and puzzler
compatibility support. Given the hash exit, the hidden property needs to be hard to find. The
property of collision resistance requires that it be difficult to obtain the input of two explicit
words that produce the same hash results. Given the hash target, the consistency of the puzzle
requires that for any hash product, it will be difficult to find an item with the hash and input
entries such that the output is in the target state.
Major threats in blockchain

Threats in cryptographic operations


Digital signature algorithm (DSA), which is based on asymmetric key cryptography, and
cryptographic hashing are the primary algorithms used in blockchain implementations. The
specifc algorithms is chosen by the application developers of blockchain technology.

Threats in Cryptographic key


There is an introduction to some kind of purposeful weakness as NIST has previously
published standards for random security of template number based on elliptic functions that
are called Dual_EC_DRBG. Back row was suspected even before the standards were
published and it was revealed later in a Reuters article that RSA Security was paid $ 10
million to install the algorithm as Unsubscribed number generator for RSA BSAFE.The
library, though RSA denies the allegation.

Identity attacks
When adversary attack the blockchain network by trying to compromise blockchain users
identity, it is referred as Identity attack. Some of these attack are described below

 Replay attack
a
It is a type of attack in which an attacker attack communication between two
legitimate groups and gain access. Holding the hash key and reusing it to make the
attacker a user which is a common threat to hacking in the blockchain space.
 Impersonation attack
When some user want to gain access using ESDSA algorithm.
 Sybil attack
This is a general type of attack on the peer network where most of the fraud is
committed and controlled by a single rogue division. The type of attack is used to
differentiate the target area from others which is used to implement various types of
attacks.

Manipulation based attacks


Different types of spinal attacks can occur where one or more nodes in the blockchain
network may be partly or which is completely isolated from the rest of the network so
that it can be malicious Objectives.
 Quantum based attack
The most popular cryptographic algorithms have long been threatened by the
looming era of quantum computing. ECC and ECDSA, being based the elliptic curve
discrete logarithm problem (ECDLP).
 Reputation attack
A user in block chain can change his reputation from negative to a positive one and
can fool the framework. Tempering the user reputation is another big concern for the
block chain community. It can be done mainly two way one is hiding the negative
transaction and another is creating a new account.

BlockChain vulnerability reason and counter


Measures and solution for blockchain
 Security solution
From survey reading ,LNSC protocol has been introduced and was able to solve key attack ,
replay attack, impersonation attack, modification attack and man in the middle attack.
Another resistant protocol name BSeIN protocol was introduced recently which uses
blocksize limitation with attribute based signatures and multi receivers encryption.

 Privacy challenges
blockchain technology can be efectively added in vehicle to grid networks, It introduces a
registration and data maintenance process , which ensures the anonymity of user payment
data while enabling payment auditing by privileged users.

 Scalability solution
To solve the scalability problem in blockchain several research work is being progressed.
Recently one of the patents [31] fled where Guerney et al. invented a way to vynamic
recording of blockchain transactions to optimize performance and scalability

Conclusion
 The conclusion of this survey is to summarize all possible attacks on blockchain and
threats with their solution that how tackle these attacks by observing with keen
interest on threat of blockchain.
 The survey tells about and aware all of those who are going to invest in blockchain as
a business to check al of these point that are written in paper for betterment.

You might also like