The Main Attack Methods Against Blockchain Cryptography Security

The article aims to spread basic knowledge on blockchain security, Welcome to follow us and discuss

Author: Sharon

Cryptography is a key barrier to ensure the security of transaction data on the blockchain. And the security achieved by cryptography is often provided by the mathematical problems on which the algorithm relies, rather than by keeping the implementation process of the algorithm confidential.

It is generally divided into symmetric encryption and asymmetric encryption. Symmetric encryption is fast but relatively easy to crack, while asymmetric encryption is the opposite.

Therefore, in practice, symmetric encryption and asymmetric encryption algorithms are generally used in combination.

Attacks against blockchain cryptography security occur from time to time, and the main attack methods are as follows:

(1)Exhaustive Attack

This type of attack mainly affects hash functions, and almost all hash functions are affected to some extent by this attack.

The degree of influence is not related to the function itself, but to the length of the generated hash, mainly a problem of probability theory. And the most typical of which is a “birthday attack” based on the birthday paradox.

(2)Collision Attack

This attack is mainly used in hash functions, and the typical case is the “MD5 digest algorithm”and “SHA1 digest algorithm”. Its attack principle is to find the weakness of the algorithm and disintegrate its strong collision resistance.

This feature weakens the hash function’s original feature that it takes quite a long time to find two values with different values but the same hash. Attackers can find two values with different values but the same hash in a relatively short time.

(3)Quantum computing attacks

Quantum computing poses a potential threat to cryptography. The number of quantum bits required by Shor quantum algorithm for RSA cracking is about 2n. The RSA algorithm currently used generally reaches 2048 bits (equivalent to a 256-bit ECC algorithm), which is a quantum computer that requires 4096 qubits.

But at present, quantum computers do not have such accurate computing power. So quantum computers are a long way from cracking existing cryptographic algorithms.

Lunaray also provides assets tracking services and has rich experience in recovering lost cryptocurrency for customers with blockchain traceability technology and security informations. You can trust Lunaray on any blockchain security issues .

And next week we will continue to talk about the security risks of blockchain cryptography and the corresponding countermeasures. Please stay tuned to Lunaray and discuss blockchain security issues with us.




Lunaray takes a leading position in smart contract auditing and consulting service for blockchain security.

Recommended from Medium

Detecting DNS Tunneling using Spark Structured Streaming

Macy’s Data Breach

The Cybersecurity labor shortage makes it an exciting time to be a service provider

How to run multiple FireFox profiles

[Some Interesting] Cloud ‘n Sec news: 15th Apr 22

Cloud Audit Logging


📰Great news! We're now officially collaborating with B.protocol 🤝

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store


Lunaray takes a leading position in smart contract auditing and consulting service for blockchain security.

More from Medium

Security scan report for OSKKing

10 Strategies for Cross-Chain Security

Knownsec Blockchain Lab | Discussion on the extractable value of miners (MEV)

Cryptography in Ethereum