MoneroResearch.info

WIKINDX Resources

Macheta, J., Noether, S., Noether, S., & Smooth, J. (2014). Counterfeiting via Merkle Tree Exploits within Virtual Currencies Employing the CryptoNote Protocol. Unpublished manuscript. 
Added by: Rucknium (2/22/22, 5:26 PM)   Last edited by: Rucknium (2/22/22, 5:58 PM)
Resource type: Manuscript
BibTeX citation key: Macheta2014
View all bibliographic details
Categories: Monero-focused
Creators: Macheta, Noether, Noether, Smooth
Collection: Monero Research Lab
Views: 60/2220
Attachments   MRL-0002.pdf [22/1138] URLs   MRL, MRL-0002 PDF
Abstract
On 4 September 2014, an unusual and novel attack was executed against the Monero cryptocurrency network. This attack partitioned the network into two distinct subsets which refused to accept the legitimacy of the other subset. This had myriad effects, not all of which are yet known. The attacker had a short window of time during which a sort of counterfeiting could occur, for example. This research bulletin describes deficiencies in the CryptoNote reference code allowing for this attack, describes the solution initially put forth by Rafal Freeman from Tigusoft.pl and subsequently by the CryptoNote team, describes the current fix in the Monero code base, and elaborates upon exactly what the offending block did to the network. This research bulletin has not undergone peer review, and reflects only the results of internal investigation.
  
WIKINDX 6.10.2 | Total resources: 233 | Username: -- | Bibliography: WIKINDX Master Bibliography | Style: APA Enhanced