This image has an empty alt attribute; its file name is attacksafe-software-logo-1024x213.png
This image has an empty alt attribute; its file name is attacksafe-software-logo-1024x213.png

In cryptography, a custom hardware Attack on Bitcoin uses specifically designed application-specific integrated circuits (ASIC) to decipher encrypted messages.

This image has an empty alt attribute; its file name is images.jpg

Mounting a cryptographic brute force Attack on Bitcoin requires a large number of similar computations: typically trying one key, checking if the resulting decryption gives a meaningful answer, and then trying the next key if it does not. Computers can perform these calculations at a rate of millions per second, and thousands of computers can be harnessed together in a distributed computing network. But the number of computations required on average grows exponentially with the size of the key, and for many problems standard computers are not fast enough. On the other hand, many cryptographic algorithms lend themselves to fast implementation in hardware, i.e. networks of logic circuits, also known as gates. Integrated circuits (ICs) are constructed of these gates and often can execute cryptographic algorithms hundreds of times faster than a general purpose computer.

The EFF’s “Deep Crack” machine contained 1,856 custom chips and could brute force a DES key in a matter of days — the photo shows a circuit board fitted with 32 custom Attack on Bitcoin chips

Each IC can contain large numbers of gates (hundreds of millions in 2005). Thus the same decryption circuit, or cell, can be replicated thousands of times on one IC. The communications requirements for these ICs are very simple. Each must be initially loaded with a starting point in the key space and, in some situations, with a comparison test value (see known plaintext Attack on Bitcoin). Output consists of a signal that the IC has found an answer and the successful key.

Since ICs lend themselves to mass production, thousands or even millions of ICs can be applied to a single problem. The ICs themselves can be mounted in printed circuit boards. A standard board design can be used for different problems since the communication requirements for the chips are the same. Wafer-scale integration is another possibility. The primary limitations on this method are the cost of chip designIC fabrication, floor space, electric power and thermal dissipation.

An alternative approach is to use FPGAs (field-programmable gate arrays); these are slower and more expensive per gate, but can be reprogrammed for different problems. COPACOBANA (Cost-Optimized Parallel COde Breaker) is one such machine, consisting of 120 FPGAs of type Xilinx Spartan3-1000 which run in parallel.

History

The earliest custom hardware Attack on Bitcoin may have been the Bombe used to recover Enigma machine keys in World War II. In 1998, a custom hardware Attack on Bitcoin was mounted against the Data Encryption Standard cipher by the Electronic Frontier Foundation. Their “Deep Crack” machine cost U.S. $250,000 to build and decrypted the DES Challenge II-2 test message after 56 hours of work. The only other confirmed DES cracker was the COPACOBANA machine (Cost-Optimized PArallel COde Breaker) built in 2006. Unlike Deep Crack, COPACOBANA consists of commercially available FPGAs (reconfigurable logic gates). COPACOBANA costs about $10,000[1] to build and will recover a DES key in under 6.4 days on average. The cost decrease by roughly a factor of 25 over the EFF machine is an impressive example for the continuous improvement of digital hardware. Adjusting for inflation over 8 years yields an even higher improvement of about 30x. Since 2007, SciEngines GmbH, a spin-off company of the two project partners of COPACOBANA has enhanced and developed successors of COPACOBANA. In 2008 their COPACOBANA RIVYERA reduced the time to break DES to the current record of less than one day, using 128 Spartan-3 5000’s.[2] It is generally believed[citation needed] that large government code breaking organizations, such as the U.S. National Security Agency, make extensive use of custom hardware Attack on Bitcoins, but no examples have been declassified as of 2005.

This image has an empty alt attribute; its file name is attacksafe-software-logo-1024x213.png
This image has an empty alt attribute; its file name is attacksafe-software-logo-1024x213.png