Netinfo Security ›› 2018, Vol. 18 ›› Issue (1): 38-44.doi: 10.3969/j.issn.1671-1122.2018.01.006

• Orginal Article • Previous Articles     Next Articles

The Second-preimage Attack to Blockchain Based on the Structure of Merkle Hash Tree

Maoning WANG(), Meijiao DUAN   

  1. Department of Information, Central University of Finance and Economics, Beijing 100081, China
  • Received:2017-10-20 Online:2018-01-20 Published:2020-05-11

Abstract:

Blockchain technology is a kind of emerging information technology model. It is widely regarded as a promising concept because of its advantages such as decentralization, high efficiency, and transparency. The breadth of application scenarios and the underlying layer of application determine that the security of the blockchain must be guaranteed. Hash functions are one of the most important foundations for providing the blockchain’s usability and security. Starting from Hash functions in the blockchain and based on the principle of cryptanalysis, this paper presents a type of second preimage attack on the existing blocks by employing the structure and workflow of the blockchain. Specially, the attack constructed in this paper uses the fact that the Hash values in the leaf nodes of a Merkle tree have the same status. After theoretical analysis of proving that the complexity of such an attack is lower than that of trivial brute-force, the attack’s concrete steps based on Hellman’s time-memory tradeoff principle are also described. The conclusion of the attack shows that both the mathematical structure of the Hash function itself and data format of blockchain transaction records are important to the security of the blockchain. This should be considered in the future when we design blockchain systems.

Key words: blockchain, Merkle tree, second-preimage attack, Hellman’s time-memory tradeoff;

CLC Number: