Análise dos Mecanismos de Geração e Armazenamento de Chaves em Carteiras de Criptomoedas

  • Anderson O. de Souza CEFET-RJ
  • José Vitor H. da Silva CEFET-RJ
  • Nilson M. Lazarin CEFET-RJ

Abstract


This paper describes a security analysis of a list of applications known as crypto wallets, focusing on keys generation and storage. This analysis aims to inform future users about the security level implemented, to expose technical details of its internal components, as well as methods for wallet backup and restoration. Six wallets were selected according to the possibility of access to the source code and popularity, then they were evaluated using a set of eight relevant parameters when it comes to security

References

Antonopoulos, A. M. (2015). Mastering bitcoin. O’Reilly, Sebastopol CA, 1º edition.

Charoenwong, B. and Bernardi, M. (2021). A decade of Cryptocurrency ‘hacks’: 2011 – 2021. 91. http://doi.org/10.2139/ssrn.3944435.

Ferguson, N. and Schneier, B. (2003). Practical cryptography. Wiley, New York.

He, D., Li, S., Li, C., Zhu, S., Chan, S., Min, W., and Guizani, N. (2020). Security analysis of cryptocurrency wallets in android-based applications. IEEE Network, 34(6):114–119. https://doi.org/10.1109/MNET.011.2000025.

Mori Lazarin, N., Machado Coelho, I., Pantoja, C. E., and Viterbo, J. (2023). Velluscinum: A middleware for using digital assets in multi-agent systems. In Mathieu, P., Dignum, F., Novais, P., and De la Prieta, F., editors, Advances in Practical Applications of Agents, Multi-Agent Systems, and Cognitive Mimetics. The PAAMS Collection, pages 200–212, Cham. Springer Nature Switzerland. https://doi.org/10.1007/978-3-031-37616-0_17.

Palatinus, M., Rusnak, P., Voisine, A., and Bowe, S. (2013). BIP 39: Mnemonic code for generating deterministic keys. [link].

Suratkar, S., Shirole, M., and Bhirud, S. (2020). Cryptocurrency wallet: A review. In 2020 4th International Conference on Computer, Communication and Signal Processing (ICCCSP), pages 1–7. DOI: 10.1109/ICCCSP49186.2020.9315193.

Taaki, A. (2013). BIP 1: Bip purpose and guidelines. [link].

Volety, T., Saini, S., McGhin, T., Liu, C. Z., and Choo, K.-K. R. (2019). Cracking Bitcoin wallets: I want what you have in the wallets. Future Generation Computer Systems, 91:136–143. https://doi.org/10.1016/j.future.2018.08.029.

Wuille, P. (2012). BIP 32: Hierarchical Deterministic Wallets. [link].
Published
2023-09-18
SOUZA, Anderson O. de; SILVA, José Vitor H. da; LAZARIN, Nilson M.. Análise dos Mecanismos de Geração e Armazenamento de Chaves em Carteiras de Criptomoedas. In: WORKSHOP ON SCIENTIFIC INITIATION AND UNDERGRADUATE WORKS - BRAZILIAN SYMPOSIUM ON CYBERSECURITY (SBSEG), 23. , 2023, Juiz de Fora/MG. Anais [...]. Porto Alegre: Sociedade Brasileira de Computação, 2023 . p. 279-284. DOI: https://doi.org/10.5753/sbseg_estendido.2023.234362.

Most read articles by the same author(s)