Non interactive anti-exfil (airgap compatible)

Posted by sipa

Aug 21, 2024/15:06 UTC

The inquiry revolves around the feasibility of estimating the number of signatures required to compromise a 128 or 256-bit seed, specifically when Forward Error Correction (FEC) codes are applied, which are considered nearly flawless from an information-theoretical standpoint. The discussion hinges on the premise that if one can perform (2^b) grinding steps for each signature, it becomes possible to leak (b) bits per signature. Consequently, to fully leak a 128-bit seed, one would need (128 / b) signatures. This mathematical relationship underlines the direct proportionality between the number of signatures and the ability to leak bits of the seed, emphasizing the potential vulnerability and the computational effort required to exploit such cryptographic systems.

Link to Raw Post
Bitcoin Logo

TLDR

Join Our Newsletter

We’ll email you summaries of the latest discussions from authoritative bitcoin sources, like bitcoin-dev, lightning-dev, and Delving Bitcoin.

Explore all Products

ChatBTC imageBitcoin searchBitcoin TranscriptsSaving SatoshiBitcoin Transcripts Review
Built with 🧡 by the Bitcoin Dev Project
View our public visitor count

We'd love to hear your feedback on this project?

Give Feedback