So is everyone going to give up and stop mining Bitcoin now? ... In 2013, The New York Times stated that Dual Elliptic Curve Deterministic Random Bit Generation (or Dual_EC_DRBG) had been included as a NIST national standard due to the influence of NSA, which had included a deliberate weakness in the algorithm and the recommended elliptic curve ... Up until 2015, Juniper Networks was still using Dual_EC_DRBG in the operating system for its NetScreen VPN routers. There were supposedly countermeasures in place to disable the backdoor, but toward the end of the year it was discovered that code which voided these defenses had been inserted by unknown attackers . In 2013, after the publication by Edward Snowden, the world learned that under the pressure of the NSA, NIST standardized the Dual_EC_DRBG pseudo-random number generator (based on EC) — one of the recommended for use in cryptographic products and implemented in such a form by dozens of vendors. Back in 2007, Bruce Schneier reported on a backdoor found in NIST’s Dual_EC_DRBG random number generator: But today there’s an even bigger stink brewing around Dual_EC_DRBG. In an informal presentation (.pdf) at the CRYPTO 2007 conference in August, Dan Shumow and Niels Ferguson showed that the algorithm contains a weakness that can only be ... The most popular incident of which is Dual_EC_DRBG. Dual Elliptic Curve Deterministic Random Bit Generator is an algorithm that was presented as a cryptographically secure pseudorandom number generator (CSPRNG) using methods in elliptic curve cryptography ( used in Bitcoin to create private and public key ).
[index]          
Computations involved in mining Bitcoin are astronomical. Professor Phil Moriarty explains how estimating the energy useage is a Fermi problem. ... The suspicion about Dual_EC_DRBG - The Dual ... § Dual_EC_DRBG random generator backdoor 2. Body Hashing (one Way) ... Special Hash calculating hardware is becoming more available especially with the BitCoin push. In this talk we'll take a look at some of the many ways that cryptographic systems have failed over the years, from accidental design flaws like the Data Encryption Standard (DES) defeat so ...