Getting started with blockchain | What is a 51% power attack?

Concerned about the bitcoin's small partners, I must have heard 51% of the power to attack the word, what does it mean, what kind of "bad things" can be done after launching this kind of attack? Today, I will briefly introduce the 51% of the power attack related matters.

In the Bitcoin white paper, there has been such a statement that the sum of the honest node control power is greater than the sum of the attacker's computing power of the cooperative relationship, and the system is safe.

In other words, when the computing power controlled by the malicious node in the system exceeds the computing power controlled by the honest node, the system is at risk of being attacked. This attack, initiated by a malicious node that controls more than 50% of the power, is called a 51% attack (51% Attack).

Is it possible that all cryptocurrency systems are at risk of a 51% power attack? In fact, it is not. Only the cryptocurrency based on the PoW (workload proof) consensus mechanism has 51% computational attacks, such as bitcoin, bit cash, and current Ethereum; instead of the cryptocurrency of the PoW consensus algorithm. There is no 51% power attack, such as EOS, TRON, etc. based on the DPoS (trusted equity) consensus mechanism.

After learning about the 51% power attack, you must be curious about what bad things can be done with this attack.

1. Double Spending . Double flower means that a "money" has been spent twice or even many times.

How does the 51% power attack strike a double flower? Suppose Xiaohe has 666BTC. He also pays the coins and sends them to his other wallet address. In other words, a small black money is transferred to two people at the same time. In the end, the deal sent to Dabai was first confirmed and packaged in a block with a block height of N.

At this time, it controlled the black of more than 50% of the power, and launched a 51% power attack. By reassembling the Nth block, he packaged the deal into his block and continued to extend the block on the chain. Due to the power of computing power, this quantity will become the longest legal chain . This small black 666BTC double flower success, the 666BTC in the big white wallet "missed".

2. Suppress certain addresses to send/receive bitcoin

In addition, what can 51% of the power attack do? It can also suppress the transmission/reception of bitcoin at an address.

Xiao Hei and Da Bai quarreled, and Xiao Hei relied on 51% of his computing power. He knew that the big white bitcoin address could make the transaction related to Dabai unrecognizable. For example, in order to express his respect to Nakamoto, Dabai wants to send a bitcoin to the "Creation Address". The black that controls more than half of the computing power will not pack the deal, not only that, but also the other miners will not pack the deal. How did Xiaohe do it?

If the new block dug by other miners packs the deal, Xiaohe will choose not to continue mining after this block. He will choose to rebuild the new block after the last block and reject the deal. Relying on your own computing power, this chain of small blacks will become the longest legal chain.

Under this circumstance, other miners will not have to package the transactions related to Dabai, otherwise the excavated blocks will be isolated by Xiaohei, and the rewards will also be invalidated.

If you have more than 50% of your computing power, you can do whatever you want. What can you do with bad things? Actually not. Even if you control more than 50% of the calculation power, you can't transfer other people's coins (stolen coins), because this operation requires a private key to sign. If you want to forge a signature to "steal the currency," this behavior is an honest miner can't. Tolerance, this will subvert the system consensus. In this case, other miners will not continue to expand the blockchain after the blocks he has dug, and will actively fork out the legal blockchain, and the blocks excavated by the “stolen coins” miners will be isolated.

In addition, the system's block rewards are modified. For example, the block reward is changed from the current 12.5BTC to 50BTC. This behavior is also a subversion of the system consensus. Honest miners will refuse to branch out a new chain in such illegal blocks. .

——End——

Author | Yan Wenchun

Produced|Baihua blockchain (ID: hellobtc)

『Declaration : This series of content is only for the introduction of blockchain science, and does not constitute any investment advice or advice. If there are any errors or omissions, please leave a message.

We will continue to update Blocking; if you have any questions or suggestions, please contact us!

Share:

Was this article helpful?

93 out of 132 found this helpful

Discover more

News

Radpie: Upcoming launch of RDNT's "Convex"

Penpie's $PNP IDO has risen fivefold since its opening. Taking advantage of the momentum, Magpie announced that it wi...

Market

Opportunity and risk, BRC-20 brings Bitcoin into the "smart era"

We will introduce the development process of BRC-20 in this article, and objectively analyze its value and risks, i...

Project

Ethereum Ecosystem Privacy Use Cases and Project Overview

DeFi, Privacy, ETH, Overview of Privacy Use Cases and Projects in the Ethereum Ecosystem. LianGuai, Privacy Solutions...

News

Is Ethereum Ethscriptions going backwards? Will Eths replicate the Ordibehesht myth a thousand times?

Ordinals Community and Ordinals World believe that eths is not only expanding the ordinals consensus but also creatin...

Blockchain

Latest article by Vitalik: Keeping it Simple and Avoiding Ethereum Consensus Overload

We should maintain the minimalism of the chain, support the use of re-staking, instead of expanding the role of Ether...

News

Founder Team Explains EigenDA Bringing Scalable Data Availability to Rollups

EigenDA is a secure, high-throughput, decentralized data availability (DA) service on Ethereum.