Attacking proof of work

Security Assumptions

  • The hash function used in the algorithm should be secure, meaning it is a one-way function and has collision resistance.

  • The difficulty level should be set appropriately to ensure that the difficulty of finding a valid block header is proportional to the hash rate of the network.

  • The majority of miners in the network are assumed to be honest.

Violation of Security Assumptions

  • If the hash function is not secure, a miner who discovers this fact can gain an unfair advantage.

  • If the difficulty level is set too high, it could lead to a denial of service attack where blocks are not being created.

  • If the difficulty level is set too low, an attacker could create a malicious version of the blockchain that becomes longer than the legitimate one.

  • If the majority of miners are dishonest, the proof of work algorithm fails.

Vulnerabilities

  • 51% Attack: If an attacker controls more than 50% of the network's hash power, they can potentially manipulate the blockchain by creating a longer chain of blocks.

  • Denial of Service Attacks: If the difficulty level is set too high, it can prevent the creation of new blocks, causing a denial of service.

Last updated