- Aug 28, 2015
- 517
- 1,679
Some services need to keep and generate private keys online. I was thinking about obfuscation today.
I was daydreaming about generating an array of ECDSA key pairs and then randomly symmetrically encrypting them together into a chain. Keypair n=1 contains the address for funds.
The chain would be: keypair (n=1) private key encrypted with public key from keypair (n=2). Keypair (n=1) public and private keys deleted. Then keypair (n=2) encrypted with public key from keypair (n=3) etc..eventually ending up with a sequence of encrypted private keys and finally a private key of the last keypair which for fun could be encrypted with any of the other keys.
Of course not all keypairs in the array need to be used so the length and order of the chain is unknown.
Now if the order of the sequence is known the private key that holds the funds can be easily accessed, especially if the sequence is stored off site say hidden in the block chain.
I am curious if some maths whiz can tell me by an increasing n, how many combinations a would be attacker would need to try, if they had complete access to the site but not the sequence.
How many would be needed to stop an attacker for one block confirmation?
I was daydreaming about generating an array of ECDSA key pairs and then randomly symmetrically encrypting them together into a chain. Keypair n=1 contains the address for funds.
The chain would be: keypair (n=1) private key encrypted with public key from keypair (n=2). Keypair (n=1) public and private keys deleted. Then keypair (n=2) encrypted with public key from keypair (n=3) etc..eventually ending up with a sequence of encrypted private keys and finally a private key of the last keypair which for fun could be encrypted with any of the other keys.
Of course not all keypairs in the array need to be used so the length and order of the chain is unknown.
Now if the order of the sequence is known the private key that holds the funds can be easily accessed, especially if the sequence is stored off site say hidden in the block chain.
I am curious if some maths whiz can tell me by an increasing n, how many combinations a would be attacker would need to try, if they had complete access to the site but not the sequence.
How many would be needed to stop an attacker for one block confirmation?