as reported in the CRYPTO 2019 conference (Liu et
al. 2023). Meanwhile, a new collision attack on
RIPEMD-160 using a novel approach for selecting
variations in messaging and implementing new
methods to effectively manage differing conditions in
parallel across both branches has been reported in the
paper. As a result, persistent evaluation and
improvement should be valued.
As for ECDSA algorithm, it has garnered
significant interest from researchers since its
incomparable advantages over other public key
cryptographic algorithms, so various institutions due
to their ability to offer security and high efficiency in
applications e.g. electronic finance, online
transportation, education and so on. Algorithms
utilizing elliptic curves offer significantly higher
strength-per-key-bit and the unit bit power of the
cryptography exceeds compared to that of other
public key schemes. The algorithms boost security
measures against a range of attacks while also
enhancing system efficiency in speed, recall, and
decreasing computing complexity and energy
consumption within resource-constrained and large-
scale systems (Al-Zubaidie et al. 2019).
Not only researchers have implemented many
optimizations on existing encryption algorithms, but
also some new technologies have appeared to
increase protections. For instance, ciphertext-policy
hierarchical attribute-based encryption (CP-HABE)
has been developed to keep users’ privacy from
illegal users when an illegal transaction happens. In
this scheme, a novel signature algorithm is employed
to create wallet key pairs, replacing the elliptic curve
signature, thereby linking wallet addresses with
encrypted identities. The implement process has been
demonstrated clearly and it is resistant for chosen-
plaintext attacks (CPA) in the standard model,
adapting the Bilinear Diffie-Hellman Exponent
(BDHE) presumption (Wang & Gao 2018). Moving
forward, the researchers will more concentrate on the
domain and enhance the quality of the algorithms.
Meanwhile, the majorization of the existing bitcoin
encryption algorithms should also be a main research
topic especially for the collision resistance and
calculation speed.
4 CONCLUSION
This paper described bitcoin and its importance as
well as development. Besides, the detailed implement
process of some main bitcoin encryption algorithms
was provided, including SHA-256, RIPEMD-260 and
ECDSA. Then, the current advantages and limitations
of these algorithms have been shown and this paper
discussed some new cryptography based on bitcoin.
However, this article did not contain some new
domains which combining bitcoin with other
emerging fields like AI models and machine learning.
A more thorough investigation and more specialized
article will be planned to completed in the future.
REFERENCES
M. Rahouti, K. Xiong, and N. Ghani. Bitcoin concepts,
threats, and machine-learning security solutions.Ieee
Access 6: 67189-67205(2018).
C. Vyas and M. Lunagaria. Security concerns and issues for
bitcoin. Int. J. Comput. Appl, 10-12(2014).
G. Dumitrescu. Bitcoin–a brief analysis of the advantages
and disadvantages. Global Economic Observer, 5(2):
63-71(2017).
J. Ducrée. Satoshi Nakamoto and the Origins of Bitcoin--
Narratio in Nomine, Datis et Numeris. arXiv preprint
arXiv:2206.10257 (2022).
X. Wang, H. Yu. How to break MD5 and other hash
functions. Annual international conference on the
theory and applications of cryptographic techniques.
Berlin, Heidelberg: Springer Berlin Heidelberg, 19-
35(2005).
V. Gayoso Martinez, L. Hernández-Álvarez,L. Hernandez
Encinas. Analysis of the cryptographic tools for
blockchain and bitcoin. Mathematics, 8(1): 131(2020).
W. Sun, H. Guo, H. He, et al. Design and optimized
implementation of the SHA-2 (256, 384, 512) hash
algorithms. 2007 7th International Conference on
ASIC. IEEE, 858-861(2007).
M. Fauzi, N. Paiman, Z. Othman. Bitcoin and
cryptocurrency: Challenges, opportunities and future
works. The Journal of Asian Finance, Economics and
Business (JAFEB), 7(8): 695-704(2020).
Y. Yang, F. Chen, X. Zhang, et al. Research on the hash
function structures and its application. Wireless
Personal Communications, 94: 2969-2985(2017).
A. Abidi, B. Bouallegue, F. Kahri. Implementation of
elliptic curve digital signature algorithm (ECDSA).
2014 Global Summit on Computer & Information
Technology (GSCIT). IEEE, 1-6(2014).
D. Wang. Secure implementation of ECDSA signatures in
bitcoin. MSc in Information Security (2014): 1-78.
I. Algredo-Badillo, C. Feregrino-Uribe, R. Cumplido, et al.
FPGA-based implementation alternatives for the inner
loop of the Secure Hash Algorithm SHA-256.
Microprocessors and Microsystems, 37(6-7): 750-
757(2013).
M. Kammoun,M. Elleuchi,M. Abid, et al. FPGA-based
implementation of the SHA-256 hash algorithm. 2020
IEEE international conference on design & test of
integrated micro & nano-systems (DTS). IEEE, 1-6
(2020).
H. Gilbert, H. Handschuh. Security analysis of SHA-256
and sisters. International workshop on selected areas in