Back to Course

3. Advanced Course

0% Complete
0/0 Steps
  1. 1. What is Taproot?
  2. 2. Blockchain bridges – what are they?
  3. 3. What is Ethereum Plasma?
  4. 4. What is Ethereum Casper?
  5. 5. What is Zk-SNARK and Zk-STARK? 
  6. 6. What is Selfish Mining? 
  7. 7. What is spoofing in the cryptocurrency market? 
  8. 8. Schnorr signatures - what are they? 
  9. 9. MimbleWimble - what is it? 
  10. 10. What is digital property rights in NFT?
  11. 11. What are ETFs and what role do they play in the cryptocurrency market? 
  12. 12. How to verify a cryptocurrency project – cryptocurrency tokenomics 
  13. 13. What is the 51% attack on blockchain?
  14. 14. What is DAO, and how does it work?
  15. 15. Zero-knowledge proof – a protocol that respects privacy 
  16. 16. What is EOSREX?
  17. 17. What is Proof of Elapsed Time (PoET)?
  18. 18. Mirror Protocol – what it is? 
  19. 19. What are synthetic assets? 
  20. 20. How to create your own NFT? 
  21. 21. Definition of DeFi, and what are its liquidations?
  22. 22. New identity system - Polygon ID
  23. 23. Ethereum Foundation and the Scroll protocol - what is it?
  24. 24. What is Byzantine fault tolerance in blockchain technology?
  25. 25. Scalability of blockchain technology - what is it?
  26. 26. Interchain Security - new Cosmos (ATOM) protocol
  27. 27. Coin Mixing vs. Coin Join - definition, opportunities, and threats
  28. 28. What is Ethereum Virtual Machine (EVM) and how does it work?
  29. 29. Soulbound Tokens - what are they, and how do they work?
  30. 30. Definition of LIDO - what is it?
  31. 31. What are Threshold Signatures, and how do they work?
  32. 32. Blockchain technology and cyberattacks.
  33. 33. Bitcoin script - what it is, and what you should know about it.
  34. 34. What is zkEVM, and what are its basic features?
  35. 35. Do confidential transactions on blockchain exist? What is a Confidential Transaction?
  36. 36. Algorithmic stablecoins - everything you should know about them.
  37. 37. Polygon Zk Rollups ZKP - what should you know about it?
  38. 38. What is Web3 Infura?
  39. 39. Mantle - Ethereum L2 scalability - how does it work?
  40. 40. What is the NEAR Rainbow Bridge?
  41. 41. Liquid Staking Ethereum and LSD tokens. What do you need to know about it?
  42. 42. Top 10 blockchain oracles. How do they work? How do they differ?
  43. 43. What are Web3.js and Ether.js? What are the main differences between them?
  44. 44. What is StarkWare, and recursive validity proofs
  45. 45. Quant Network: scalability of the future
  46. 46. Polygon zkEVM - everything you need to know
  47. 47. What is Optimism (OP), and how do its roll-ups work?
  48. 48. What are RPC nodes, and how do they work?
  49. 49. SEI Network: everything you need to know about the Tier 1 solution for DeFi
  50. 50. Types of Proof-of-Stake Consensus Mechanisms: DPoS, LPoS and BPoS
  51. 51. Bedrock: the epileptic curve that ensures security!
  52. 52. What is Tendermint, and how does it work?
  53. 53. Pantos: how to solve the problem of token transfer between blockchains?
  54. 54. What is asymmetric encryption?
  55. 55. Base-58 Function in Cryptocurrencies
  56. 56. What Is the Nostr Protocol and How Does It Work?
  57. 57. What Is the XDAI Bridge and How Does It Work?
  58. 58. Solidity vs. Rust: What Are the Differences Between These Programming Languages?
  59. 59. What Is a Real-Time Operating System (RTOS)?
  60. 60. What Is the Ethereum Rinkeby Testnet and How Does It Work?
  61. 61. What Is Probabilistic Encryption?
  62. 62. What is a Pinata in Web 3? We explain!
  63. 63. What Is EIP-4337? Will Ethereum Account Abstraction Change Web3 Forever?
  64. 64. What are smart contract audits? Which companies are involved?
  65. 65. How does the AirGapped wallet work?
  66. 66. What is proto-danksharding (EIP-4844) on Ethereum?
  67. 67. What is decentralised storage and how does it work?
  68. 68. How to Recover Cryptocurrencies Sent to the Wrong Address or Network: A Practical Guide
  69. 69. MPC Wallet and Multilateral Computing: Innovative Technology for Privacy and Security
  70. 70. Threshold signature in cryptography: an advanced signing technique!
  71. 71. Vanity address in cryptocurrencies: what is it and what are its characteristics?
  72. 72. Reentrancy Attack on smart contracts: a threat to blockchain security!
  73. 73. Slither: a static analyser for smart contracts!
  74. 74. Sandwich Attack at DeFi: explanation and risks!
  75. 75. Blockchain RPC for Web3: A key technology in the world of decentralized finance!
  76. 76. Re-staking: the benefits of re-posting in staking!
  77. 77. Base: Evolving cryptocurrency transactions with a tier-2 solution from Coinbase
  78. 78. IPFS: A new era of decentralized data storage
Lesson 13 of 78
In Progress

13. What is the 51% attack on blockchain?

The most important feature of Blockchain is its security, this makes it reliable. The data stored on it must pass many tests and be certified, by various entities, to be registered on the blockchain. Blockchain also has its risks, one of which is the 51% attack

How is a new blockchain created?

To understand how the 51% attack works, you must first be intimately familiar with the cryptocurrency mining process and how the computers (noodles), tapped into the network of a given cryptocurrency and holding all transaction history, work. Blockchain technology is distributed in nature. This means that the participants in the network agree on the transactions contained within it. That is – the nodes in it must regularly reach consensus on the process of mining, validity and correct transaction. The Proof-of-Work algorithm, on which some cryptocurrencies are based, is designed to allow miners to verify a new block only if the majority of nodes in the network agree that the block hash provided by the miner is correct. The miner that has found the solution to the mathematical puzzle (the hash) thereby lets the other participants in the network know that it has done its job. As you know from our previous lessons, the process of digging cryptocurrencies requires a huge amount of electricity and computing power. The performance of each miner, who are spread all over the world, is based on these two things.

In a blockchain network, computing power is called “hash power” or “hash rate”. In short, the computing power of a blockchain consists of the power generated and shared by different nodes. That is, it is not in the hands of a single person, making the entire network decentralized. When transactions are verified, information is placed in blocks and these are then attached to the longest chain. It contains the most transactions recorded and is the most reliable. It is the one with the most computing power. 

So, what if one user has more than 50% of the computing power of the entire network? A 51% attack, also known as a majority of attack, can occur.

Attack 51% – how it works

The 51% attack is an attack on the blockchain network, where a single user owns and controls most of the computing power of the entire network. He then manages the network as he sees fit. He can send cryptocurrencies on the main chain of the network, meanwhile sending them to another spoofed address on the blockchain, which he copies secretly thanks to his enormous computing power. A transaction on the main chain will be approved by other miners without any problem, as it is the longest chain. The same on our chain, which we have been secretly digging. What then? The official chain will cease to be the longest chain and our other chain, which is not quite legal, will become it. All because we controlled more than 50% of the power of the chain in question. As a result, the official transaction will disappear and the transaction from our secretly dug chain will be accepted. In the crypto world, we call this double-spending.

Interestingly, in such a situation, the attacker could lead to a mining monopoly, preventing virtually all miners from digging. At this point, it is worth noting that the person carrying out the 51% attack cannot reverse other people’s transactions or prevent transmission to the network. So, besides taking over the longest blockchain, what else can he do with his attack? Create a cryptocurrency from nothing, change the hash reward or steal funds. Undoubtedly, this is a very unlikely scenario, but always possible.

Probability of attack 51%

Nothing is impossible in the world of cryptocurrencies. However, the attack itself is very difficult to carry out. Remember, it is the distributed nodes that maintain the blockchain, and the users of the network work closely together to reach a consensus. This is why it is so secure. And the bigger the blockchain, the more security it has against attacks and loss of its liquidity. Let’s take Bitcoin under the microscope. A successful attack on this flagship asset is unrealistic. All because it is secured by nodes participating in the network and simultaneously competing for rewards. What’s more – in such a large network, which is constantly growing, making any modifications to previous approved blocks is very difficult. All thanks to cryptographic proofs. And as we know, the more proofs a block obtains, the cost of changes is much higher. Unfortunately, a 51% attack is more likely on altcoins that have little computing power. This unfortunate group will include ZenCash or Monacoin, among others.

NiceHash

In the very early days of cryptocurrencies, when few people had yet heard of them, miners would mine cryptocurrencies on their own. Over time, they began to band together to make it faster and easier to find a block and get rewarded. So, it’s no surprise that cloud-based mining services and other innovative aids have emerged. NiceHash is a platform that allows you to lease computing power from as many machines as you own. In return, you earn crypto, or gain computing power to gain digital assets. You already know where we’re going with this, right? The platform buys and sells computing power from its users and in return offers to connect your computer or platform to the NiceHash mining marketplace. By using other users’ computing power, you don’t have to physically buy and plug in your computers. And if you own diggers and want to increase your power, you take the help of this type of platform. With its help, a 51% attack seems possible.

Ethereum Classic – 51% attack

As we’ve mentioned before, not for every cryptocurrency can you hire enough computing power to attack it. Unfortunately, Ethereum Classic did not fit into this canon and fell victim to this very attack. The attack was launched on August 1, 2021, when Ethereum Classic had just 10 TH/s of computing power on its network. By comparison, Ethereum has 108 TH/s and Bitcoin Cash has 1,500,000 TH/s. The attack that took place then reorganized over 7,000 blocks! That’s as much as two days of mining.

Summary

Cryptocurrencies are secure databases. As they grow and the number of miners and computers grows, and with that comes increased computing power, they make blockchain networks and cryptocurrencies even more secure. It is difficult to take control of them. There is a huge cost involved, sometimes disproportionate to the gain. And the operation itself is hugely complex. If the price of the cryptocurrencies in question rises, the number of people willing to mine them increases proportionately. This involves plugging new miners and cryptocurrencies into the network, i.e., an increase in computing power. Thus – more problems for attackers in case of a 51% attack. The more desirable the blockchain or cryptocurrency, the more secure it is.

Make your first steps on the market with Kanga Exchange