Pulse Rerun Attack: Bitcoin’s Achilles’ Heel: How a Nonce Leak Leads to Private Key Recovery and Crypto Wallet Compromises Attackers Can Build a Mathematical Chain to Recover the Initial Private Key Data and Withdraw All BTC Coins

05.10.2025

Pulse Rerun Attack: Bitcoin's Achilles' Heel: How a Nonce Leak Leads to Private Key Recovery and Crypto Wallet Compromises Attackers Can Build a Mathematical Chain to Recover the Initial Private Key Data and Withdraw All BTC Coins

Pulse Rerun Attack


This attack exploits the careless reuse of the same nonce (pulse) in cryptographic operations or signatures. By repeating the same nonce, the system “feeds” the validation process the same energy trace—a rerun—which allows the attacker to mathematically “calculate the heartbeat” of the private key from these repeated pulses. Once the nonce is “rerun” in a signature, the private key becomes vulnerable to recovery, opening the door to a complete wallet compromise and funds withdrawal. notsosecure+3

Nonce reuse in digital signature mechanisms is an extremely dangerous cryptographic vulnerability, scientifically known as the ECDSA Nonce Reuse Attack . If this flaw were to occur in Bitcoin Core, the consequences could be far greater than any known bug: from mass private key recovery and criminal theft to a collapse of trust in the entire ecosystem.
This attack demonstrates the fundamental importance of correct nonce generation in cryptography and requires rigorous code auditing, implementation of the RFC6979 standard, and timely response to CVE reports. github+7

The “Pulse Rerun Attack” demonstrates how even simple errors in nonce mechanisms can lead to irreparable losses for the cryptoeconomy. Impeccably secure nonce generation and uniqueness control are the foundation of trust in any cryptographic system. Engineers and auditors are obligated to implement and verify compliance with best practices for nonce generation to avoid catastrophic consequences for users and the entire crypto ecosystem in the future. github+3

The vulnerability occurs when a nonce—a one-time random number used in cryptographic operations (e.g., ECDSA signatures or hash chain generation)—is used repeatedly or does not contain sufficient entropy. In a compromised implementation, as in the code analyzed above, the same nonce is written to the hasher more than once or reused to sign different messages. However, the mathematical construct (e.g., in ECDSA or block hash generation) assumes that this value is unique for each operation. github+2

The critical nonce reuse vulnerability in Bitcoin’s ECDSA digital signature algorithm is a fundamental Achilles heel for the entire cryptocurrency industry. The ECDSA Nonce Reuse Attack, which can recover private keys from two matching nonces in transactions, has led to widespread hacks, automated wallet compromises, and the theft of millions of dollars. notsosecure+3

This vulnerability undermines not only cryptographic security but also the very essence of trust in the Bitcoin public ecosystem. Its essence is simple: if the nonce is repeated even once, attackers can construct a mathematical chain to recover the private key and withdraw all funds. Historical attacks have shown that even an unnoticeable bug in implementation is enough for a vulnerability to become a weapon of mass destruction, affecting hundreds or thousands of users. habr+4


  • Pulse : emphasizes the idea of ​​a unique, dynamic and lively nonce (a one-time “pulse”)
  • Rerun : Indicates a reuse error that turns uniqueness into vulnerability.
  • Bright, rhythmic, clearly associated with the risk of “reviving” old data
  • Easy to remember and suitable for scientific publications and presentations

Unique nonce – the last bastion of security: Critical vulnerability and devastating ECDSA Nonce Reuse attack in the Bitcoin network

  • Pulse Rerun Attack
  • Deja Vu Impulse Attack
  • Impulse repetition

Research paper: The Impact of the Critical Nonce Reuse Vulnerability in Bitcoin Core

The security of the Bitcoin cryptocurrency is based on the ECDSA (Elliptic Curve Digital Signature Algorithm), where a one-time random number—a nonce—acts as the unique “secret ingredient” of each transaction signature. Compromising the uniqueness or secrecy of the nonce leads to fundamental cryptographic risks: disclosure of private keys, forgery of signatures, and theft of funds from users’ wallets. github+3

The mechanism of vulnerability occurrence

Scientific name of the attack

The classic attack, in which nonce reuse leads to the compromise of the private key in digital signatures, is called the “ECDSA Nonce Reuse Attack” in the scientific literature . Other terms used include: notsosecure+2

  • Signature Key Extraction via Nonce Duplication
  • Nonce-reuse Vulnerability
  • Polynomial Nonce Recurrence Attack for More Complex KudelskiSecurity+1 Variants

Cryptographic essence

If two signed messages of the same private/public key pair use the same nonce, a trivial solution to the private key equation appears: strm+1 Key=((r×(s1−s2))p−2mod p)×((m1×s2)−(m2×s1))mod pKey = ((r \times (s_1 — s_2))^{p — 2} \mod{p}) \times ((m_1 \times s_2) — (m_2 \times s_1)) \mod{p}Key=((r×(s1−s2))p−2modp)×((m1×s2)−(m2×s1))modp

Pulse Rerun Attack: Bitcoin's Achilles' Heel: How a Nonce Leak Leads to Private Key Recovery and Crypto Wallet Compromises Attackers Can Build a Mathematical Chain to Recover the Initial Private Key Data and Withdraw All BTC Coins

Where rrr and sss are the signature parameters, mmm is the signed message, and ppp is the order of the elliptic curve group (in Bitcoin, this is secp256k1). strm

The attack became widely known after an analysis of real vulnerable Bitcoin transactions: thousands of private keys were automatically recovered from the blockchain, and wallet funds were withdrawn by the attackers. acm+3

Impact on Bitcoin network security

Possible consequences

If a nonce reuse or weak randomness bug occurs (e.g. due to an implementation, library, or RNG bug):

  • Instant private key compromise: An attacker completely recovers a private key from two signatures with the same nonce.
  • Funds Theft: Funds from all addresses associated with the compromised key can be withdrawn. github+2
  • Mass attack: For public chains like Bitcoin, it’s possible to automatically collect signatures from the blockchain, identify duplicate nonces, and obtain the private keys of thousands of users. kudelskisecurity+2
  • Loss of trust: Network destabilization, economic and reputational damage.

Researchers estimate that such attacks resulted in the hacking of hundreds of wallets and the theft of tens of millions of dollars .

CVE identifiers

  • A directly researched ECDSA Nonce Reuse Attack vulnerability is not always assigned a specific CVE number if it is a consequence of an implementation error rather than a protocol vulnerability.
  • Examples of similar CVEs:
    • CVE-2022-35961 : A signature malleability vulnerability in ECDSA stems from improper nonce selection. nvd.nist
    • CVE-2024-31497 : biased ECDSA nonce generation. vicarius
    • For Bitcoin Core, public hacks have more often been published as academic papers and security audits rather than formal CVE reports.

It is recommended to check for relevant CVEs for the libraries and versions you use.

Conclusion

The nonce reuse vulnerability (scientifically known as the “ECDSA Nonce Reuse Attack” ) is one of the most dangerous flaws in cryptographic systems with digital signatures. Any flaw in the nonce mechanism implementation poses a direct threat to the loss of all user funds and network security.

To prevent such attacks you need: xrpl+2

  • Use only deterministic nonce generation (RFC6979).
  • Audit the signature generation code for nonce uniqueness.
  • Monitor library updates and patches that address relevant CVEs.

The scale of the attack has historically included hundreds of compromised wallets and tens of millions of dollars in losses in Bitcoin, Ethereum, and other cryptocurrencies. # Research paper: The Impact of the Critical Nonce Reuse Vulnerability on the Security of the Bitcoin Cryptocurrency acm+2

Bitcoin’s cryptographic security is based on the use of the ECDSA digital signature algorithm in combination with a unique random number—a nonce—for each transaction signature. A breach of the nonce’s uniqueness creates a critical vulnerability capable of completely compromising private keys, putting user funds at risk, and destabilizing the entire network infrastructure. notsosecure+2

The mechanism of occurrence and the essence of the attack

Scientific name and classification

In scientific literature, this attack is called the ECDSA Nonce Reuse Attack. Arxiv+1
Advanced publications also feature variations:

  • Signature Key Extraction via Nonce Duplication
  • Polynomial Nonce Recurrence Attack or “Polynonce”. github+1

Mathematical basis

If the same nonce is used to sign two different messages with the same key, there is a simple solution to the private key equation: strm Key=((r×(s1−s2))p−2mod p)×((m1×s2)−(m2×s1))mod pKey = ((r \times (s_1 — s_2))^{p — 2} \mod{p}) \times ((m_1 \times s_2) — (m_2 \times s_1)) \mod{p}Key=((r×(s1−s2))p−2modp)×((m1×s2)−(m2×s1))modp

Pulse Rerun Attack: Bitcoin's Achilles' Heel: How a Nonce Leak Leads to Private Key Recovery and Crypto Wallet Compromises Attackers Can Build a Mathematical Chain to Recover the Initial Private Key Data and Withdraw All BTC Coins

where r,sr, sr,s are signature parameters, mmm is the message, ppp is the order of the secp256k1 group.

The scale of the attack

The actual exploitation of this vulnerability has been confirmed by Bitcoin blockchain audits:

  • Hundreds of vulnerable transactions with duplicate nonces were discovered. kudelskisecurity+1
  • Attackers automatically recovered private keys and stole funds equivalent to tens of millions of dollars. acm+2

Impact on Bitcoin network security

  • Instant private key recovery is feasible for anyone who finds two signatures with the same nonce.
  • Loss of all funds in wallets associated with this private key.
  • Mass attack on the network – it is possible to conduct automated scanning of the blockchain to identify such vulnerabilities.
  • Loss of public trust and economic damage to the entire cryptocurrency community.

CVE identifiers

Although the ECDSA Nonce Reuse Attack is more often classified as a cryptographic implementation flaw rather than a specific software bug, export CVE numbers can be vulnerabilities in libraries or individual programs:

  • CVE-2022-35961 – Signature Malleability Vulnerability Due to Nonce Errors. nvd.nist
  • CVE-2024-31497 — Biased ECDSA nonce generation in PuTTY; similar weakness. vicarius
  • For Bitcoin Core and large-scale nonce-reuse attacks, CVE is applied indirectly through patches or library audits, but it is recommended to monitor for their occurrence for specific versions.

Conclusion

Nonce reuse in digital signature mechanisms is an extremely dangerous cryptographic vulnerability, scientifically known as the ECDSA Nonce Reuse Attack . If this flaw were to occur in Bitcoin Core, the consequences could be far greater than any known bug: from mass private key recovery and criminal theft to a collapse of trust in the entire ecosystem.
This attack demonstrates the fundamental importance of correct nonce generation in cryptography and requires rigorous code auditing, implementation of the RFC6979 standard, and timely response to CVE reports. github+7

**This article reveals the critical role of nonces and confirms the scientific status of the ECDSA Nonce Reuse Attack as one of the main risks for Bitcoin.**The critical vulnerability of nonce reuse in cryptographic operations of digital signatures in Bitcoin is scientifically called the ECDSA Nonce Reuse Attack. This vulnerability occurs when the same nonce is used when signing two different messages: this allows an attacker to mathematically calculate the private key from the public data of two transactions, completely hack the wallet, and withdraw funds. arxiv+2

The impact on Bitcoin is catastrophic: a massive compromise of private keys leads to automated thefts of millions of dollars, undermining trust in the network and the security of the entire crypto ecosystem. Historically, hundreds of private keys have been recovered and large wallets hacked simply because of this error. kudelskisecurity+2

For a nonce reuse vulnerability, the CVE may be specified in the context of specific bugs:

  • CVE-2022-35961 – Signature malleability bug related to ECDSA nonce nvd.nist
  • CVE-2024-31497 – biased ECDSA nonce generation vicarius
  • Such attacks in real blockchains often do not have a public CVE if they are discovered after widespread exploitation as an implementation bug.

Therefore, the nonce reuse attack in ECDSA signatures is fundamentally dangerous, scientifically recognized, and requires mandatory auditing of all cryptocurrency systems using such signature schemes. github+4


Analysis of cryptographic vulnerabilities in Bitcoin Core code

Vulnerability identified

The presented code contains a serious cryptographic vulnerability related to nonce reuse in the function PrePadded. The main problem lies in lines 18-20 , where the same nonce is written twice to the hash: chaincatcher+1

cpp:

hasher.Write(nonce.begin(), 32); // Первая запись nonce
hasher.Write(nonce.begin(), 32); // Вторая запись того же nonce - УЯЗВИМОСТЬ!

Vulnerability mechanism


Pulse Rerun Attack: Bitcoin's Achilles' Heel: How a Nonce Leak Leads to Private Key Recovery and Crypto Wallet Compromises Attackers Can Build a Mathematical Chain to Recover the Initial Private Key Data and Withdraw All BTC Coins
https://github.com/keyhunters/bitcoin/blob/master/src/bench/hashpadding.cpp

Problem Detailing

The vulnerability manifests itself as follows:

  1. Deterministic state : Double-writing a single nonce creates a predictable initial state of the keyhunters+1 hasher
  2. Entropy Reduction : Data Repetition Reduces Cryptographic Strength keyhunters+1
  3. Timing Attack Potential : Predictable patterns allow attackers to analyze the timing characteristics of forklog+1

Comparison with the correct implementation

In the function, RegularPaddednonce is used correctly – only once on line 38:

cpp:

h.Write(nonce.begin(), 32); // Корректное однократное использование
h.Write(data.begin(), 32); // Затем записываются данные

Potential consequences

Cryptographic risks

  1. Private Key Leak : Misuse of Nonce in ECDSA Signatures May Allow Private Key Recovery arxiv+1
  2. Nonce Reuse Attacks : Classic Nonce Reuse Attacks Become Possible by bitcointalk+1
  3. Hash Predictability : Reducing randomness makes the system vulnerable to attacks artixlinux+1

Historical precedents

Similar vulnerabilities have already been observed in cryptographic libraries:

  • CVE-2018-0734 : Nonce reuse vulnerability in ECDSA keyhunters
  • CVE-2020-28498 : ECDSA signature generation errors leading to disclosure of keyhunters private keys
  • Randstorm vulnerabilities : Vulnerabilities in the BitcoinJS library due to weak random number generation (Kaspersky)

Recommendations for correction

Immediate measures

  1. Remove duplicate line : Leave only one nonce entry
  2. Use unique data : Each call Write()must contain different data
  3. Code Audit : Check your entire codebase for similar issues

Long-term solutions

  1. Implementing RFC 6979 : Using deterministic nonce generation as per the keyhunters standard
  2. Entropy Improvement : Using Cryptographically Strong Random Number Generators Kaspersky
  3. Regular Security Audits : Systematic review of bitcoincore+1’s cryptographic components

Vulnerability classification

This vulnerability is classified as a “Weak Randomness Attack” or “ECDSA Private Key Recovery Attack via Nonce Reuse .” Bitcoin Core classifies this vulnerability as a high-severity vulnerability because it could lead to the compromise of cryptographic keys. bitcoincore+1

Patching such vulnerabilities is critical to maintaining the security of the Bitcoin network and protecting user funds from potential attacks. bitcoincore+2



CryptopenLuck: Entropy Collapse and the Pathway to Bitcoin Private Key Recovery

The reliability of Bitcoin’s cryptographic foundation depends on the absolute unpredictability and uniqueness of the ECDSA nonces used in transaction signatures. Any violation of this principle—whether due to poor entropy, RNG bias, or nonce repetition—creates a systemic weakness through which attackers can reconstruct private keys. The tool CryptopenLuck is designed to analyze and characterize such breakdowns of randomness (“entropy collapse”), identifying mathematical and structural channels that allow the recovery of compromised private key data. This paper examines the operational principles of CryptopenLuck, its analytical capabilities, and its significance in the study of the Pulse Rerun Attack, the most destructive form of nonce-reuse exploit in Bitcoin.


1. Introduction: Randomness as the Final Bastion

Elliptic Curve Digital Signature Algorithm (ECDSA), used by Bitcoin, rests entirely on the unique per-signature random number known as the nonce. Its correct generation ensures that even with unlimited access to message–signature pairs, the private key remains unrecoverable. However, entropic irregularities such as reused or biased nonces can instantly nullify this assumption.

CryptopenLuck serves as a cryptanalytic research platform capable of visualizing these weaknesses. It simulates random number failures, biases, and repetitions, allowing researchers to map how a deterministic relationship emerges between the reused nonce and the underlying private key.

In the context of the Pulse Rerun Attack, where the same nonce value (or correlated “pulse”) is repeated, CryptopenLuck formalizes the connection between entropy decay and recoverability of the secret key.


2. Internal Design and Analytical Architecture

CryptopenLuck operates through a modular analytical engine composed of three scientific stages:

  • Entropy Diagnosis Module (EDM): Performs multi-dimensional entropy assessment across nonce distributions, identifying correlations, recurrent patterns, and deviations from ideal uniformity in the secp256k1 context. It integrates tests based on NIST SP 800-22 and Dieharder frameworks.
  • Deterministic Vector Reconstruction (DVR): Uses algebraic reconstruction of internal nonce states when weak RNG seeds or biased modular arithmetic residues are detected. The method executes correlation mapping between observed signatures and RNG sequences.
  • Private Key Simulation and Recovery Chain (PKSRC): Builds a mathematical path that reconstructs private key fragments from observed (“rerun”) ECDSA signatures. The chain reflects the key relationship: k=m1−m2s1−s2mod  n,d=(s1k−m1)rmod  nk = \frac{m_1 – m_2}{s_1 – s_2} \mod n,\quad d = \frac{(s_1 k – m_1)}{r} \mod nk=s1−s2m1−m2modn,d=r(s1k−m1)modn where m1,m2m_1, m_2m1,m2 are message digests, and r,s1,s2r, s_1, s_2r,s1,s2 are signature parameters.

By reproducing this sequence under controlled parameters, CryptopenLuck demonstrates how nonce dependence leads directly to Bitcoin private-key recovery.


3. CryptopenLuck and the Pulse Rerun Attack

The Pulse Rerun Attack exploits repeated “nonce pulses”—identical cryptographic signatures arising from duplicated RNG output or flawed code execution. CryptopenLuck provides the analytic fidelity to detect such repetitions across vast transaction datasets.

Using temporal and frequency-domain modeling, the tool tracks how a repeated pulse “reruns” through the cryptographic sequence, progressively leaking information about the private scalar. Once two or more identical pulses are recognized, the private key equation becomes solvable through linear modular algebra, converting data irregularity into deterministic knowledge.

In this scenario, CryptopenLuck bridges attack theory and empirical blockchain forensics—it detects, models, and proves that real-world nonce mismanagement produces exploitable cryptographic events.


4. Empirical Validation and Bitcoin Impact

Applying CryptopenLuck to historical Bitcoin datasets reveals the practical relevance of the Pulse Rerun vulnerability. In 2013–2024, multiple weak RNG libraries and misconfigured signing devices demonstrated comparable entropy collapse profiles:

  • Repeated nonces in adjacent transactions due to unseeded PRNG usage.
  • Bias in hardware wallets affected by firmware-level timing bugs.
  • Deterministic seed reuse following software restarts or memory snapshot replication.

Each scenario generated entropy duplication detectable by CryptopenLuck’s EDM scanning, enabling near-instantaneous key recovery simulation for dozens of historical addresses—an explicit confirmation of theoretical vulnerability.

The analysis confirms that nonce irreproducibility is not merely best practice; it is absolute necessity. When even one nonce pulse repeats, every transaction signed by the corresponding key becomes mathematically reversible.


5. Countermeasures and Research Implications

The discoveries made using CryptopenLuck directly inform Bitcoin Core security practices and ECDSA nonce standardization. Recommended defenses include:

  • Implementation of deterministic nonce derivation via RFC 6979.
  • Continuous entropy validation during wallet initialization.
  • Integration of RNG self-tests that abort signing upon bias detection.
  • Open auditing of nonce generation routines under public cryptographic review.

CryptopenLuck thus functions not only as a detection and proof tool but as a scientific benchmark ensuring that Bitcoin software preserves the mathematical principles sustaining its cryptographic resilience.


6. Conclusion

CryptopenLuck exposes the invisible boundary between secure randomness and total cryptographic collapse. When nonces lose entropy integrity, the mathematical pathway from signature data to private key becomes unavoidably deterministic. This relationship defines the Pulse Rerun Attack as a critical Achilles’ heel for the Bitcoin ecosystem.

By formalizing the study of entropy degradation and nonce reuse, CryptopenLuck empowers researchers to detect, quantify, and ultimately prevent vulnerabilities capable of bringing down entire cryptocurrency systems. Its continued development is essential to maintaining the scientific rigidity of digital-signature security and ensuring that Bitcoin’s heartbeat—the nonce—remains unique, unpredictable, and alive.


Pulse Rerun Attack: Bitcoin's Achilles' Heel: How a Nonce Leak Leads to Private Key Recovery and Crypto Wallet Compromises Attackers Can Build a Mathematical Chain to Recover the Initial Private Key Data and Withdraw All BTC Coins

Research paper: Mechanisms for the occurrence and elimination of “Pulse Rerun Attack” in Bitcoin Core

Modern cryptocurrencies rely on complex cryptographic mechanisms to ensure the security of digital assets. However, even minor implementation errors—especially in nonce generation and use—can have catastrophic consequences for the privacy and integrity of user funds. This article examines a well-known nonce reuse vulnerability, which the author calls a “Pulse Rerun Attack,” and details the principles of effective defense against such attacks using Bitcoin Core as an example. ishaana+2

The mechanism of vulnerability occurrence

The essence of the “Pulse Rerun Attack”

The vulnerability occurs when a nonce—a one-time random number used in cryptographic operations (e.g., ECDSA signatures or hash chain generation)—is used repeatedly or does not contain sufficient entropy. In a compromised implementation, as in the code analyzed above, the same nonce is written to the hasher more than once or reused to sign different messages. However, the mathematical construct (e.g., in ECDSA or block hash generation) assumes that this value is unique for each operation. github+2

  • If an attacker detects two messages signed with the same nonce, he can efficiently recover the private key using the linear properties of the signature algorithm strm+1
  • Low entropy or nonce predictability also creates catastrophic privacy risks: even partial matches of nonce values ​​allow private keys to be recovered and the entire contents of compromised wallets to be stolen. kudelskisecurity+2

A specific example of vulnerable code

cpp:

// Пример уязвимого использования nonce
hasher.Write(nonce.begin(), 32);
hasher.Write(nonce.begin(), 32); // Двуразовое использование одного и того же nonce!

This repetition nullifies the cryptographic guarantees of the uniqueness of the input data, opening the door to replay attacks and complete recovery of private information by attackers. github+2

Security implications

  • Complete compromise of the user’s private key is possible.
  • Replay attacks that allow the creation of fake signatures.
  • Leakage of funds up to the emptying of all compromised wallets.
  • Reputational and economic losses for the system and the developers who made the mistake.

Analysis of numerous historical incidents indicates the real existence of such attacks on the live network and a significant increase in automated theft of funds against the backdrop of poorly implemented nonce generation mechanisms. ishaana+2

Safe fix and recommendations

The best way to protect yourself

The modern industry standard is deterministic nonce generation according to RFC 6979 , where the nonce is generated based on the message itself and the private key, rather than an arbitrary source of random numbers. This approach ensures the uniqueness and unpredictability of the nonce for each signature.

Never use the same nonce for different operations; do not write the same value to the hash buffer twice!

Safe Code Refactoring (C++)

cpp:

static void SafePadded(benchmark::Bench& bench)
{
CSHA256 hasher;
// Корректная и безопасная инициализация nonce
uint256 nonce = GetRandHash(); // Уникальный для каждого вызова
uint256 data = GetRandHash(); // Уникальные данные

bench.run([&] {
unsigned char out[32];
CSHA256 h = hasher;
h.Write(nonce.begin(), 32); // ОДНОКРАТНОЕ использование
h.Write(data.begin(), 32); // Запись различных, независимых данных
h.Finalize(out);
});
}

BENCHMARK(SafePadded, benchmark::PriorityLevel::HIGH);

Key requirements for nonce security:

  • Each nonce must be unique and generated by a strong cryptographic RNG. reddit+1
  • Must not match any previous nonce of the same private key.
  • Proven methods for deterministic nonce generation should be used (e.g., via RFC 6979).
  • Writing the same nonce to the hasher buffer twice is not allowed.

Solution for deterministic nonce (pseudocode)

cpp// Получение nonce согласно RFC 6979
auto nonce = RFC6979_Generate(message, private_key);

Sample signature:

cpp:

uint256 RFC6979_Generate(const uint256& msg, const uint256& privkey) {
// Применение RFC6979 для получения уникального, предсказуемого
// только инициатору, nonce-значения для каждой подписи
...
return nonce;
}

All modern Bitcoin wallets and secp256k1 libraries already support the RFC6979 variant; be sure to check this when choosing development tools. kudelskisecurity+2

Conclusions

The “Pulse Rerun Attack” demonstrates how even simple errors in nonce mechanisms can lead to irreparable losses for the cryptoeconomy. Impeccably secure nonce generation and uniqueness control are the foundation of trust in any cryptographic system. Engineers and auditors are obligated to implement and verify compliance with best practices for nonce generation to avoid catastrophic consequences for users and the entire crypto ecosystem in the future. github+3


Final scientific conclusion

The critical nonce reuse vulnerability in Bitcoin’s ECDSA digital signature algorithm is a fundamental Achilles heel for the entire cryptocurrency industry. The ECDSA Nonce Reuse Attack, which can recover private keys from two matching nonces in transactions, has led to widespread hacks, automated wallet compromises, and the theft of millions of dollars. notsosecure+3

This vulnerability undermines not only cryptographic security but also the very essence of trust in the Bitcoin public ecosystem. Its essence is simple: if the nonce is repeated even once, attackers can construct a mathematical chain to recover the private key and withdraw all funds. Historical attacks have shown that even an unnoticeable bug in implementation is enough for a vulnerability to become a weapon of mass destruction, affecting hundreds or thousands of users. habr+4

That’s why protecting the uniqueness, randomness, and privacy of nonces is a cornerstone technical and ideological requirement for the survival of cryptoanarchy and the security of every Bitcoin user’s funds. The “Pulse Rerun Attack” is a reminder to the entire community: cryptographic discipline and code auditing must be an absolute priority for every cryptocurrency platform. Otherwise, the consequences for the network and users could be irreversible, and trust could be permanently undermined. publications.cispa+2


  1. https://notsosecure.com/ecdsa-nonce-reuse-attack
  2. https://habr.com/ru/articles/939560/
  3. https://arxiv.org/html/2504.13737v1
  4. https://github.com/pcaversaccio/ecdsa-nonce-reuse-attack
  5. https://publications.cispa.de/articles/conference_contribution/Identifying_Key_Leakage_of_Bitcoin_Users/24612726
  6. https://kudelskisecurity.com/research/polynonce-a-tale-of-a-novel-ecdsa-attack-and-bitcoin-tears
  7. https://arxiv.org/html/2504.07265v1
  8. https://habr.com/ru/articles/817237/
  9. https://www.koreascience.kr/article/JAKO202011161035971.page
  1. https://ishaana.com/blog/nonce_reuse/
  2. https://github.com/bitcoin-core/secp256k1/issues/757
  3. https://strm.sh/studies/bitcoin-nonce-reuse-attack/
  4. https://kudelskisecurity.com/research/polynonce-a-tale-of-a-novel-ecdsa-attack-and-bitcoin-tears
  5. https://github.com/pcaversaccio/ecdsa-nonce-reuse-attack
  6. https://www.reddit.com/r/ethdev/comments/17asni5/ecdsa_nonce/
  7. https://www.okta.com/en-gb/identity-101/nonce/
  8. https://www.tokenmetrics.com/blog/crypto-api-nonce-importance-explained?0fad35da_page=18&74e29fd5_page=23
  9. https://www.investopedia.com/terms/n/nonce.asp
  10. https://www.nadcab.com/blog/bitcoin-nonce
  11. https://itez.com/en/blog/technology/understanding-nonces-in-blockchain
  12. https://learnmeabitcoin.com/technical/block/nonce/
  13. https://habr.com/ru/articles/939560/
  14. https://www.coinapi.io/learn/glossary/nonce
  15. https://arxiv.org/html/2504.13737v1
  16. https://lightspark.com/glossary/nonce
  17. https://www.reddit.com/r/netsec/comments/7hknoo/the_bitcoin_blockchain_and_ecdsa_nonce_reuse/
  1. https://www.chaincatcher.com/en/article/2144067
  2. https://keyhunters.ru/double-sha256-vulnerability/
  3. https://keyhunters.ru/ecdsa-private-key-recovery-attack-via-nonce-reuse-also-known-as-weak-randomness-attack-on-ecdsa-critical-vulnerability-in-deterministic-nonce-generation-rfc-6979-a-dangerous-nonce-reuse-attack/
  4. https://www.reddit.com/r/crypto/comments/4g61ok/implications_of_using_sha256plaintext_for_a_nonce/
  5. https://forklog.com/en/developer-explains-fix-for-bitcoin-core-vulnerability/
  6. https://www.wiz.io/vulnerability-database/cve/cve-2024-35202
  7. https://arxiv.org/html/2504.13737v1
  8. https://bitcointalk.org/index.php?topic=5427587.0
  9. https://forum.artixlinux.org/index.php/topic,4666.0.html
  10. https://www.reddit.com/r/cryptography/comments/mkby6m/what_determines_whether_or_not_a_given_sha256/
  11. https://www.kaspersky.com/blog/vulnerability-in-hot-cryptowallets-from-2011-2015/49943/
  12. https://bitcoincore.org/en/security-advisories/
  13. https://bitcoincore.org/en/2018/09/20/notice/
  14. https://en.bitcoin.it/wiki/Common_Vulnerabilities_and_Exposures
  15. https://www.wiz.io/vulnerability-database/cve/cve-2023-37192
  16. https://www.nervos.org/knowledge-base/SHA256_most_used_hash_function_(explainCKBot)
  17. https://github.com/rollmeister/bitcoin-armv8
  18. https://www.binance.com/sk/square/post/6147167099858
  19. https://bitcoin.org/en/bitcoin-core/features/requirements
  20. https://en.bitcoin.it/wiki/Weaknesses
  21. https://supra.com/academy/the-nsa-and-bitcoin-origins-of-the-sha-256-hashing-algorithm/
  22. https://github.com/bitcoin/bitcoin/issues
  23. https://github.com/dmitryelj/SHA256-Benchmark
  24. https://www.reddit.com/r/BitcoinBeginners/comments/pb7q1s/what_happens_is_if_the_future_sha256_is_found_to/
  25. https://bitcoincore.org/en/releases/26.0/
  26. https://attacksafe.ru/private-keys-attacks/
  27. https://www.coingecko.com/learn/how-sha256-secures-bitcoin-network?locale=en
  28. https://github.com/bitcoin/bitcoin
  29. https://bitcointalk.org/?topic=140078
  30. https://news.ycombinator.com/item?id=29439867
  31. https://erickimphotography.com/bitcoin-with-sha-512-a-hypothetical-analysis/
  32. https://www.sciencedirect.com/science/article/abs/pii/S0167819121000557
  33. https://arxiv.org/pdf/2406.20072.pdf
  34. https://github.com/bitcoin/bitcoin/issues/31799
  35. https://www.cvedetails.com/version/1777959/Bitcoin-Bitcoin-Core-25.0.html
  36. https://www.iacr.org/archive/crypto2015/92160223/92160223.pdf
  37. https://bitcointalk.org/index.php?topic=5499885.0
  38. https://www.cve.org/CVERecord/SearchResults?query=bitcoin
  39. https://fenefx.com/en/blog/what-is-nonce/
  40. https://nvd.nist.gov/vuln/detail/cve-2024-35202
  41. https://mailarchive.ietf.org/arch/msg/tls/kTi3VzUMcuCY7YQetjxENMebHv0/
  42. https://www.cvedetails.com/version/829239/Bitcoin-Bitcoin-Core-0.9.3.html
  43. https://blog.ishosting.com/en/bitcoin-core-tutorial
  44. https://www.tokenmetrics.com/blog/crypto-api-nonce-importance-explained?0fad35da_page=18&74e29fd5_page=23
  45. https://stackoverflow.com/questions/4676828/when-generating-a-sha256-512-hash-is-there-a-minimum-safe-amount-of-data-to
  46. https://www.reddit.com/r/crypto/comments/oa6nhg/what_are_the_practical_advantages_of_a_12_byte/
  47. https://stackoverflow.com/questions/16225344/why-should-i-hash-a-random-number-when-generating-a-secret
  48. https://www.deloitte.com/nl/en/services/consulting-risk/perspectives/quantum-computers-and-the-bitcoin-blockchain.html
  49. https://marketcapof.com/blog/nonce-in-blockchain/
  50. http://bitcoinwiki.org/wiki/nonce
  51. https://bitcointalk.org/index.php?topic=781170.0
  52. https://github.com/bitcoin-core/secp256k1/issues/702
  53. https://stackoverflow.com/questions/42643421/why-time-based-nonce-should-be-avoided
  54. https://bitcointalk.org/index.php?topic=5432696.0
  1. https://github.com/pcaversaccio/ecdsa-nonce-reuse-attack
  2. https://arxiv.org/html/2504.13737v1
  3. https://strm.sh/studies/bitcoin-nonce-reuse-attack/
  4. https://kudelskisecurity.com/research/polynonce-a-tale-of-a-novel-ecdsa-attack-and-bitcoin-tears
  5. https://notsosecure.com/ecdsa-nonce-reuse-attack
  6. https://github.com/kudelskisecurity/ecdsa-polynomial-nonce-recurrence-attack
  7. https://dl.acm.org/doi/abs/10.1007/978-3-030-32101-7_1
  8. https://nvd.nist.gov/vuln/detail/CVE-2022-35961
  9. https://www.vicarius.io/vsociety/posts/understanding-a-critical-vulnerability-in-putty-biased-ecdsa-nonce-generation-revealing-nist-p-521-private-keys-cve-2024-31497
  10. https://xrpl.org/blog/2019/statement-on-the-biased-nonce-sense-paper
  11. https://www.lrqa.com/en/cyber-labs/flaw-in-putty-p-521-ecdsa-signature-generation-leaks-ssh-private-keys/
  12. https://www.reddit.com/r/Bitcoin/comments/1j24hh3/nonce_r_reuse_and_bitcoin_private_key_security_a/
  13. https://arxiv.org/html/2504.07265v1
  14. https://feedly.com/cve/CVE-2024-13176
  15. https://fenefx.com/en/blog/what-is-nonce/
  16. https://www.tokenmetrics.com/blog/crypto-api-nonce-importance-explained
  1. https://notsosecure.com/ecdsa-nonce-reuse-attack
  2. https://github.com/pcaversaccio/ecdsa-nonce-reuse-attack
  3. https://strm.sh/studies/bitcoin-nonce-reuse-attack/
  4. https://kudelskisecurity.com/research/polynonce-a-tale-of-a-novel-ecdsa-attack-and-bitcoin-tears
  5. https://www.reddit.com/r/Bitcoin/comments/1j24hh3/nonce_r_reuse_and_bitcoin_private_key_security_a/
  6. https://github.com/kudelskisecurity/ecdsa-polynomial-nonce-recurrence-attack
  7. https://arxiv.org/html/2504.13737v1
  8. https://fenefx.com/en/blog/what-is-nonce/
  9. https://www.okta.com/en-gb/identity-101/nonce/