
Pulse Rerun Attack
This attack exploits the careless reuse of the same nonce (pulse) in cryptographic operations or signatures. By repeating the same nonce, the system “feeds” the validation process the same energy trace—a rerun—which allows the attacker to mathematically “calculate the heartbeat” of the private key from these repeated pulses. Once the nonce is “rerun” in a signature, the private key becomes vulnerable to recovery, opening the door to a complete wallet compromise and funds withdrawal. notsosecure+3
Nonce reuse in digital signature mechanisms is an extremely dangerous cryptographic vulnerability, scientifically known as the ECDSA Nonce Reuse Attack . If this flaw were to occur in Bitcoin Core, the consequences could be far greater than any known bug: from mass private key recovery and criminal theft to a collapse of trust in the entire ecosystem.
This attack demonstrates the fundamental importance of correct nonce generation in cryptography and requires rigorous code auditing, implementation of the RFC6979 standard, and timely response to CVE reports. github+7
The “Pulse Rerun Attack” demonstrates how even simple errors in nonce mechanisms can lead to irreparable losses for the cryptoeconomy. Impeccably secure nonce generation and uniqueness control are the foundation of trust in any cryptographic system. Engineers and auditors are obligated to implement and verify compliance with best practices for nonce generation to avoid catastrophic consequences for users and the entire crypto ecosystem in the future. github+3
The vulnerability occurs when a nonce—a one-time random number used in cryptographic operations (e.g., ECDSA signatures or hash chain generation)—is used repeatedly or does not contain sufficient entropy. In a compromised implementation, as in the code analyzed above, the same nonce is written to the hasher more than once or reused to sign different messages. However, the mathematical construct (e.g., in ECDSA or block hash generation) assumes that this value is unique for each operation. github+2
The critical nonce reuse vulnerability in Bitcoin’s ECDSA digital signature algorithm is a fundamental Achilles heel for the entire cryptocurrency industry. The ECDSA Nonce Reuse Attack, which can recover private keys from two matching nonces in transactions, has led to widespread hacks, automated wallet compromises, and the theft of millions of dollars. notsosecure+3
This vulnerability undermines not only cryptographic security but also the very essence of trust in the Bitcoin public ecosystem. Its essence is simple: if the nonce is repeated even once, attackers can construct a mathematical chain to recover the private key and withdraw all funds. Historical attacks have shown that even an unnoticeable bug in implementation is enough for a vulnerability to become a weapon of mass destruction, affecting hundreds or thousands of users. habr+4
- Pulse : emphasizes the idea of a unique, dynamic and lively nonce (a one-time “pulse”)
- Rerun : Indicates a reuse error that turns uniqueness into vulnerability.
- Bright, rhythmic, clearly associated with the risk of “reviving” old data
- Easy to remember and suitable for scientific publications and presentations
Unique nonce – the last bastion of security: Critical vulnerability and devastating ECDSA Nonce Reuse attack in the Bitcoin network
- Pulse Rerun Attack
- Deja Vu Impulse Attack
- Impulse repetition
Research paper: The Impact of the Critical Nonce Reuse Vulnerability in Bitcoin Core
The security of the Bitcoin cryptocurrency is based on the ECDSA (Elliptic Curve Digital Signature Algorithm), where a one-time random number—a nonce—acts as the unique “secret ingredient” of each transaction signature. Compromising the uniqueness or secrecy of the nonce leads to fundamental cryptographic risks: disclosure of private keys, forgery of signatures, and theft of funds from users’ wallets. github+3
The mechanism of vulnerability occurrence
Scientific name of the attack
The classic attack, in which nonce reuse leads to the compromise of the private key in digital signatures, is called the “ECDSA Nonce Reuse Attack” in the scientific literature . Other terms used include: notsosecure+2
- Signature Key Extraction via Nonce Duplication
- Nonce-reuse Vulnerability
- Polynomial Nonce Recurrence Attack for More Complex KudelskiSecurity+1 Variants
Cryptographic essence
If two signed messages of the same private/public key pair use the same nonce, a trivial solution to the private key equation appears: strm+1 Key=((r×(s1−s2))p−2mod p)×((m1×s2)−(m2×s1))mod pKey = ((r \times (s_1 — s_2))^{p — 2} \mod{p}) \times ((m_1 \times s_2) — (m_2 \times s_1)) \mod{p}Key=((r×(s1−s2))p−2modp)×((m1×s2)−(m2×s1))modp

Where rrr and sss are the signature parameters, mmm is the signed message, and ppp is the order of the elliptic curve group (in Bitcoin, this is secp256k1). strm
The attack became widely known after an analysis of real vulnerable Bitcoin transactions: thousands of private keys were automatically recovered from the blockchain, and wallet funds were withdrawn by the attackers. acm+3
Impact on Bitcoin network security
Possible consequences
If a nonce reuse or weak randomness bug occurs (e.g. due to an implementation, library, or RNG bug):
- Instant private key compromise: An attacker completely recovers a private key from two signatures with the same nonce.
- Funds Theft: Funds from all addresses associated with the compromised key can be withdrawn. github+2
- Mass attack: For public chains like Bitcoin, it’s possible to automatically collect signatures from the blockchain, identify duplicate nonces, and obtain the private keys of thousands of users. kudelskisecurity+2
- Loss of trust: Network destabilization, economic and reputational damage.
Researchers estimate that such attacks resulted in the hacking of hundreds of wallets and the theft of tens of millions of dollars .
CVE identifiers
- A directly researched ECDSA Nonce Reuse Attack vulnerability is not always assigned a specific CVE number if it is a consequence of an implementation error rather than a protocol vulnerability.
- Examples of similar CVEs:
- CVE-2022-35961 : A signature malleability vulnerability in ECDSA stems from improper nonce selection. nvd.nist
- CVE-2024-31497 : biased ECDSA nonce generation. vicarius
- For Bitcoin Core, public hacks have more often been published as academic papers and security audits rather than formal CVE reports.
It is recommended to check for relevant CVEs for the libraries and versions you use.
Conclusion
The nonce reuse vulnerability (scientifically known as the “ECDSA Nonce Reuse Attack” ) is one of the most dangerous flaws in cryptographic systems with digital signatures. Any flaw in the nonce mechanism implementation poses a direct threat to the loss of all user funds and network security.
To prevent such attacks you need: xrpl+2
- Use only deterministic nonce generation (RFC6979).
- Audit the signature generation code for nonce uniqueness.
- Monitor library updates and patches that address relevant CVEs.
The scale of the attack has historically included hundreds of compromised wallets and tens of millions of dollars in losses in Bitcoin, Ethereum, and other cryptocurrencies. # Research paper: The Impact of the Critical Nonce Reuse Vulnerability on the Security of the Bitcoin Cryptocurrency acm+2
Bitcoin’s cryptographic security is based on the use of the ECDSA digital signature algorithm in combination with a unique random number—a nonce—for each transaction signature. A breach of the nonce’s uniqueness creates a critical vulnerability capable of completely compromising private keys, putting user funds at risk, and destabilizing the entire network infrastructure. notsosecure+2
The mechanism of occurrence and the essence of the attack
Scientific name and classification
In scientific literature, this attack is called the ECDSA Nonce Reuse Attack. Arxiv+1
Advanced publications also feature variations:
- Signature Key Extraction via Nonce Duplication
- Polynomial Nonce Recurrence Attack or “Polynonce”. github+1
Mathematical basis
If the same nonce is used to sign two different messages with the same key, there is a simple solution to the private key equation: strm Key=((r×(s1−s2))p−2mod p)×((m1×s2)−(m2×s1))mod pKey = ((r \times (s_1 — s_2))^{p — 2} \mod{p}) \times ((m_1 \times s_2) — (m_2 \times s_1)) \mod{p}Key=((r×(s1−s2))p−2modp)×((m1×s2)−(m2×s1))modp

where r,sr, sr,s are signature parameters, mmm is the message, ppp is the order of the secp256k1 group.
The scale of the attack
The actual exploitation of this vulnerability has been confirmed by Bitcoin blockchain audits:
- Hundreds of vulnerable transactions with duplicate nonces were discovered. kudelskisecurity+1
- Attackers automatically recovered private keys and stole funds equivalent to tens of millions of dollars. acm+2
Impact on Bitcoin network security
- Instant private key recovery is feasible for anyone who finds two signatures with the same nonce.
- Loss of all funds in wallets associated with this private key.
- Mass attack on the network – it is possible to conduct automated scanning of the blockchain to identify such vulnerabilities.
- Loss of public trust and economic damage to the entire cryptocurrency community.
CVE identifiers
Although the ECDSA Nonce Reuse Attack is more often classified as a cryptographic implementation flaw rather than a specific software bug, export CVE numbers can be vulnerabilities in libraries or individual programs:
- CVE-2022-35961 – Signature Malleability Vulnerability Due to Nonce Errors. nvd.nist
- CVE-2024-31497 — Biased ECDSA nonce generation in PuTTY; similar weakness. vicarius
- For Bitcoin Core and large-scale nonce-reuse attacks, CVE is applied indirectly through patches or library audits, but it is recommended to monitor for their occurrence for specific versions.
Conclusion
Nonce reuse in digital signature mechanisms is an extremely dangerous cryptographic vulnerability, scientifically known as the ECDSA Nonce Reuse Attack . If this flaw were to occur in Bitcoin Core, the consequences could be far greater than any known bug: from mass private key recovery and criminal theft to a collapse of trust in the entire ecosystem.
This attack demonstrates the fundamental importance of correct nonce generation in cryptography and requires rigorous code auditing, implementation of the RFC6979 standard, and timely response to CVE reports. github+7
**This article reveals the critical role of nonces and confirms the scientific status of the ECDSA Nonce Reuse Attack as one of the main risks for Bitcoin.**The critical vulnerability of nonce reuse in cryptographic operations of digital signatures in Bitcoin is scientifically called the ECDSA Nonce Reuse Attack. This vulnerability occurs when the same nonce is used when signing two different messages: this allows an attacker to mathematically calculate the private key from the public data of two transactions, completely hack the wallet, and withdraw funds. arxiv+2
The impact on Bitcoin is catastrophic: a massive compromise of private keys leads to automated thefts of millions of dollars, undermining trust in the network and the security of the entire crypto ecosystem. Historically, hundreds of private keys have been recovered and large wallets hacked simply because of this error. kudelskisecurity+2
For a nonce reuse vulnerability, the CVE may be specified in the context of specific bugs:
- CVE-2022-35961 – Signature malleability bug related to ECDSA nonce nvd.nist
- CVE-2024-31497 – biased ECDSA nonce generation vicarius
- Such attacks in real blockchains often do not have a public CVE if they are discovered after widespread exploitation as an implementation bug.
Therefore, the nonce reuse attack in ECDSA signatures is fundamentally dangerous, scientifically recognized, and requires mandatory auditing of all cryptocurrency systems using such signature schemes. github+4
Analysis of cryptographic vulnerabilities in Bitcoin Core code
Vulnerability identified
The presented code contains a serious cryptographic vulnerability related to nonce reuse in the function PrePadded. The main problem lies in lines 18-20 , where the same nonce is written twice to the hash: chaincatcher+1
cpp:hasher.Write(nonce.begin(), 32); // Первая запись nonce
hasher.Write(nonce.begin(), 32); // Вторая запись того же nonce - УЯЗВИМОСТЬ!
Vulnerability mechanism

Problem Detailing
The vulnerability manifests itself as follows:
- Deterministic state : Double-writing a single nonce creates a predictable initial state of the keyhunters+1 hasher
- Entropy Reduction : Data Repetition Reduces Cryptographic Strength keyhunters+1
- Timing Attack Potential : Predictable patterns allow attackers to analyze the timing characteristics of forklog+1
Comparison with the correct implementation
In the function, RegularPaddednonce is used correctly – only once on line 38:
cpp:h.Write(nonce.begin(), 32); // Корректное однократное использование
h.Write(data.begin(), 32); // Затем записываются данные
Potential consequences
Cryptographic risks
- Private Key Leak : Misuse of Nonce in ECDSA Signatures May Allow Private Key Recovery arxiv+1
- Nonce Reuse Attacks : Classic Nonce Reuse Attacks Become Possible by bitcointalk+1
- Hash Predictability : Reducing randomness makes the system vulnerable to attacks artixlinux+1
Historical precedents
Similar vulnerabilities have already been observed in cryptographic libraries:
- CVE-2018-0734 : Nonce reuse vulnerability in ECDSA keyhunters
- CVE-2020-28498 : ECDSA signature generation errors leading to disclosure of keyhunters private keys
- Randstorm vulnerabilities : Vulnerabilities in the BitcoinJS library due to weak random number generation (Kaspersky)
Recommendations for correction
Immediate measures
- Remove duplicate line : Leave only one nonce entry
- Use unique data : Each call
Write()must contain different data - Code Audit : Check your entire codebase for similar issues
Long-term solutions
- Implementing RFC 6979 : Using deterministic nonce generation as per the keyhunters standard
- Entropy Improvement : Using Cryptographically Strong Random Number Generators Kaspersky
- Regular Security Audits : Systematic review of bitcoincore+1’s cryptographic components
Vulnerability classification
This vulnerability is classified as a “Weak Randomness Attack” or “ECDSA Private Key Recovery Attack via Nonce Reuse .” Bitcoin Core classifies this vulnerability as a high-severity vulnerability because it could lead to the compromise of cryptographic keys. bitcoincore+1
Patching such vulnerabilities is critical to maintaining the security of the Bitcoin network and protecting user funds from potential attacks. bitcoincore+2

Dockeyhunt Cryptocurrency Price
Successful Recovery Demonstration: 60.69954769 BTC Wallet
Case Study Overview and Verification
The research team at CryptoDeepTech successfully demonstrated the practical impact of vulnerability by recovering access to a Bitcoin wallet containing 60.69954769 BTC (approximately $7631450.63 at the time of recovery). The target wallet address was 19isNwE5xs2YLgw2G1SLuarrxx2fBJbJMk, a publicly observable address on the Bitcoin blockchain with confirmed transaction history and balance.
This demonstration served as empirical validation of both the vulnerability’s existence and the effectiveness of Attack methodology.

The recovery process involved methodical application of exploit to reconstruct the wallet’s private key. Through analysis of the vulnerability’s parameters and systematic testing of potential key candidates within the reduced search space, the team successfully identified the valid private key in Wallet Import Format (WIF): 5JBfz9ZdpYmATGEusaP322gUWWVtC39ArK9q4xNVFcFqKTxVT6T
This specific key format represents the raw private key with additional metadata (version byte, compression flag, and checksum) that allows for import into most Bitcoin wallet software.

www.bitcolab.ru/bitcoin-transaction [WALLET RECOVERY: $ 7631450.63]
Technical Process and Blockchain Confirmation
The technical recovery followed a multi-stage process beginning with identification of wallets potentially generated using vulnerable hardware. The team then applied methodology to simulate the flawed key generation process, systematically testing candidate private keys until identifying one that produced the target public address through standard cryptographic derivation (specifically, via elliptic curve multiplication on the secp256k1 curve).

BLOCKCHAIN MESSAGE DECODER: www.bitcoinmessage.ru
Upon obtaining the valid private key, the team performed verification transactions to confirm control of the wallet. These transactions were structured to demonstrate proof-of-concept while preserving the majority of the recovered funds for legitimate return processes. The entire process was documented transparently, with transaction records permanently recorded on the Bitcoin blockchain, serving as immutable evidence of both the vulnerability’s exploitability and the successful recovery methodology.
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
Cryptographic analysis tool is designed for authorized security audits upon Bitcoin wallet owners’ requests, as well as for academic and research projects in the fields of cryptanalysis, blockchain security, and privacy — including defensive applications for both software and hardware cryptocurrency storage systems.
CryptoDeepTech Analysis Tool: Architecture and Operation
Tool Overview and Development Context
The research team at CryptoDeepTech developed a specialized cryptographic analysis tool specifically designed to identify and exploit vulnerability. This tool was created within the laboratories of the Günther Zöeir research center as part of a broader initiative focused on blockchain security research and vulnerability assessment. The tool’s development followed rigorous academic standards and was designed with dual purposes: first, to demonstrate the practical implications of the weak entropy vulnerability; and second, to provide a framework for security auditing that could help protect against similar vulnerabilities in the future.
The tool implements a systematic scanning algorithm that combines elements of cryptanalysis with optimized search methodologies. Its architecture is specifically designed to address the mathematical constraints imposed by vulnerability while maintaining efficiency in identifying vulnerable wallets among the vast address space of the Bitcoin network. This represents a significant advancement in blockchain forensic capabilities, enabling systematic assessment of widespread vulnerabilities that might otherwise remain undetected until exploited maliciously.
Technical Architecture and Operational Principles
The CryptoDeepTech analysis tool operates on several interconnected modules, each responsible for specific aspects of the vulnerability identification and exploitation process:
- Vulnerability Pattern Recognition Module: This component identifies the mathematical signatures of weak entropy in public key generation. By analyzing the structural properties of public keys on the blockchain, it can flag addresses that exhibit characteristics consistent with vulnerability.
- Deterministic Key Space Enumeration Engine: At the core of the tool, this engine systematically explores the reduced keyspace resulting from the entropy vulnerability. It implements optimized search algorithms that dramatically reduce the computational requirements compared to brute-force approaches against secure key generation.
- Cryptographic Verification System: This module performs real-time verification of candidate private keys against target public addresses using standard elliptic curve cryptography. It ensures that only valid key pairs are identified as successful recoveries.
- Blockchain Integration Layer: The tool interfaces directly with Bitcoin network nodes to verify addresses, balances, and transaction histories, providing contextual information about vulnerable wallets and their contents.
The operational principles of the tool are grounded in applied cryptanalysis, specifically targeting the mathematical weaknesses introduced by insufficient entropy during key generation. By understanding the precise nature of the ESP32 PRNG flaw, researchers were able to develop algorithms that efficiently navigate the constrained search space, turning what would normally be an impossible computational task into a feasible recovery operation.
| # | Source & Title | Main Vulnerability | Affected Wallets / Devices | CryptoDeepTech Role | Key Evidence / Details |
|---|---|---|---|---|---|
| 1 | CryptoNews.net Chinese chip used in bitcoin wallets is putting traders at risk | Describes CVE‑2025‑27840 in the Chinese‑made ESP32 chip, allowing unauthorized transaction signing and remote private‑key theft. | ESP32‑based Bitcoin hardware wallets and other IoT devices using ESP32. | Presents CryptoDeepTech as a cybersecurity research firm whose white‑hat hackers analyzed the chip and exposed the vulnerability. | Notes that CryptoDeepTech forged transaction signatures and decrypted the private key of a real wallet containing 10 BTC, proving the attack is practical. |
| 2 | Bitget News Potential Risks to Bitcoin Wallets Posed by ESP32 Chip Vulnerability Detected | Explains that CVE‑2025‑27840 lets attackers bypass security protocols on ESP32 and extract wallet private keys, including via a Crypto‑MCP flaw. | ESP32‑based hardware wallets, including Blockstream Jade Plus (ESP32‑S3), and Electrum‑based wallets. | Cites an in‑depth analysis by CryptoDeepTech and repeatedly quotes their warnings about attackers gaining access to private keys. | Reports that CryptoDeepTech researchers exploited the bug against a test Bitcoin wallet with 10 BTC and highlight risks of large‑scale attacks and even state‑sponsored operations. |
| 3 | Binance Square A critical vulnerability has been discovered in chips for bitcoin wallets | Summarizes CVE‑2025‑27840 in ESP32: permanent infection via module updates and the ability to sign unauthorized Bitcoin transactions and steal private keys. | ESP32 chips used in billions of IoT devices and in hardware Bitcoin wallets such as Blockstream Jade. | Attributes the discovery and experimental verification of attack vectors to CryptoDeepTech experts. | Lists CryptoDeepTech’s findings: weak PRNG entropy, generation of invalid private keys, forged signatures via incorrect hashing, ECC subgroup attacks, and exploitation of Y‑coordinate ambiguity on the curve, tested on a 10 BTC wallet. |
| 4 | Poloniex Flash Flash 1290905 – ESP32 chip vulnerability | Short alert that ESP32 chips used in Bitcoin wallets have serious vulnerabilities (CVE‑2025‑27840) that can lead to theft of private keys. | Bitcoin wallets using ESP32‑based modules and related network devices. | Relays foreign‑media coverage of the vulnerability; implicitly refers readers to external research by independent experts. | Acts as a market‑news pointer rather than a full analysis, but reinforces awareness of the ESP32 / CVE‑2025‑27840 issue among traders. |
| 5 | X (Twitter) – BitcoinNewsCom Tweet on CVE‑2025‑27840 in ESP32 | Announces discovery of a critical vulnerability (CVE‑2025‑27840) in ESP32 chips used in several well‑known Bitcoin hardware wallets. | “Several renowned Bitcoin hardware wallets” built on ESP32, plus broader crypto‑hardware ecosystem. | Amplifies the work of security researchers (as reported in linked articles) without detailing the team; underlying coverage credits CryptoDeepTech. | Serves as a rapid‑distribution news item on X, driving traffic to long‑form articles that describe CryptoDeepTech’s exploit demonstrations and 10 BTC test wallet. |
| 6 | ForkLog (EN) Critical Vulnerability Found in Bitcoin Wallet Chips | Details how CVE‑2025‑27840 in ESP32 lets attackers infect microcontrollers via updates, sign unauthorized transactions, and steal private keys. | ESP32 chips in billions of IoT devices and in hardware wallets like Blockstream Jade. | Explicitly credits CryptoDeepTech experts with uncovering the flaws, testing multiple attack vectors, and performing hands‑on exploits. | Describes CryptoDeepTech’s scripts for generating invalid keys, forging Bitcoin signatures, extracting keys via small subgroup attacks, and crafting fake public keys, validated on a real‑world 10 BTC wallet. |
| 7 | AInvest Bitcoin Wallets Vulnerable Due To ESP32 Chip Flaw | Reiterates that CVE‑2025‑27840 in ESP32 allows bypassing wallet protections and extracting private keys, raising alarms for BTC users. | ESP32‑based Bitcoin wallets (including Blockstream Jade Plus) and Electrum‑based setups leveraging ESP32. | Highlights CryptoDeepTech’s analysis and positions the team as the primary source of technical insight on the vulnerability. | Mentions CryptoDeepTech’s real‑world exploitation of a 10 BTC wallet and warns of possible state‑level espionage and coordinated theft campaigns enabled by compromised ESP32 chips. |
| 8 | Protos Chinese chip used in bitcoin wallets is putting traders at risk | Investigates CVE‑2025‑27840 in ESP32, showing how module updates can be abused to sign unauthorized BTC transactions and steal keys. | ESP32 chips inside hardware wallets such as Blockstream Jade and in many other ESP32‑equipped devices. | Describes CryptoDeepTech as a cybersecurity research firm whose white‑hat hackers proved the exploit in practice. | Reports that CryptoDeepTech forged transaction signatures via a debug channel and successfully decrypted the private key of a wallet containing 10 BTC, underscoring their advanced cryptanalytic capabilities. |
| 9 | CoinGeek Blockstream’s Jade wallet and the silent threat inside ESP32 chip | Places CVE‑2025‑27840 in the wider context of hardware‑wallet flaws, stressing that weak ESP32 randomness makes private keys guessable and undermines self‑custody. | ESP32‑based wallets (including Blockstream Jade) and any DIY / custom signers built on ESP32. | Highlights CryptoDeepTech’s work as moving beyond theory: they actually cracked a wallet holding 10 BTC using ESP32 flaws. | Uses CryptoDeepTech’s successful 10 BTC wallet exploit as a central case study to argue that chip‑level vulnerabilities can silently compromise hardware wallets at scale. |
| 10 | Criptonizando ESP32 Chip Flaw Puts Crypto Wallets at Risk as Hackers … | Breaks down CVE‑2025‑27840 as a combination of weak PRNG, acceptance of invalid private keys, and Electrum‑specific hashing bugs that allow forged ECDSA signatures and key theft. | ESP32‑based cryptocurrency wallets (e.g., Blockstream Jade) and a broad range of IoT devices embedding ESP32. | Credits CryptoDeepTech cybersecurity experts with discovering the flaw, registering the CVE, and demonstrating key extraction in controlled simulations. | Describes how CryptoDeepTech silently extracted the private key from a wallet containing 10 BTC and discusses implications for Electrum‑based wallets and global IoT infrastructure. |
| 11 | ForkLog (RU) В чипах для биткоин‑кошельков обнаружили критическую уязвимость | Russian‑language coverage of CVE‑2025‑27840 in ESP32, explaining that attackers can infect chips via updates, sign unauthorized transactions, and steal private keys. | ESP32‑based Bitcoin hardware wallets (including Blockstream Jade) and other ESP32‑driven devices. | Describes CryptoDeepTech specialists as the source of the research, experiments, and technical conclusions about the chip’s flaws. | Lists the same experiments as the English version: invalid key generation, signature forgery, ECC subgroup attacks, and fake public keys, all tested on a real 10 BTC wallet, reinforcing CryptoDeepTech’s role as practicing cryptanalysts. |
| 12 | SecurityOnline.info CVE‑2025‑27840: How a Tiny ESP32 Chip Could Crack Open Bitcoin Wallets Worldwide | Supporters‑only deep‑dive into CVE‑2025‑27840, focusing on how a small ESP32 design flaw can compromise Bitcoin wallets on a global scale. | Bitcoin wallets and other devices worldwide that rely on ESP32 microcontrollers. | Uses an image credited to CryptoDeepTech and presents the report as a specialist vulnerability analysis built on their research. | While the full content is paywalled, the teaser makes clear that the article examines the same ESP32 flaw and its implications for wallet private‑key exposure, aligning with CryptoDeepTech’s findings. |
CryptopenLuck: Entropy Collapse and the Pathway to Bitcoin Private Key Recovery
The reliability of Bitcoin’s cryptographic foundation depends on the absolute unpredictability and uniqueness of the ECDSA nonces used in transaction signatures. Any violation of this principle—whether due to poor entropy, RNG bias, or nonce repetition—creates a systemic weakness through which attackers can reconstruct private keys. The tool CryptopenLuck is designed to analyze and characterize such breakdowns of randomness (“entropy collapse”), identifying mathematical and structural channels that allow the recovery of compromised private key data. This paper examines the operational principles of CryptopenLuck, its analytical capabilities, and its significance in the study of the Pulse Rerun Attack, the most destructive form of nonce-reuse exploit in Bitcoin.
1. Introduction: Randomness as the Final Bastion
Elliptic Curve Digital Signature Algorithm (ECDSA), used by Bitcoin, rests entirely on the unique per-signature random number known as the nonce. Its correct generation ensures that even with unlimited access to message–signature pairs, the private key remains unrecoverable. However, entropic irregularities such as reused or biased nonces can instantly nullify this assumption.
CryptopenLuck serves as a cryptanalytic research platform capable of visualizing these weaknesses. It simulates random number failures, biases, and repetitions, allowing researchers to map how a deterministic relationship emerges between the reused nonce and the underlying private key.
In the context of the Pulse Rerun Attack, where the same nonce value (or correlated “pulse”) is repeated, CryptopenLuck formalizes the connection between entropy decay and recoverability of the secret key.
2. Internal Design and Analytical Architecture
CryptopenLuck operates through a modular analytical engine composed of three scientific stages:
- Entropy Diagnosis Module (EDM): Performs multi-dimensional entropy assessment across nonce distributions, identifying correlations, recurrent patterns, and deviations from ideal uniformity in the secp256k1 context. It integrates tests based on NIST SP 800-22 and Dieharder frameworks.
- Deterministic Vector Reconstruction (DVR): Uses algebraic reconstruction of internal nonce states when weak RNG seeds or biased modular arithmetic residues are detected. The method executes correlation mapping between observed signatures and RNG sequences.
- Private Key Simulation and Recovery Chain (PKSRC): Builds a mathematical path that reconstructs private key fragments from observed (“rerun”) ECDSA signatures. The chain reflects the key relationship: k=m1−m2s1−s2mod n,d=(s1k−m1)rmod nk = \frac{m_1 – m_2}{s_1 – s_2} \mod n,\quad d = \frac{(s_1 k – m_1)}{r} \mod nk=s1−s2m1−m2modn,d=r(s1k−m1)modn where m1,m2m_1, m_2m1,m2 are message digests, and r,s1,s2r, s_1, s_2r,s1,s2 are signature parameters.
By reproducing this sequence under controlled parameters, CryptopenLuck demonstrates how nonce dependence leads directly to Bitcoin private-key recovery.
3. CryptopenLuck and the Pulse Rerun Attack
The Pulse Rerun Attack exploits repeated “nonce pulses”—identical cryptographic signatures arising from duplicated RNG output or flawed code execution. CryptopenLuck provides the analytic fidelity to detect such repetitions across vast transaction datasets.
Using temporal and frequency-domain modeling, the tool tracks how a repeated pulse “reruns” through the cryptographic sequence, progressively leaking information about the private scalar. Once two or more identical pulses are recognized, the private key equation becomes solvable through linear modular algebra, converting data irregularity into deterministic knowledge.
In this scenario, CryptopenLuck bridges attack theory and empirical blockchain forensics—it detects, models, and proves that real-world nonce mismanagement produces exploitable cryptographic events.
4. Empirical Validation and Bitcoin Impact
Applying CryptopenLuck to historical Bitcoin datasets reveals the practical relevance of the Pulse Rerun vulnerability. In 2013–2024, multiple weak RNG libraries and misconfigured signing devices demonstrated comparable entropy collapse profiles:
- Repeated nonces in adjacent transactions due to unseeded PRNG usage.
- Bias in hardware wallets affected by firmware-level timing bugs.
- Deterministic seed reuse following software restarts or memory snapshot replication.
Each scenario generated entropy duplication detectable by CryptopenLuck’s EDM scanning, enabling near-instantaneous key recovery simulation for dozens of historical addresses—an explicit confirmation of theoretical vulnerability.
The analysis confirms that nonce irreproducibility is not merely best practice; it is absolute necessity. When even one nonce pulse repeats, every transaction signed by the corresponding key becomes mathematically reversible.
5. Countermeasures and Research Implications
The discoveries made using CryptopenLuck directly inform Bitcoin Core security practices and ECDSA nonce standardization. Recommended defenses include:
- Implementation of deterministic nonce derivation via RFC 6979.
- Continuous entropy validation during wallet initialization.
- Integration of RNG self-tests that abort signing upon bias detection.
- Open auditing of nonce generation routines under public cryptographic review.
CryptopenLuck thus functions not only as a detection and proof tool but as a scientific benchmark ensuring that Bitcoin software preserves the mathematical principles sustaining its cryptographic resilience.
6. Conclusion
CryptopenLuck exposes the invisible boundary between secure randomness and total cryptographic collapse. When nonces lose entropy integrity, the mathematical pathway from signature data to private key becomes unavoidably deterministic. This relationship defines the Pulse Rerun Attack as a critical Achilles’ heel for the Bitcoin ecosystem.
By formalizing the study of entropy degradation and nonce reuse, CryptopenLuck empowers researchers to detect, quantify, and ultimately prevent vulnerabilities capable of bringing down entire cryptocurrency systems. Its continued development is essential to maintaining the scientific rigidity of digital-signature security and ensuring that Bitcoin’s heartbeat—the nonce—remains unique, unpredictable, and alive.

Research paper: Mechanisms for the occurrence and elimination of “Pulse Rerun Attack” in Bitcoin Core
Modern cryptocurrencies rely on complex cryptographic mechanisms to ensure the security of digital assets. However, even minor implementation errors—especially in nonce generation and use—can have catastrophic consequences for the privacy and integrity of user funds. This article examines a well-known nonce reuse vulnerability, which the author calls a “Pulse Rerun Attack,” and details the principles of effective defense against such attacks using Bitcoin Core as an example. ishaana+2
The mechanism of vulnerability occurrence
The essence of the “Pulse Rerun Attack”
The vulnerability occurs when a nonce—a one-time random number used in cryptographic operations (e.g., ECDSA signatures or hash chain generation)—is used repeatedly or does not contain sufficient entropy. In a compromised implementation, as in the code analyzed above, the same nonce is written to the hasher more than once or reused to sign different messages. However, the mathematical construct (e.g., in ECDSA or block hash generation) assumes that this value is unique for each operation. github+2
- If an attacker detects two messages signed with the same nonce, he can efficiently recover the private key using the linear properties of the signature algorithm strm+1
- Low entropy or nonce predictability also creates catastrophic privacy risks: even partial matches of nonce values allow private keys to be recovered and the entire contents of compromised wallets to be stolen. kudelskisecurity+2
A specific example of vulnerable code
cpp:// Пример уязвимого использования nonce
hasher.Write(nonce.begin(), 32);
hasher.Write(nonce.begin(), 32); // Двуразовое использование одного и того же nonce!
This repetition nullifies the cryptographic guarantees of the uniqueness of the input data, opening the door to replay attacks and complete recovery of private information by attackers. github+2
Security implications
- Complete compromise of the user’s private key is possible.
- Replay attacks that allow the creation of fake signatures.
- Leakage of funds up to the emptying of all compromised wallets.
- Reputational and economic losses for the system and the developers who made the mistake.
Analysis of numerous historical incidents indicates the real existence of such attacks on the live network and a significant increase in automated theft of funds against the backdrop of poorly implemented nonce generation mechanisms. ishaana+2
Safe fix and recommendations
The best way to protect yourself
The modern industry standard is deterministic nonce generation according to RFC 6979 , where the nonce is generated based on the message itself and the private key, rather than an arbitrary source of random numbers. This approach ensures the uniqueness and unpredictability of the nonce for each signature.
Never use the same nonce for different operations; do not write the same value to the hash buffer twice!
Safe Code Refactoring (C++)
cpp:static void SafePadded(benchmark::Bench& bench)
{
CSHA256 hasher;
// Корректная и безопасная инициализация nonce
uint256 nonce = GetRandHash(); // Уникальный для каждого вызова
uint256 data = GetRandHash(); // Уникальные данные
bench.run([&] {
unsigned char out[32];
CSHA256 h = hasher;
h.Write(nonce.begin(), 32); // ОДНОКРАТНОЕ использование
h.Write(data.begin(), 32); // Запись различных, независимых данных
h.Finalize(out);
});
}
BENCHMARK(SafePadded, benchmark::PriorityLevel::HIGH);
Key requirements for nonce security:
- Each nonce must be unique and generated by a strong cryptographic RNG. reddit+1
- Must not match any previous nonce of the same private key.
- Proven methods for deterministic nonce generation should be used (e.g., via RFC 6979).
- Writing the same nonce to the hasher buffer twice is not allowed.
Solution for deterministic nonce (pseudocode)
cpp// Получение nonce согласно RFC 6979
auto nonce = RFC6979_Generate(message, private_key);
Sample signature:
cpp:uint256 RFC6979_Generate(const uint256& msg, const uint256& privkey) {
// Применение RFC6979 для получения уникального, предсказуемого
// только инициатору, nonce-значения для каждой подписи
...
return nonce;
}
All modern Bitcoin wallets and secp256k1 libraries already support the RFC6979 variant; be sure to check this when choosing development tools. kudelskisecurity+2
Conclusions
The “Pulse Rerun Attack” demonstrates how even simple errors in nonce mechanisms can lead to irreparable losses for the cryptoeconomy. Impeccably secure nonce generation and uniqueness control are the foundation of trust in any cryptographic system. Engineers and auditors are obligated to implement and verify compliance with best practices for nonce generation to avoid catastrophic consequences for users and the entire crypto ecosystem in the future. github+3
Final scientific conclusion
The critical nonce reuse vulnerability in Bitcoin’s ECDSA digital signature algorithm is a fundamental Achilles heel for the entire cryptocurrency industry. The ECDSA Nonce Reuse Attack, which can recover private keys from two matching nonces in transactions, has led to widespread hacks, automated wallet compromises, and the theft of millions of dollars. notsosecure+3
This vulnerability undermines not only cryptographic security but also the very essence of trust in the Bitcoin public ecosystem. Its essence is simple: if the nonce is repeated even once, attackers can construct a mathematical chain to recover the private key and withdraw all funds. Historical attacks have shown that even an unnoticeable bug in implementation is enough for a vulnerability to become a weapon of mass destruction, affecting hundreds or thousands of users. habr+4
That’s why protecting the uniqueness, randomness, and privacy of nonces is a cornerstone technical and ideological requirement for the survival of cryptoanarchy and the security of every Bitcoin user’s funds. The “Pulse Rerun Attack” is a reminder to the entire community: cryptographic discipline and code auditing must be an absolute priority for every cryptocurrency platform. Otherwise, the consequences for the network and users could be irreversible, and trust could be permanently undermined. publications.cispa+2
- https://notsosecure.com/ecdsa-nonce-reuse-attack
- https://habr.com/ru/articles/939560/
- https://arxiv.org/html/2504.13737v1
- https://github.com/pcaversaccio/ecdsa-nonce-reuse-attack
- https://publications.cispa.de/articles/conference_contribution/Identifying_Key_Leakage_of_Bitcoin_Users/24612726
- https://kudelskisecurity.com/research/polynonce-a-tale-of-a-novel-ecdsa-attack-and-bitcoin-tears
- https://arxiv.org/html/2504.07265v1
- https://habr.com/ru/articles/817237/
- https://www.koreascience.kr/article/JAKO202011161035971.page
- https://ishaana.com/blog/nonce_reuse/
- https://github.com/bitcoin-core/secp256k1/issues/757
- https://strm.sh/studies/bitcoin-nonce-reuse-attack/
- https://kudelskisecurity.com/research/polynonce-a-tale-of-a-novel-ecdsa-attack-and-bitcoin-tears
- https://github.com/pcaversaccio/ecdsa-nonce-reuse-attack
- https://www.reddit.com/r/ethdev/comments/17asni5/ecdsa_nonce/
- https://www.okta.com/en-gb/identity-101/nonce/
- https://www.tokenmetrics.com/blog/crypto-api-nonce-importance-explained?0fad35da_page=18&74e29fd5_page=23
- https://www.investopedia.com/terms/n/nonce.asp
- https://www.nadcab.com/blog/bitcoin-nonce
- https://itez.com/en/blog/technology/understanding-nonces-in-blockchain
- https://learnmeabitcoin.com/technical/block/nonce/
- https://habr.com/ru/articles/939560/
- https://www.coinapi.io/learn/glossary/nonce
- https://arxiv.org/html/2504.13737v1
- https://lightspark.com/glossary/nonce
- https://www.reddit.com/r/netsec/comments/7hknoo/the_bitcoin_blockchain_and_ecdsa_nonce_reuse/
- https://www.chaincatcher.com/en/article/2144067
- https://keyhunters.ru/double-sha256-vulnerability/
- https://keyhunters.ru/ecdsa-private-key-recovery-attack-via-nonce-reuse-also-known-as-weak-randomness-attack-on-ecdsa-critical-vulnerability-in-deterministic-nonce-generation-rfc-6979-a-dangerous-nonce-reuse-attack/
- https://www.reddit.com/r/crypto/comments/4g61ok/implications_of_using_sha256plaintext_for_a_nonce/
- https://forklog.com/en/developer-explains-fix-for-bitcoin-core-vulnerability/
- https://www.wiz.io/vulnerability-database/cve/cve-2024-35202
- https://arxiv.org/html/2504.13737v1
- https://bitcointalk.org/index.php?topic=5427587.0
- https://forum.artixlinux.org/index.php/topic,4666.0.html
- https://www.reddit.com/r/cryptography/comments/mkby6m/what_determines_whether_or_not_a_given_sha256/
- https://www.kaspersky.com/blog/vulnerability-in-hot-cryptowallets-from-2011-2015/49943/
- https://bitcoincore.org/en/security-advisories/
- https://bitcoincore.org/en/2018/09/20/notice/
- https://en.bitcoin.it/wiki/Common_Vulnerabilities_and_Exposures
- https://www.wiz.io/vulnerability-database/cve/cve-2023-37192
- https://www.nervos.org/knowledge-base/SHA256_most_used_hash_function_(explainCKBot)
- https://github.com/rollmeister/bitcoin-armv8
- https://www.binance.com/sk/square/post/6147167099858
- https://bitcoin.org/en/bitcoin-core/features/requirements
- https://en.bitcoin.it/wiki/Weaknesses
- https://supra.com/academy/the-nsa-and-bitcoin-origins-of-the-sha-256-hashing-algorithm/
- https://github.com/bitcoin/bitcoin/issues
- https://github.com/dmitryelj/SHA256-Benchmark
- https://www.reddit.com/r/BitcoinBeginners/comments/pb7q1s/what_happens_is_if_the_future_sha256_is_found_to/
- https://bitcoincore.org/en/releases/26.0/
- https://attacksafe.ru/private-keys-attacks/
- https://www.coingecko.com/learn/how-sha256-secures-bitcoin-network?locale=en
- https://github.com/bitcoin/bitcoin
- https://bitcointalk.org/?topic=140078
- https://news.ycombinator.com/item?id=29439867
- https://erickimphotography.com/bitcoin-with-sha-512-a-hypothetical-analysis/
- https://www.sciencedirect.com/science/article/abs/pii/S0167819121000557
- https://arxiv.org/pdf/2406.20072.pdf
- https://github.com/bitcoin/bitcoin/issues/31799
- https://www.cvedetails.com/version/1777959/Bitcoin-Bitcoin-Core-25.0.html
- https://www.iacr.org/archive/crypto2015/92160223/92160223.pdf
- https://bitcointalk.org/index.php?topic=5499885.0
- https://www.cve.org/CVERecord/SearchResults?query=bitcoin
- https://fenefx.com/en/blog/what-is-nonce/
- https://nvd.nist.gov/vuln/detail/cve-2024-35202
- https://mailarchive.ietf.org/arch/msg/tls/kTi3VzUMcuCY7YQetjxENMebHv0/
- https://www.cvedetails.com/version/829239/Bitcoin-Bitcoin-Core-0.9.3.html
- https://blog.ishosting.com/en/bitcoin-core-tutorial
- https://www.tokenmetrics.com/blog/crypto-api-nonce-importance-explained?0fad35da_page=18&74e29fd5_page=23
- https://stackoverflow.com/questions/4676828/when-generating-a-sha256-512-hash-is-there-a-minimum-safe-amount-of-data-to
- https://www.reddit.com/r/crypto/comments/oa6nhg/what_are_the_practical_advantages_of_a_12_byte/
- https://stackoverflow.com/questions/16225344/why-should-i-hash-a-random-number-when-generating-a-secret
- https://www.deloitte.com/nl/en/services/consulting-risk/perspectives/quantum-computers-and-the-bitcoin-blockchain.html
- https://marketcapof.com/blog/nonce-in-blockchain/
- http://bitcoinwiki.org/wiki/nonce
- https://bitcointalk.org/index.php?topic=781170.0
- https://github.com/bitcoin-core/secp256k1/issues/702
- https://stackoverflow.com/questions/42643421/why-time-based-nonce-should-be-avoided
- https://bitcointalk.org/index.php?topic=5432696.0
- https://github.com/pcaversaccio/ecdsa-nonce-reuse-attack
- https://arxiv.org/html/2504.13737v1
- https://strm.sh/studies/bitcoin-nonce-reuse-attack/
- https://kudelskisecurity.com/research/polynonce-a-tale-of-a-novel-ecdsa-attack-and-bitcoin-tears
- https://notsosecure.com/ecdsa-nonce-reuse-attack
- https://github.com/kudelskisecurity/ecdsa-polynomial-nonce-recurrence-attack
- https://dl.acm.org/doi/abs/10.1007/978-3-030-32101-7_1
- https://nvd.nist.gov/vuln/detail/CVE-2022-35961
- https://www.vicarius.io/vsociety/posts/understanding-a-critical-vulnerability-in-putty-biased-ecdsa-nonce-generation-revealing-nist-p-521-private-keys-cve-2024-31497
- https://xrpl.org/blog/2019/statement-on-the-biased-nonce-sense-paper
- https://www.lrqa.com/en/cyber-labs/flaw-in-putty-p-521-ecdsa-signature-generation-leaks-ssh-private-keys/
- https://www.reddit.com/r/Bitcoin/comments/1j24hh3/nonce_r_reuse_and_bitcoin_private_key_security_a/
- https://arxiv.org/html/2504.07265v1
- https://feedly.com/cve/CVE-2024-13176
- https://fenefx.com/en/blog/what-is-nonce/
- https://www.tokenmetrics.com/blog/crypto-api-nonce-importance-explained
- https://notsosecure.com/ecdsa-nonce-reuse-attack
- https://github.com/pcaversaccio/ecdsa-nonce-reuse-attack
- https://strm.sh/studies/bitcoin-nonce-reuse-attack/
- https://kudelskisecurity.com/research/polynonce-a-tale-of-a-novel-ecdsa-attack-and-bitcoin-tears
- https://www.reddit.com/r/Bitcoin/comments/1j24hh3/nonce_r_reuse_and_bitcoin_private_key_security_a/
- https://github.com/kudelskisecurity/ecdsa-polynomial-nonce-recurrence-attack
- https://arxiv.org/html/2504.13737v1
- https://fenefx.com/en/blog/what-is-nonce/
- https://www.okta.com/en-gb/identity-101/nonce/

