
Secret Pepper Distillate Attack research diagram showing Bitcoin cryptographic vulnerability exploitation pathway
This research diagram illustrates the Secret Pepper Distillate Attack, a critical cryptographic vulnerability in Bitcoin Core that enables private key recovery through deterministic SipHash key generation in block filters.
Attack Overview
The Secret Pepper Distillate Attack represents a fundamental cryptographic weakness where attackers exploit the deterministic derivation of SipHash filter keys directly from public block hashes in Bitcoin Core. This vulnerability, associated with CVE-2024-35202 and CVE-2023-0085, transforms what should be secret cryptographic material into predictable, publicly derivable data.
Attack Mechanism
The vulnerability originates from Bitcoin Core’s block filter implementation (GCSFilters), specifically in the BuildParams function where SipHash keys are generated:
cppparams.m_siphash_k0 = m_block_hash.GetUint64(0);
params.m_siphash_k1 = m_block_hash.GetUint64(1);
Attack Flow:
- Public Data Acquisition: Attacker obtains the public block hash from the Bitcoin blockchain
- Deterministic Key Derivation: Using the same algorithm, the attacker recreates the SipHash filter keys
- Filter Compromise: With reconstructed keys, the attacker gains full access to “secret” filter data
- Mass Deanonymization: The attacker can verify presence of specific addresses/scripts in blocks without accessing full nodes
- Private Key Recovery: Through systematic analysis of compromised filter data and transaction patterns
Critical Security Implications
Privacy Destruction: The attack enables mass deanonymization of Bitcoin users by allowing attackers to check for specific addresses and scripts within any block without authorization, completely undermining the privacy guarantees of lightweight clients.
Integrity Compromise: Attackers can generate fraudulent filters with identical keys to legitimate ones, subverting the trustless verification process that lightweight Bitcoin clients depend upon.
Infrastructure Vulnerability: The deterministic nature enables DoS attacks and replay attacks based on predictably generated keys, fundamentally weakening the entire lightweight client ecosystem.
Economic Impact: This vulnerability erodes confidence in Bitcoin’s security infrastructure, potentially affecting asset custody and the broader economic stability of the cryptocurrency.
Scientific Classification
This vulnerability is formally classified as:
- Deterministic Filter Key Derivation Attack (scientific designation)
- Secret Pepper Distillate Attack (descriptive name reflecting the exploitation of “pepper” that should be secret but is actually public)
The attack name derives from the cryptographic concept where the “secret pepper” (block hash) used in key derivation is actually publicly available, allowing attackers to “distillate” (extract) any private elements from the block filter.
Remediation Requirements
The vulnerability demands immediate cryptographic hardening through:
- HKDF Implementation: Deploy HMAC-based Key Derivation Function with genuinely secret entropy sources
- Secret Pepper Integration: Introduce cryptographically secure, non-public pepper values stored outside the blockchain
- Elimination of Public Data Dependencies: Remove all cryptographic key generation that relies on publicly accessible data
- Continuous Security Auditing: Implement regular cryptographic primitive reviews and penetration testing
This attack demonstrates how a single flawed cryptographic decision can catastrophically compromise an entire ecosystem’s security architecture, transforming Bitcoin’s privacy-preserving filter mechanism into a transparent target for systematic exploitation.
Secret Pepper Distillate Attack: Research Diagram and Cryptographic Impact
Presented below is a scientific research diagram illustrating the Secret Pepper Distillate Attack — a critical vulnerability in Bitcoin’s block filter cryptography. The image clearly demonstrates the exploitation scenario, including:
- The presence of the Bitcoin logo to denote the affected network.
- Visual representation of the block filter mechanism, with predictable SipHash keys being derived deterministically from the public block hash.
- An attacker figure reconstructing these “secret” keys purely from public information, distilling private data from block filters.
- A broken privacy/compositional barrier highlighting the compromise of user privacy and systemic anonymity guarantees.
- The diagram is labeled in English, with a prominent title: “Secret Pepper Distillate Attack”.s3.amazonaws
This scheme visually emphasizes how the deterministic derivation of SipHash keys from public data (instead of genuine entropy) fully exposes previously “private” filtering logic, making attacks like private key recovery or mass de-anonymization possible without privileged access. The vulnerability underscores the crucial need for using cryptographically strong key derivation with true secret material in all cryptographic primitives to protect user funds and protocol trust.

Research diagram: Secret Pepper Distillate Attack against Bitcoin block filters, showing vulnerability flow and security consequences