taler
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Taler] This is Trevor Perrin's summery of the CryptoNote bug


From: Jeff Burdges
Subject: [Taler] This is Trevor Perrin's summery of the CryptoNote bug
Date: Fri, 19 May 2017 10:37:26 +0200

-------- Forwarded Message --------
From: Trevor Perrin <address@hidden>
To: address@hidden <address@hidden>
Subject: [curves] CryptoNote and equivalent points
Date: Fri, 19 May 2017 01:31:49 +0000

Interesting bug:

https://getmonero.org/2017/05/17/disclosure-of-a-major-bug-in-cryptonote-based-currencies.html

I don't know much about CryptoNote, but I think this is the story:

They sign transactions with a ring signature scheme so the signature
can be verified without knowing which of several private keys produced
it.  Private keys are intended to be used once.  To prevent
double-spending, the signature contains a "tag" or "key image" which
will be the same if the same private key is used.

However, the tag is just a point on the 25519 curve encoded in Ed25519
format, and verification performs scalar-multiplication with some
scalar and this point.  I guess the signer can control this scalar to
be a multiple of the cofactor, in which case it's possible to find
"equivalent" tags by adding small-order points to the tag, defeating
the double-spending protection.

This is the most dramatic case I've seen of an "equivalent" EC point
affecting a protocol, so it's an interesting data point.  It's worth
pondering what this means for protocol design and safe use of EC.

The obvious fixes are:

 (A) Since the signature is intended to bind a unique tag value, the
tag should have been hashed as a signature input.

 (B) Doing a "full validation" scalar-multiplication to reject points
outside the main subgroup also prevents this, though with a
computation cost (note that a check that only rejects small-order
points, such as the "all-zeros" check, doesn't help here).

(B) is what's being deployed, for compatibility, but I assume (A) is
what they wished they had done.

Perhaps this also argues that future complex protocols should consider
something like Mike Hamburg's Decaf (but does this work with 25519?),
or the "torsion-safe representatives" Henry de Valence was recently
proposing?  Or just prime-order curves?

Other thoughts?


Trevor
_______________________________________________
Curves mailing list
address@hidden
https://moderncrypto.org/mailman/listinfo/curves

Attachment: signature.asc
Description: This is a digitally signed message part


reply via email to

[Prev in Thread] Current Thread [Next in Thread]