-
Notifications
You must be signed in to change notification settings - Fork 176
Insecure signature verification algorithm for ed25519 #426
Copy link
Copy link
Closed
Description
As currently implemented, the verification algorithm is not strongly unforgeable under chosen message attacks (SUF-CMA), that is, an adversary can construct an alternative signature for a given signed message; moreover, it doesn't provide guarantees of malicious strong universal exclusive ownership (M-S-UEO) to prevent key substition attacks. Furthermore, it doesn't guarantee Message-Bound Signatures (MBS), i.e., there exist no two distinct messages for which the same signature would verify with respect to a given (potentially maliciously generated) public key.
Warning: failing to patch this vulnerability could lead to double-spending attacks on cothority.
Reactions are currently unavailable
Metadata
Metadata
Assignees
Labels
No labels