00

12/15/2021
by   Nguyen Thoi Minh Quan, et al.
0

What is the funniest number in cryptography (Episode 2)? 0 [1]. The reason is that ∀ x, x · 0 = 0, i.e., the equation is satisfied no matter what x is. We'll use zero to attack zero-knowledge proof (ZKP). In particular, we'll discuss a critical issue in a cutting-edge ZKP PLONK [2] C++ implementation which allows an attacker to create a forged proof that all verifiers will accept. We'll show how theory guides the attack's direction. In practice, the attack works like a charm and we'll show how the attack falls through a chain of perfectly aligned software cracks. In the same codebase, there is an independent critical ECDSA bug where (r, s) = (0, 0) is a valid signature for arbitrary keys and messages, but we won't discuss it further because it's a known ECDSA attack vector in the Google Wycheproof cryptanalysis project [3] that I worked on a few years ago. All bugs have been responsibly disclosed through the vendor's bug bounty program with total reward ∼$15,000 (thank you).

READ FULL TEXT
research
11/11/2021

SyzScope: Revealing High-Risk Security Impacts of Fuzzer-Exposed Bugs in Linux kernel

Fuzzing has become one of the most effective bug finding approach for so...
research
10/12/2018

Linear Program Reconstruction in Practice

We briefly report on a linear program reconstruction attack performed on...
research
03/31/2023

Decentralized Attack Search and the Design of Bug Bounty Schemes

Systems and blockchains often have security vulnerabilities and can be a...
research
09/12/2023

PreciseBugCollector: Extensible, Executable and Precise Bug-fix Collection

Bug datasets are vital for enabling deep learning techniques to address ...
research
11/15/2018

It Does Not Follow. Response to "Yes They Can! ..."

This a response to "Yes They Can! ..." (a comment on [5]) by J.S. Shaari...
research
01/11/2019

Understanding Rowhammer Attacks through the Lens of a Unified Reference Framework

Rowhammer is a hardware-based bug that allows the attacker to modify the...
research
05/15/2020

BaseSAFE: Baseband SAnitized Fuzzing through Emulation

Rogue base stations are an effective attack vector. Cellular basebands r...

Please sign up or login with your details

Forgot password? Click here to reset