CryptoDB
Jean-Philippe Aumasson
Publications
Year
Venue
Title
2021
RWC
Attacking Threshold Wallets
Abstract
Threshold wallets leverage threshold signature schemes (TSS) to distribute signing rights across multiple parties when issuing blockchain transactions.
These provide greater assurance against insider fraud, and are sometimes seen as an alternative to methods using a trusted execution environment to issue the signature.
This new class of applications motivated researchers to discover better protocols, entrepreneurs to create start-up companies, and large organizations to deploy TSS-based solutions.
For example, the leading cryptocurrency exchange (in transaction volume) adopted TSS to protect some of its wallets.
Although the TSS concept is not new, this is the first time that so many TSS implementations are written and deployed in such a critical context, where all liquidity reserves could be lost in a minute if the crypto fails. Furthermore, TSS schemes are sometimes extended or tweaked to best adapt to their target use case---what could go wrong?
This paper, based on the authors' experience with building and analyzing TSS technology, describes three different attacks on TSS implementations used by leading organizations.
Unlike security analyses of on-paper protocols, this work targets TSS as deployed in real applications, and exploits logical vulnerabilities enabled by the extra layers of complexity added by TSS software.
The attacks have concrete applications, and could for example have been exploited to empty an organization's cold wallet (typically worth at least an 8-digit dollar figure).
Indeed, one of our targets is the cold wallet system of the biggest cryptocurrency exchange (which has been fixed after our disclosure).
2013
JOFC
Quark: A Lightweight Hash
Abstract
The need for lightweight (that is, compact, low-power, low-energy) cryptographic hash functions has been repeatedly expressed by professionals, notably to implement cryptographic protocols in RFID technology. At the time of writing, however, no algorithm exists that provides satisfactory security and performance. The ongoing SHA-3 Competition will not help, as it concerns general-purpose designs and focuses on software performance. This paper thus proposes a novel design philosophy for lightweight hash functions, based on the sponge construction in order to minimize memory requirements. Inspired by the stream cipher Grain and by the block cipher KATAN (amongst the lightest secure ciphers), we present the hash function family Quark, composed of three instances: u-Quark, d-Quark, and s-Quark. As a sponge construction, Quark can be used for message authentication, stream encryption, or authenticated encryption. Our hardware evaluation shows that Quark compares well to previous tentative lightweight hash functions. For example, our lightest instance u-Quark conjecturally provides at least 64-bit security against all attacks (collisions, multicollisions, distinguishers, etc.), fits in 1379 gate-equivalents, and consumes on average 2.44 μW at 100 kHz in 0.18 μm ASIC. For 112-bit security, we propose s-Quark, which can be implemented with 2296 gate-equivalents with a power consumption of 4.35 μW.
Service
- FSE 2017 Program committee
- FSE 2013 Program committee
Coauthors
- Jean-Philippe Aumasson (10)
- Çagdas Çalik (1)
- Itai Dinur (1)
- Simon Fischer (1)
- Jian Guo (1)
- Luca Henzen (2)
- Jorge Nakahara Jr. (1)
- Shahram Khazaei (1)
- Simon Knellwolf (1)
- Yann Laigle-Chapuy (1)
- Gaëtan Leurent (1)
- Krystian Matusiewicz (1)
- Willi Meier (8)
- María Naya-Plasencia (3)
- Onur Özen (1)
- Thomas Peyrin (1)
- Raphael C.-W. Phan (2)
- Christian Rechberger (1)
- Andrea Röck (1)
- Pouyan Sepehrdad (1)
- Adi Shamir (1)
- Omer Shlomovits (1)
- Kerem Varici (1)