Sign in to confirm you’re not a bot
This helps protect our community. Learn more
These chapters are auto-generated

Intro

0:00

Introduction In this talk: . We present our cryptanalysis of Curl-P-27 a hash function

0:17

Why is this interesting?

1:31

IOTA Background: Signatures

2:45

Breaking IOTA's Signature Scheme Consider two msgs m1 and m2 that hashes to the same value

3:54

Curl-P-27: A Cryptographic Hash Function

5:18

Curl-P-27 uses a Sponge-like Construction

5:44

How do we create collisions in Curl-P-27?

6:41

The transformation function uses a round function

7:35

Curl-P-27: Transformation function is very simple

8:19

Curl-P-27: Preventing diffusion in many rounds

9:21

Diffusion and collisions in Curl-P-27

10:22

Visualizing the collisions Normal difference propagation for Curl-P-27

11:30

Curl-P-27: Diffusion in the Transformation function

12:33

Curl-P-27: Finding Collisions

14:55

Eve uses Alice's signature on Msg1 for Msg2

16:41

Signature Forgery in more detail

16:59

IOTA Fixes Our Signature Forgery Vulnerability • We disclosed this vulnerability to the IOTA devs ...in response the IOTA devs replaced Curl-P-27 with Kerl

19:04

IOTA claims this was a backdoor ".. Curl-P was indeed deployed in the open-source IOTA protocol code as a copy-protection mechanism to prevent bad actors cloning the protocol and using it for nefarious purposes. Once the practical collisions were uncovered, its purpose as a copy-protection mechanism was of course rendered obsolete"

19:57

A brief note on impact and disclosure

20:51

Conclusion Our results: 1. We broke the collision resistance of Curl-P-27 2. Exploiting this we perform a chosen message attack forging signatures on valid IOTA payments such that

21:14