Close Menu

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Bitcoin stays bullish above 21-MA as altcoins flash danger signs

    May 10, 2026

    Logan Paul faces scam accusations after $16M Pokémon card sale

    May 10, 2026

    Strategy could sell 1 BTC to buy 10 more

    May 10, 2026
    Facebook X (Twitter) Instagram
    Cryptify Now
    • Home
    • Features
      • Typography
      • Contact
      • View All On Demos
    • Typography
    • Buy Now
    X (Twitter) Instagram YouTube LinkedIn
    Cryptify Now
    You are at:Home » Secured no. 1 | Ethereum Foundation Blog
    Ethereum

    Secured no. 1 | Ethereum Foundation Blog

    Olivia MartinezBy Olivia MartinezMarch 23, 2026No Comments4 Mins Read
    Facebook Twitter Pinterest LinkedIn Tumblr Email
    Share
    Facebook Twitter LinkedIn Pinterest Email


    Earlier this year, we launched a bug bounty program focused on finding issues in the beacon chain specification, and/or in client implementations (Lighthouse, Nimbus, Teku, Prysm etc…). The results (and vulnerability reports) have been enlightening as have the lessons learned while patching potential issues.

    In this new series, we aim to explore and share some of the insight we’ve gained from security work to date and as we move forward.

    This first post will analyze some of the submissions specifically targeting BLS primitives.

    Disclaimer: All bugs mentioned in this post have been already fixed.

    BLS is everywhere

    A few years ago, Diego F. Aranha gave a talk at the 21st Workshop on Elliptic Curve Cryptography with the title: Pairings are not dead, just resting. How prophetic.

    Here we are in 2021, and pairings are one of the primary actors behind many of the cryptographic primitives used in the blockchain space (and beyond): BLS aggregate signatures, ZK-SNARKS systems, etc.

    Development and standardization work related to BLS signatures has been an ongoing project for EF researchers for a while now, driven in-part by Justin Drake and summarized in a recent post of his on reddit.

    The latest and greatest

    In the meantime, there have been plenty of updates. BLS12-381 is now universally recognized as the pairing curve to be used given our present knowledge.

    Three different IRTF drafts are currently under development:

    1. Pairing-Friendly Curves
    2. BLS signatures
    3. Hashing to Elliptic Curves

    Moreover, the beacon chain specification has matured and is already partially deployed. As mentioned above, BLS signatures are an important piece of the puzzle behind proof-of-stake (PoS) and the beacon chain.

    Recent lessons learned

    After collecting submissions targeting the BLS primitives used in the consensus-layer, we’re able to split reported bugs into three areas:

    • IRTF draft oversights
    • Implementation mistakes
    • IRTF draft implementation violations

    Let’s zoom into each section.

    IRTF draft oversights

    One of the reporters, (Nguyen Thoi Minh Quan), found discrepancies in the IRTF draft, and published two white papers with findings:

    While the specific inconsistencies are still subject for debate, he found some interesting implementation issues while conducting his research.

    Implementation mistakes

    Guido Vranken was able to uncover several “little” issues in BLST using differential fuzzing. See examples of those below:

    He topped this off with discovery of a moderate vulnerability affecting the BLST’s blst_fp_eucl_inverse function.

    IRTF draft implementation violations

    A third category of bug was related to IRTF draft implementation violations. The first one affected the Prysm client.

    In order to describe this we need first to provide a bit of background. The BLS signatures IRTF draft includes 3 schemes:

    1. Basic scheme
    2. Message augmentation
    3. Proof of possession

    The Prysm client doesn’t make any distinction between the 3 in its API, which is unique among implementations (e.g. py_ecc). One peculiarity about the basic scheme is quoting verbatim: ‘This function first ensures that all messages are distinct’ . This was not ensured in the AggregateVerify function. Prysm fixed this discrepancy by deprecating the usage of AggregateVerify (which is not used anywhere in the beacon chain specification).

    A second issue impacted py_ecc. In this case, the serialization process described in the ZCash BLS12-381 specification that stores integers are always within the range of [0, p – 1]. The py_ecc implementation did this check for the G2 group of BLS12-381 only for the real part but did not perform the modulus operation for the imaginary part. The issue was fixed with the following pull request: Insufficient Validation on decompress_G2 Deserialization in py_ecc.

    Wrapping up

    Today, we took a look at the BLS related reports we have received as part of our bug bounty program, but this is definitely not the end of the story for security work or for adventures related to BLS.

    We strongly encourage you to help ensure the consensus-layer continues to grow safer over time. With that, we look forward hearing from you and encourage you to DIG! If you think you’ve found a security vulnerability or any bug related to the beacon chain or related clients, submit a bug report! 💜🦄





    Source link

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleDavid Schwartz joins XRP-Solana meme war on X
    Next Article Strategy’s preferred shares spell out an unfortunate acronym: FCKD
    Olivia Martinez

    Related Posts

    Bootstrapping A Decentralized Autonomous Corporation: Part I

    May 4, 2026

    Bootstrapping An Autonomous Decentralized Corporation, Part 2: Interacting With the World

    May 4, 2026

    Bootstrapping a Decentralized Autonomous Corporation, Part 3: Identity Corp

    May 4, 2026
    Leave A Reply Cancel Reply

    Top Posts

    Oracle error adds to turmoil at DeFi giant Aave

    March 11, 2026

    Solana price risks bull trap at $90 as resistance approaches

    March 11, 2026

    Insurance Giant Aon Partners With Coinbase and Paxos in Trialing Use of Stablecoins for Premium Payments

    March 11, 2026

    J. King Kasr Introduces Lithic, an AI-Native Smart Contract Language for Deterministic Blockchain Infrastructure

    March 11, 2026
    Don't Miss

    Bitcoin stays bullish above 21-MA as altcoins flash danger signs

    By James WilsonMay 10, 2026

    Bitcoin (BTC) traded near $80,874 on May 10, with an intraday high of $81,026 and…

    Logan Paul faces scam accusations after $16M Pokémon card sale

    May 10, 2026

    Strategy could sell 1 BTC to buy 10 more

    May 10, 2026

    Copy, Paste, Rekt: Ethereum address poisoning strikes again

    May 10, 2026
    Stay In Touch
    • Facebook
    • Twitter
    • Pinterest
    • Instagram
    • YouTube
    • Vimeo

    Subscribe to Updates

    Get the latest creative news from SmartMag about art & design.

    Demo
    About Us
    About Us

    CryptifyNow: Your daily source for the latest insights, news, and analysis in the ever-evolving world of cryptocurrency.

    X (Twitter) Instagram YouTube LinkedIn
    Our Picks

    Bitcoin stays bullish above 21-MA as altcoins flash danger signs

    May 10, 2026

    Logan Paul faces scam accusations after $16M Pokémon card sale

    May 10, 2026

    Strategy could sell 1 BTC to buy 10 more

    May 10, 2026
    Lithosphere News Releases

    J. King Kasr Introduces Lithic, an AI-Native Smart Contract Language for Deterministic Blockchain Infrastructure

    March 11, 2026

    Lithic Launches with LEP100 Standards Suite for AI Governance and Cryptographic Verification

    March 12, 2026

    KaJ Labs Unveils Lithic Developer Stack for AI Applications, Games, and Enterprise Systems

    March 13, 2026
    Copyright © 2026

    Type above and press Enter to search. Press Esc to cancel.