Close Menu

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    AfCFTA SEcretary General Calls For Renewed Transformative Partnership With The US To Accelerate Production And Trade

    June 30, 2025

    AfCFTA SEcretary General Calls For Renewed Transformative Partnership With The US To Accelerate Production And Trade

    June 30, 2025

    AfCFTA SEcretary General Calls For Renewed Transformative Partnership With The US To Accelerate Production And Trade

    June 30, 2025
    Facebook X (Twitter) Instagram
    Cryptify Now
    • Home
    • Features
      • Typography
      • Contact
      • View All On Demos
    • Typography
    • Buy Now
    X (Twitter) Instagram YouTube LinkedIn
    Cryptify Now
    You are at:Home » Secured no. 1 | Ethereum Foundation Blog
    Ethereum

    Secured no. 1 | Ethereum Foundation Blog

    Olivia MartinezBy Olivia MartinezFebruary 13, 2025No Comments4 Mins Read
    Facebook Twitter Pinterest LinkedIn Tumblr Email
    Share
    Facebook Twitter LinkedIn Pinterest Email


    Earlier this year, we launched a bug bounty program focused on finding issues in the beacon chain specification, and/or in client implementations (Lighthouse, Nimbus, Teku, Prysm etc…). The results (and vulnerability reports) have been enlightening as have the lessons learned while patching potential issues.

    In this new series, we aim to explore and share some of the insight we’ve gained from security work to date and as we move forward.

    This first post will analyze some of the submissions specifically targeting BLS primitives.

    Disclaimer: All bugs mentioned in this post have been already fixed.

    BLS is everywhere

    A few years ago, Diego F. Aranha gave a talk at the 21st Workshop on Elliptic Curve Cryptography with the title: Pairings are not dead, just resting. How prophetic.

    Here we are in 2021, and pairings are one of the primary actors behind many of the cryptographic primitives used in the blockchain space (and beyond): BLS aggregate signatures, ZK-SNARKS systems, etc.

    Development and standardization work related to BLS signatures has been an ongoing project for EF researchers for a while now, driven in-part by Justin Drake and summarized in a recent post of his on reddit.

    The latest and greatest

    In the meantime, there have been plenty of updates. BLS12-381 is now universally recognized as the pairing curve to be used given our present knowledge.

    Three different IRTF drafts are currently under development:

    1. Pairing-Friendly Curves
    2. BLS signatures
    3. Hashing to Elliptic Curves

    Moreover, the beacon chain specification has matured and is already partially deployed. As mentioned above, BLS signatures are an important piece of the puzzle behind proof-of-stake (PoS) and the beacon chain.

    Recent lessons learned

    After collecting submissions targeting the BLS primitives used in the consensus-layer, we’re able to split reported bugs into three areas:

    • IRTF draft oversights
    • Implementation mistakes
    • IRTF draft implementation violations

    Let’s zoom into each section.

    IRTF draft oversights

    One of the reporters, (Nguyen Thoi Minh Quan), found discrepancies in the IRTF draft, and published two white papers with findings:


    While the specific inconsistencies are still subject for debate, he found some interesting implementation issues while conducting his research.

    Implementation mistakes

    Guido Vranken was able to uncover several “little” issues in BLST using differential fuzzing. See examples of those below:


    He topped this off with discovery of a moderate vulnerability affecting the BLST’s blst_fp_eucl_inverse function.

    IRTF draft implementation violations

    A third category of bug was related to IRTF draft implementation violations. The first one affected the Prysm client.

    In order to describe this we need first to provide a bit of background. The BLS signatures IRTF draft includes 3 schemes:

    1. Basic scheme
    2. Message augmentation
    3. Proof of possession

    The Prysm client doesn’t make any distinction between the 3 in its API, which is unique among implementations (e.g. py_ecc). One peculiarity about the basic scheme is quoting verbatim: ‘This function first ensures that all messages are distinct’ . This was not ensured in the AggregateVerify function. Prysm fixed this discrepancy by deprecating the usage of AggregateVerify (which is not used anywhere in the beacon chain specification).

    A second issue impacted py_ecc. In this case, the serialization process described in the ZCash BLS12-381 specification that stores integers are always within the range of [0, p – 1]. The py_ecc implementation did this check for the G2 group of BLS12-381 only for the real part but did not perform the modulus operation for the imaginary part. The issue was fixed with the following pull request: Insufficient Validation on decompress_G2 Deserialization in py_ecc.

    Wrapping up

    Today, we took a look at the BLS related reports we have received as part of our bug bounty program, but this is definitely not the end of the story for security work or for adventures related to BLS.

    We strongly encourage you to help ensure the consensus-layer continues to grow safer over time. With that, we look forward hearing from you and encourage you to DIG! If you think you’ve found a security vulnerability or any bug related to the beacon chain or related clients, submit a bug report! 💜🦄





    Source link

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleOpinion| World Radio Day 2025: Supporting Radio to Promote Climate Literacy in South Sudan
    Next Article Questions Haliey Welch and the $HAWK team won’t answer
    Olivia Martinez

    Related Posts

    Announcing Protocol | Ethereum Foundation Blog

    June 28, 2025

    Announcing the Devconnect ARG Scholars Program

    June 28, 2025

    Announcing the Devconnect ARG Scholars Program

    June 28, 2025
    Leave A Reply Cancel Reply

    Top Posts

    Remittix (RTX) hits $4m presale as XRP holders take notice

    February 4, 2025

    Here’s why OKB price spiked 20% today

    February 4, 2025

    iDEGEN price prediction: Is this the AI agent token to buy?

    February 4, 2025

    Gate.io to list CYBRO token on Dec 14 after $7M presale success

    February 4, 2025
    Don't Miss

    AfCFTA SEcretary General Calls For Renewed Transformative Partnership With The US To Accelerate Production And Trade

    By William GarciaJune 30, 2025

    … the Africa Inexperienced Industrialisation Initiative (AGII), which goals to place Africa … Source link

    AfCFTA SEcretary General Calls For Renewed Transformative Partnership With The US To Accelerate Production And Trade

    June 30, 2025

    AfCFTA SEcretary General Calls For Renewed Transformative Partnership With The US To Accelerate Production And Trade

    June 30, 2025

    AfCFTA SEcretary General Calls For Renewed Transformative Partnership With The US To Accelerate Production And Trade

    June 30, 2025
    Stay In Touch
    • Facebook
    • Twitter
    • Pinterest
    • Instagram
    • YouTube
    • Vimeo

    Subscribe to Updates

    Get the latest creative news from SmartMag about art & design.

    Demo
    About Us
    About Us

    CryptifyNow: Your daily source for the latest insights, news, and analysis in the ever-evolving world of cryptocurrency.

    X (Twitter) Instagram YouTube LinkedIn
    Our Picks

    AfCFTA SEcretary General Calls For Renewed Transformative Partnership With The US To Accelerate Production And Trade

    June 30, 2025

    AfCFTA SEcretary General Calls For Renewed Transformative Partnership With The US To Accelerate Production And Trade

    June 30, 2025

    AfCFTA SEcretary General Calls For Renewed Transformative Partnership With The US To Accelerate Production And Trade

    June 30, 2025
    Lithosphere News Releases

    Colle AI’s iOS App Launch Brings Multichain NFT Creation to Mobile

    February 4, 2025

    AGII Transforms Web3 Infrastructure with AI-Optimized Smart Contracts

    February 4, 2025

    Colle AI (COLLE) Allocates $250M for AI Tool Development and Liquidity Growth on Solana

    February 4, 2025
    Copyright © 2025

    Type above and press Enter to search. Press Esc to cancel.