Posted by Greg Maxwell
May 3, 2025/15:54 UTC
In a recent discussion on the Bitcoin Development Mailing List, Ruben Somsen highlighted a significant vulnerability associated with the proposal to truncate transaction identifiers to 32-bits, and possibly even 64-bits. This vulnerability pertains to the cryptographic handling of transactions involving accumulators with an additive property. Specifically, Somsen points out that if an operation is repeated a sufficient number of times, the effects can cancel each other out due to the modular nature of these operations. For instance, executing a transaction with an unknown accumulator's impact multiplied by (2^{32}) times, and then applying modulo (2^{32}), will result in zero, effectively negating the impact of the accumulator.
This insight underscores a fundamental flaw in the suggestion to limit transaction identifiers to a shorter length. The concern arises from the fact that without knowledge of the 'salt'—a random value added to data before hashing to prevent certain types of cryptographic attacks—even if the precise number of repetitions needed to achieve this cancellation effect is unknown, the sheer size of the ring (or the range within which these operations are performed) can make such attacks feasible. Thus, the conversation brings to light the broader implications for blockchain security and the integrity of transaction processing, emphasizing the need for careful consideration of cryptographic practices in the development of blockchain technologies.
TLDR
We’ll email you summaries of the latest discussions from authoritative bitcoin sources, like bitcoin-dev, lightning-dev, and Delving Bitcoin.
We'd love to hear your feedback on this project?
Give Feedback