SwiftSync - smarter synchronization with hints

Posted by Greg Maxwell

May 3, 2025/15:54 UTC

In a recent discussion on the Bitcoin Development Mailing List, Ruben Somsen highlighted a significant vulnerability associated with the proposal to truncate transaction identifiers to 32-bits, and possibly even 64-bits. This vulnerability pertains to the cryptographic handling of transactions involving accumulators with an additive property. Specifically, Somsen points out that if an operation is repeated a sufficient number of times, the effects can cancel each other out due to the modular nature of these operations. For instance, executing a transaction with an unknown accumulator's impact multiplied by (2^{32}) times, and then applying modulo (2^{32}), will result in zero, effectively negating the impact of the accumulator.

This insight underscores a fundamental flaw in the suggestion to limit transaction identifiers to a shorter length. The concern arises from the fact that without knowledge of the 'salt'—a random value added to data before hashing to prevent certain types of cryptographic attacks—even if the precise number of repetitions needed to achieve this cancellation effect is unknown, the sheer size of the ring (or the range within which these operations are performed) can make such attacks feasible. Thus, the conversation brings to light the broader implications for blockchain security and the integrity of transaction processing, emphasizing the need for careful consideration of cryptographic practices in the development of blockchain technologies.

Link to Raw Post
Bitcoin Logo

TLDR

Join Our Newsletter

We’ll email you summaries of the latest discussions from authoritative bitcoin sources, like bitcoin-dev, lightning-dev, and Delving Bitcoin.

Explore all Products

ChatBTC imageBitcoin searchBitcoin TranscriptsSaving SatoshiBitcoin Transcripts Review
Built with 🧡 by the Bitcoin Dev Project
View our public visitor count

We'd love to hear your feedback on this project?

Give Feedback