Algorithm Agility for Bitcoin to maintain security in the face of quantum and classic breaks in the signature algorithms

Posted by Mikhail Kudinov

Mar 1, 2026/12:24 UTC

In the discussion regarding the security of SLH-DSA against fault attacks, it's highlighted that the mitigation strategy involves running the signing process multiple times to verify the consistency of signatures. This method, however, only addresses scenarios where the attacker has physical access and the capability to manipulate at least one bit during the computation process. Concerns were also raised about the integrity of the original security proof provided for SLH-DSA. Although it was pointed out that there was an issue with the initial proof claiming more robust security than warranted, this did not directly translate into a vulnerability within the scheme itself. To address these concerns, a new security proof was developed without making any alterations to the original scheme. This revised proof underwent formal verification through EasyCrypt, ensuring its reliability and strength against potential attacks. The details of this verification can be found in the document hosted on eprint.iacr.org, providing further insights into the robustness of the SLH-DSA under scrutiny.

Link to Raw Post
Bitcoin Logo

TLDR

Join Our Newsletter

We’ll email you summaries of the latest discussions from high signal bitcoin sources, like bitcoin-dev, lightning-dev, and Delving Bitcoin.

Explore all Products

ChatBTC imageBitcoin searchBitcoin TranscriptsSaving SatoshiDecoding BitcoinWarnet
Built with 🧡 by the Bitcoin Dev Project
View our public visitor count

We'd love to hear your feedback on this project.

Give Feedback