Posted by Mikhail Kudinov
Mar 1, 2026/12:24 UTC
In the discussion regarding the security of SLH-DSA against fault attacks, it's highlighted that the mitigation strategy involves running the signing process multiple times to verify the consistency of signatures. This method, however, only addresses scenarios where the attacker has physical access and the capability to manipulate at least one bit during the computation process. Concerns were also raised about the integrity of the original security proof provided for SLH-DSA. Although it was pointed out that there was an issue with the initial proof claiming more robust security than warranted, this did not directly translate into a vulnerability within the scheme itself. To address these concerns, a new security proof was developed without making any alterations to the original scheme. This revised proof underwent formal verification through EasyCrypt, ensuring its reliability and strength against potential attacks. The details of this verification can be found in the document hosted on eprint.iacr.org, providing further insights into the robustness of the SLH-DSA under scrutiny.
Thread Summary (41 replies)
Feb 9 - Mar 1, 2026
42 messages • 41 replies
TLDR
We’ll email you summaries of the latest discussions from high signal bitcoin sources, like bitcoin-dev, lightning-dev, and Delving Bitcoin.
We'd love to hear your feedback on this project.
Give Feedback